GMER: Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-07-07 22:58:58
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 WDC_WD20 rev.51.0 1863,02GB
Running: Gmer-19357.exe; Driver: C:\Users\Marcel\AppData\Local\Temp\kxdiypog.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 528 fffff800031a2000 16 bytes [8B, E3, 41, 5F, 41, 5E, 41, ...]
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 545 fffff800031a2011 35 bytes {LEA ECX, [RSP+0x70]; CALL 0x3d64f}
---- User code sections - GMER 2.1 ----
.text C:\ProgramData\IePluginService\PluginService.exe[1236] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\ProgramData\IePluginService\PluginService.exe[1236] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\ProgramData\IePluginServices\PluginService.exe[1300] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\ProgramData\IePluginServices\PluginService.exe[1300] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000072121a22 2 bytes [12, 72]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000072121ad0 2 bytes [12, 72]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000072121b08 2 bytes [12, 72]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000072121bba 2 bytes [12, 72]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000072121bda 2 bytes [12, 72]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1768] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!NtCreateUserProcess 00000000776f091c 5 bytes JMP 0000000103045945
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_W 000000007770261d 5 bytes JMP 00000001030453cc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007770c4dd 5 bytes JMP 0000000103045a6e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_A 0000000077712ad3 5 bytes JMP 0000000103045412
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_W 0000000077734168 5 bytes JMP 0000000103045458
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_A 000000007773e695 5 bytes JMP 000000010304549e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\kernel32.dll!GetFileAttributesExW 0000000076d8453c 5 bytes JMP 0000000103045b0e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetDC 0000000076a472c4 5 bytes JMP 0000000103050912
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!ReleaseDC 0000000076a47446 5 bytes JMP 0000000103050990
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!TranslateMessage 0000000076a47809 5 bytes JMP 000000010304f91f
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetMessageW 0000000076a478e2 5 bytes JMP 000000010304da52
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetMessageA 0000000076a47bd3 5 bytes JMP 000000010304da7a
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetWindowDC 0000000076a48048 5 bytes JMP 0000000103050951
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!RegisterClassW 0000000076a48a65 5 bytes JMP 00000001030456d0
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!RegisterClassExW 0000000076a4b17d 5 bytes JMP 000000010304576a
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!RegisterClassExA 0000000076a4db98 5 bytes JMP 00000001030457bc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!PeekMessageW 0000000076a505ba 5 bytes JMP 000000010304daa2
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!CallWindowProcW 0000000076a50d32 5 bytes JMP 0000000103045602
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetCursorPos 0000000076a51218 5 bytes JMP 000000010304d885
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!EndPaint 0000000076a51341 5 bytes JMP 0000000103050877
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!BeginPaint 0000000076a51361 5 bytes JMP 0000000103050807
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetMessagePos 0000000076a52a8d 5 bytes JMP 000000010304d853
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetCapture 0000000076a52aac 5 bytes JMP 000000010304d9b3
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetDCEx 0000000076a53391 5 bytes JMP 00000001030508b7
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!RegisterClassA 0000000076a5434b 5 bytes JMP 000000010304571d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!PeekMessageA 0000000076a55f74 5 bytes JMP 000000010304dacd
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetUpdateRgn 0000000076a56222 5 bytes JMP 0000000103050a63
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!CallWindowProcA 0000000076a5792f 5 bytes JMP 000000010304564b
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!DefFrameProcA 0000000076a57fbb 5 bytes JMP 000000010304552d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!DefMDIChildProcA 0000000076a5810c 5 bytes JMP 00000001030455bc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!DefFrameProcW 0000000076a585c1 5 bytes JMP 00000001030454e4
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!DefMDIChildProcW 0000000076a586b4 5 bytes JMP 0000000103045576
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetUpdateRect 0000000076a6d41f 5 bytes JMP 00000001030509d0
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!ReleaseCapture 0000000076a6ed49 5 bytes JMP 000000010304d963
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!SetCapture 0000000076a6ed56 5 bytes JMP 000000010304d909
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!SwitchDesktop 0000000076a89854 5 bytes JMP 00000001030453ae
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!SetCursorPos 0000000076a89cfd 5 bytes JMP 000000010304d8cc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!GetClipboardData 0000000076a89f1d 5 bytes JMP 000000010304fa85
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\USER32.dll!OpenInputDesktop 0000000076aa87cb 5 bytes JMP 000000010304535e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WS2_32.dll!closesocket 00000000768c3918 5 bytes JMP 000000010304febd
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WS2_32.dll!WSASend 00000000768c4406 5 bytes JMP 000000010304ff16
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WS2_32.dll!send 00000000768c6f01 5 bytes JMP 000000010304fef5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!InternetReadFileExA 0000000077128af0 5 bytes JMP 000000010305a437
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!HttpSendRequestExW 000000007712a4a2 5 bytes JMP 000000010305a27d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!InternetCloseHandle 0000000077187549 5 bytes JMP 000000010305a3b5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!HttpQueryInfoA 0000000077188b52 5 bytes JMP 000000010305a4ad
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!InternetReadFile 00000000771941f7 5 bytes JMP 000000010305a3f8
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!InternetQueryDataAvailable 0000000077195d88 5 bytes JMP 000000010305a481
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!HttpSendRequestW 0000000077196570 5 bytes JMP 000000010305a1d5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!HttpSendRequestA 00000000771a9b82 5 bytes JMP 000000010305a229
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\WININET.dll!HttpSendRequestExA 0000000077217f39 5 bytes JMP 000000010305a319
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[3032] C:\Windows\syswow64\CRYPT32.dll!PFXImportCertStore 0000000076bc18b8 5 bytes JMP 000000010305c8ed
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!NtCreateUserProcess 00000000776f091c 5 bytes JMP 0000000103a75945
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_W 000000007770261d 5 bytes JMP 0000000103a753cc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007770c4dd 5 bytes JMP 0000000103a75a6e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_A 0000000077712ad3 5 bytes JMP 0000000103a75412
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_W 0000000077734168 5 bytes JMP 0000000103a75458
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_A 000000007773e695 5 bytes JMP 0000000103a7549e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\kernel32.dll!GetFileAttributesExW 0000000076d8453c 5 bytes JMP 0000000103a75b0e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetDC 0000000076a472c4 5 bytes JMP 0000000103a80912
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!ReleaseDC 0000000076a47446 5 bytes JMP 0000000103a80990
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!TranslateMessage 0000000076a47809 5 bytes JMP 0000000103a7f91f
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetMessageW 0000000076a478e2 5 bytes JMP 0000000103a7da52
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetMessageA 0000000076a47bd3 5 bytes JMP 0000000103a7da7a
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetWindowDC 0000000076a48048 5 bytes JMP 0000000103a80951
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!RegisterClassW 0000000076a48a65 5 bytes JMP 0000000103a756d0
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!RegisterClassExW 0000000076a4b17d 5 bytes JMP 0000000103a7576a
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!RegisterClassExA 0000000076a4db98 5 bytes JMP 0000000103a757bc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!PeekMessageW 0000000076a505ba 5 bytes JMP 0000000103a7daa2
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!CallWindowProcW 0000000076a50d32 5 bytes JMP 0000000103a75602
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetCursorPos 0000000076a51218 5 bytes JMP 0000000103a7d885
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!EndPaint 0000000076a51341 5 bytes JMP 0000000103a80877
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!BeginPaint 0000000076a51361 5 bytes JMP 0000000103a80807
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetMessagePos 0000000076a52a8d 5 bytes JMP 0000000103a7d853
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetCapture 0000000076a52aac 5 bytes JMP 0000000103a7d9b3
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetDCEx 0000000076a53391 5 bytes JMP 0000000103a808b7
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!RegisterClassA 0000000076a5434b 5 bytes JMP 0000000103a7571d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!PeekMessageA 0000000076a55f74 5 bytes JMP 0000000103a7dacd
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetUpdateRgn 0000000076a56222 5 bytes JMP 0000000103a80a63
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!CallWindowProcA 0000000076a5792f 5 bytes JMP 0000000103a7564b
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!DefFrameProcA 0000000076a57fbb 5 bytes JMP 0000000103a7552d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!DefMDIChildProcA 0000000076a5810c 5 bytes JMP 0000000103a755bc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!DefFrameProcW 0000000076a585c1 5 bytes JMP 0000000103a754e4
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!DefMDIChildProcW 0000000076a586b4 5 bytes JMP 0000000103a75576
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetUpdateRect 0000000076a6d41f 5 bytes JMP 0000000103a809d0
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!ReleaseCapture 0000000076a6ed49 5 bytes JMP 0000000103a7d963
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!SetCapture 0000000076a6ed56 3 bytes JMP 0000000103a7d909
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!SetCapture + 4 0000000076a6ed5a 1 byte {JMP 0x2}
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!SwitchDesktop 0000000076a89854 5 bytes JMP 0000000103a753ae
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!SetCursorPos 0000000076a89cfd 5 bytes JMP 0000000103a7d8cc
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!GetClipboardData 0000000076a89f1d 5 bytes JMP 0000000103a7fa85
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\USER32.dll!OpenInputDesktop 0000000076aa87cb 5 bytes JMP 0000000103a7535e
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WS2_32.dll!closesocket 00000000768c3918 5 bytes JMP 0000000103a7febd
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WS2_32.dll!WSASend 00000000768c4406 5 bytes JMP 0000000103a7ff16
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WS2_32.dll!send 00000000768c6f01 5 bytes JMP 0000000103a7fef5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!InternetReadFileExA 0000000077128af0 5 bytes JMP 0000000103a8a437
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!HttpSendRequestExW 000000007712a4a2 5 bytes JMP 0000000103a8a27d
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!InternetCloseHandle 0000000077187549 5 bytes JMP 0000000103a8a3b5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!HttpQueryInfoA 0000000077188b52 5 bytes JMP 0000000103a8a4ad
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!InternetReadFile 00000000771941f7 5 bytes JMP 0000000103a8a3f8
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!InternetQueryDataAvailable 0000000077195d88 5 bytes JMP 0000000103a8a481
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!HttpSendRequestW 0000000077196570 5 bytes JMP 0000000103a8a1d5
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!HttpSendRequestA 00000000771a9b82 5 bytes JMP 0000000103a8a229
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\WININET.dll!HttpSendRequestExA 0000000077217f39 5 bytes JMP 0000000103a8a319
.text C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe[2156] C:\Windows\syswow64\CRYPT32.dll!PFXImportCertStore 0000000076bc18b8 5 bytes JMP 0000000103a8c8ed
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!NtCreateUserProcess 00000000776f091c 5 bytes JMP 00000001079f5945
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_W 000000007770261d 5 bytes JMP 00000001079f53cc
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007770c4dd 5 bytes JMP 00000001079f5a6e
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_A 0000000077712ad3 5 bytes JMP 00000001079f5412
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_W 0000000077734168 5 bytes JMP 00000001079f5458
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_A 000000007773e695 5 bytes JMP 00000001079f549e
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\kernel32.dll!GetFileAttributesExW 0000000076d8453c 5 bytes JMP 00000001079f5b0e
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetDC 0000000076a472c4 5 bytes JMP 0000000107a00912
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!ReleaseDC 0000000076a47446 5 bytes JMP 0000000107a00990
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!TranslateMessage 0000000076a47809 5 bytes JMP 00000001079ff91f
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetMessageW 0000000076a478e2 5 bytes JMP 00000001079fda52
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetMessageA 0000000076a47bd3 5 bytes JMP 00000001079fda7a
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetWindowDC 0000000076a48048 5 bytes JMP 0000000107a00951
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!RegisterClassW 0000000076a48a65 5 bytes JMP 00000001079f56d0
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!RegisterClassExW 0000000076a4b17d 5 bytes JMP 00000001079f576a
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!RegisterClassExA 0000000076a4db98 5 bytes JMP 00000001079f57bc
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!PeekMessageW 0000000076a505ba 5 bytes JMP 00000001079fdaa2
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!CallWindowProcW 0000000076a50d32 5 bytes JMP 00000001079f5602
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetCursorPos 0000000076a51218 5 bytes JMP 00000001079fd885
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!EndPaint 0000000076a51341 5 bytes JMP 0000000107a00877
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!BeginPaint 0000000076a51361 5 bytes JMP 0000000107a00807
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetMessagePos 0000000076a52a8d 5 bytes JMP 00000001079fd853
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetCapture 0000000076a52aac 5 bytes JMP 00000001079fd9b3
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetDCEx 0000000076a53391 5 bytes JMP 0000000107a008b7
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!RegisterClassA 0000000076a5434b 5 bytes JMP 00000001079f571d
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!PeekMessageA 0000000076a55f74 5 bytes JMP 00000001079fdacd
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetUpdateRgn 0000000076a56222 5 bytes JMP 0000000107a00a63
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!CallWindowProcA 0000000076a5792f 5 bytes JMP 00000001079f564b
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!DefFrameProcA 0000000076a57fbb 5 bytes JMP 00000001079f552d
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!DefMDIChildProcA 0000000076a5810c 5 bytes JMP 00000001079f55bc
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!DefFrameProcW 0000000076a585c1 5 bytes JMP 00000001079f54e4
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!DefMDIChildProcW 0000000076a586b4 5 bytes JMP 00000001079f5576
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetUpdateRect 0000000076a6d41f 5 bytes JMP 0000000107a009d0
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!ReleaseCapture 0000000076a6ed49 5 bytes JMP 00000001079fd963
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!SetCapture 0000000076a6ed56 5 bytes JMP 00000001079fd909
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!SwitchDesktop 0000000076a89854 5 bytes JMP 00000001079f53ae
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!SetCursorPos 0000000076a89cfd 5 bytes JMP 00000001079fd8cc
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!GetClipboardData 0000000076a89f1d 5 bytes JMP 00000001079ffa85
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\USER32.dll!OpenInputDesktop 0000000076aa87cb 5 bytes JMP 00000001079f535e
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WS2_32.dll!closesocket 00000000768c3918 5 bytes JMP 00000001079ffebd
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WS2_32.dll!WSASend 00000000768c4406 5 bytes JMP 00000001079fff16
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WS2_32.dll!send 00000000768c6f01 5 bytes JMP 00000001079ffef5
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!InternetReadFileExA 0000000077128af0 5 bytes JMP 0000000107a0a437
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!HttpSendRequestExW 000000007712a4a2 5 bytes JMP 0000000107a0a27d
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!InternetCloseHandle 0000000077187549 5 bytes JMP 0000000107a0a3b5
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!HttpQueryInfoA 0000000077188b52 5 bytes JMP 0000000107a0a4ad
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!InternetReadFile 00000000771941f7 5 bytes JMP 0000000107a0a3f8
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!InternetQueryDataAvailable 0000000077195d88 5 bytes JMP 0000000107a0a481
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!HttpSendRequestW 0000000077196570 5 bytes JMP 0000000107a0a1d5
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!HttpSendRequestA 00000000771a9b82 5 bytes JMP 0000000107a0a229
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\WININET.dll!HttpSendRequestExA 0000000077217f39 5 bytes JMP 0000000107a0a319
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe[2168] C:\Windows\syswow64\Crypt32.DLL!PFXImportCertStore 0000000076bc18b8 5 bytes JMP 0000000107a0c8ed
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!NtCreateUserProcess 00000000776f091c 5 bytes JMP 00000001001d5945
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_W 000000007770261d 5 bytes JMP 00000001001d53cc
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007770c4dd 5 bytes JMP 00000001001d5a6e
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_A 0000000077712ad3 5 bytes JMP 00000001001d5412
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_W 0000000077734168 5 bytes JMP 00000001001d5458
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_A 000000007773e695 5 bytes JMP 00000001001d549e
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\kernel32.dll!GetFileAttributesExW 0000000076d8453c 5 bytes JMP 00000001001d5b0e
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\ws2_32.dll!closesocket 00000000768c3918 5 bytes JMP 00000001001dfebd
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\ws2_32.dll!WSASend 00000000768c4406 5 bytes JMP 00000001001dff16
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\ws2_32.dll!send 00000000768c6f01 5 bytes JMP 00000001001dfef5
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetDC 0000000076a472c4 5 bytes JMP 00000001001e0912
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!ReleaseDC 0000000076a47446 5 bytes JMP 00000001001e0990
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!TranslateMessage 0000000076a47809 5 bytes JMP 00000001001df91f
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetMessageW 0000000076a478e2 5 bytes JMP 00000001001dda52
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetMessageA 0000000076a47bd3 5 bytes JMP 00000001001dda7a
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetWindowDC 0000000076a48048 5 bytes JMP 00000001001e0951
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!RegisterClassW 0000000076a48a65 5 bytes JMP 00000001001d56d0
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!RegisterClassExW 0000000076a4b17d 5 bytes JMP 00000001001d576a
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!RegisterClassExA 0000000076a4db98 5 bytes JMP 00000001001d57bc
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!PeekMessageW 0000000076a505ba 5 bytes JMP 00000001001ddaa2
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!CallWindowProcW 0000000076a50d32 5 bytes JMP 00000001001d5602
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetCursorPos 0000000076a51218 5 bytes JMP 00000001001dd885
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!EndPaint 0000000076a51341 5 bytes JMP 00000001001e0877
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!BeginPaint 0000000076a51361 5 bytes JMP 00000001001e0807
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetMessagePos 0000000076a52a8d 5 bytes JMP 00000001001dd853
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetCapture 0000000076a52aac 5 bytes JMP 00000001001dd9b3
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetDCEx 0000000076a53391 5 bytes JMP 00000001001e08b7
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!RegisterClassA 0000000076a5434b 5 bytes JMP 00000001001d571d
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!PeekMessageA 0000000076a55f74 5 bytes JMP 00000001001ddacd
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetUpdateRgn 0000000076a56222 5 bytes JMP 00000001001e0a63
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!CallWindowProcA 0000000076a5792f 5 bytes JMP 00000001001d564b
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!DefFrameProcA 0000000076a57fbb 5 bytes JMP 00000001001d552d
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!DefMDIChildProcA 0000000076a5810c 5 bytes JMP 00000001001d55bc
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!DefFrameProcW 0000000076a585c1 5 bytes JMP 00000001001d54e4
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!DefMDIChildProcW 0000000076a586b4 5 bytes JMP 00000001001d5576
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetUpdateRect 0000000076a6d41f 5 bytes JMP 00000001001e09d0
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!ReleaseCapture 0000000076a6ed49 5 bytes JMP 00000001001dd963
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!SetCapture 0000000076a6ed56 5 bytes JMP 00000001001dd909
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!SwitchDesktop 0000000076a89854 5 bytes JMP 00000001001d53ae
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!SetCursorPos 0000000076a89cfd 5 bytes JMP 00000001001dd8cc
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!GetClipboardData 0000000076a89f1d 5 bytes JMP 00000001001dfa85
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\user32.dll!OpenInputDesktop 0000000076aa87cb 5 bytes JMP 00000001001d535e
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\CRYPT32.dll!PFXImportCertStore 0000000076bc18b8 5 bytes JMP 00000001001ec8ed
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!InternetReadFileExA 0000000077128af0 5 bytes JMP 00000001001ea437
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!HttpSendRequestExW 000000007712a4a2 5 bytes JMP 00000001001ea27d
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!InternetCloseHandle 0000000077187549 5 bytes JMP 00000001001ea3b5
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!HttpQueryInfoA 0000000077188b52 5 bytes JMP 00000001001ea4ad
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!InternetReadFile 00000000771941f7 5 bytes JMP 00000001001ea3f8
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!InternetQueryDataAvailable 0000000077195d88 5 bytes JMP 00000001001ea481
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!HttpSendRequestW 0000000077196570 5 bytes JMP 00000001001ea1d5
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!HttpSendRequestA 00000000771a9b82 5 bytes JMP 00000001001ea229
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\WININET.dll!HttpSendRequestExA 0000000077217f39 5 bytes JMP 00000001001ea319
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Windows\syswow64\svchost.exe[3064] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text C:\Windows\SysWOW64\svchost.exe[4292] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Windows\SysWOW64\svchost.exe[4292] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!NtCreateUserProcess 00000000776f091c 5 bytes JMP 0000000100ee5945
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_W 000000007770261d 5 bytes JMP 0000000100ee53cc
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007770c4dd 5 bytes JMP 0000000100ee5a6e
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!NtdllDefWindowProc_A 0000000077712ad3 5 bytes JMP 0000000100ee5412
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_W 0000000077734168 5 bytes JMP 0000000100ee5458
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\SysWOW64\ntdll.dll!NtdllDialogWndProc_A 000000007773e695 5 bytes JMP 0000000100ee549e
.text D:\Programme\PSUAMain.exe[5812] C:\Windows\syswow64\kernel32.dll!GetFileAttributesExW 0000000076d8453c 5 bytes JMP 0000000100ee5b0e
.text C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe[5156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075601465 2 bytes [60, 75]
.text C:\Program Files (x86)\Panda Security\Panda Devices Agent\AgentSvc.exe[5156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756014bb 2 bytes [60, 75]
.text ... * 2
---- Threads - GMER 2.1 ----
Thread C:\Windows\System32\svchost.exe [2068:4244] 000007fee7f89688
---- Processes - GMER 2.1 ----
Library C:\Users\Marcel\AppData\Roaming\Dropbox\bin\wxmsw28uh_vc.dll (*** suspicious ***) @ C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe [2168](2014-01-03 01:09:26) 0000000004100000
Library c:\users\marcel\appdata\local\temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpuenwy0.dll (*** suspicious ***) @ C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe [2168](2014-07-07 20:23:03) 00000000026c0000
Library C:\Users\Marcel\AppData\Roaming\Dropbox\bin\libcef.dll (*** suspicious ***) @ C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe [2168](2013-08-23 19:01:44) 000000006e9e0000
Library C:\Users\Marcel\AppData\Roaming\Dropbox\bin\icudt.dll (*** suspicious ***) @ C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe [2168] (ICU Data DLL/The ICU Project)(2013-08-23 19:01:42) 000000006e050000
---- EOF - GMER 2.1 ---- FRST:
FRST Logfile:
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 05-07-2014 01
Ran by Marcel (administrator) on MARCEL-PC on 07-07-2014 22:39:44
Running from C:\Users\Marcel\Downloads
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: Deutsch (Deutschland)
Internet Explorer Version 11
Boot Mode: Normal
==================== Processes (Whitelisted) =================
(AMD) C:\Windows\System32\atiesrxx.exe
(Cherished Technololgy LIMITED) C:\ProgramData\IePluginService\PluginService.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Cherished Technololgy LIMITED) C:\ProgramData\IePluginServices\PluginService.exe
(Cherished Technololgy LIMITED) C:\ProgramData\WPM\wprotectmanager.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Acer Incorporated) C:\Program Files\Acer\Acer Updater\UpdaterService.exe
() C:\Windows\SysWOW64\PnkBstrA.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Akamai Technologies, Inc.) C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe
(Akamai Technologies, Inc.) C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe
(Dropbox, Inc.) C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe
(Microsoft Corporation) C:\Windows\SysWOW64\svchost.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Microsoft Corporation) C:\Windows\SysWOW64\svchost.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
(ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
() C:\Users\Marcel\Downloads\PandaCloud301Antivirus (1).exe
(Panda Security, S.L.) C:\Users\Marcel\AppData\Local\Temp\RarSFX0\StubInstaller.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [11580520 2010-11-11] (Realtek Semiconductor)
HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [343168 2012-01-20] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKU\.DEFAULT\...\RunOnce: [IsMyWinLockerReboot] - msiexec.exe /qn /x{voidguid}
HKU\S-1-5-19\...\RunOnce: [IsMyWinLockerReboot] - msiexec.exe /qn /x{voidguid}
HKU\S-1-5-20\...\RunOnce: [IsMyWinLockerReboot] - msiexec.exe /qn /x{voidguid}
HKU\S-1-5-21-1912227016-3206441769-1861265668-1000\...\Run: [Akamai NetSession Interface] => C:\Users\Marcel\AppData\Local\Akamai\netsession_win.exe [4672920 2014-04-17] (Akamai Technologies, Inc.)
HKU\S-1-5-21-1912227016-3206441769-1861265668-1000\...\Run: [wqswdw] => C:\Users\Marcel\AppData\Roaming\help.exe [55632 2010-11-21] (Microsoft Corporation)
HKU\S-1-5-21-1912227016-3206441769-1861265668-1000\...\Run: [{7521DEA2-4614-5CE4-3A04-0D4D709033E6}] => C:\Users\Marcel\AppData\Roaming\Viory\gaun.exe [13217792 2013-06-07] ()
HKU\S-1-5-21-1912227016-3206441769-1861265668-1000\...\CurrentVersion\Windows: [Load] C:\Users\Marcel\LOCALS~1\Temp\msacnzaip.pif <===== ATTENTION
Startup: C:\Users\Marcel\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk
ShortcutTarget: Dropbox.lnk -> C:\Users\Marcel\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.)
ShellIconOverlayIdentifiers: DropboxExt1 -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers: DropboxExt2 -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers: DropboxExt3 -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers: DropboxExt4 -> {FB314EDC-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers-x32: DropboxExt1 -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers-x32: DropboxExt2 -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => No File
ShellIconOverlayIdentifiers-x32: DropboxExt3 -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => No File
GroupPolicy: Group Policy on Chrome detected <======= ATTENTION
==================== Internet (Whitelisted) ====================
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://feed.snapdo.com/?publisher=SnapdoOpenCandy&dpid=SnapdoOpenCandy&co=TJ&userid=ee52b741-83e0-46e1-9f4d-29ed19886cf7&searchtype=ds&q={searchTerms}&installDate=01/01/1970
HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = hxxp://feed.snapdo.com/?publisher=SnapdoOpenCandy&dpid=SnapdoOpenCandy&co=TJ&userid=ee52b741-83e0-46e1-9f4d-29ed19886cf7&searchtype=ds&q={searchTerms}&installDate=01/01/1970
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
StartMenuInternet: IEXPLORE.EXE - C:\Program Files\Internet Explorer\iexplore.exe hxxp://istart.webssearches.com/?type=sc&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
SearchScopes: HKLM - DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
SearchScopes: HKLM - {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
SearchScopes: HKLM-x32 - DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
SearchScopes: HKLM-x32 - {006ee092-9658-4fd6-bd8e-a21a348e59f5} URL = hxxp://feed.snap.do/?publisher=SnapdoOpenCandy&dpid=SnapdoOpenCandy&co=DE&userid=ee52b741-83e0-46e1-9f4d-29ed19886cf7&searchtype=ds&q={searchTerms}
SearchScopes: HKLM-x32 - {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://istart.webssearches.com/web/?type=ds&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
SearchScopes: HKLM-x32 - {BB74DE59-BC4C-4172-9AC4-73315F71CFFE} URL = hxxp://websearch.helpmefindyour.info/?l=1&q={searchTerms}&pid=356&r=2013/04/16&hid=2062456118&lg=EN&cc=DE
SearchScopes: HKCU - DefaultScope {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://search.delta-homes.com/web/?type=ds&ts=1402637522&from=wpm0612&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
SearchScopes: HKCU - {006ee092-9658-4fd6-bd8e-a21a348e59f5} URL = hxxp://feed.snapdo.com/?publisher=SnapdoOpenCandy&dpid=SnapdoOpenCandy&co=TJ&userid=ee52b741-83e0-46e1-9f4d-29ed19886cf7&searchtype=ds&q={searchTerms}&installDate=01/01/1970
SearchScopes: HKCU - {33BB0A4E-99AF-4226-BDF6-49120163DE86} URL = hxxp://search.delta-homes.com/web/?type=ds&ts=1402637522&from=wpm0612&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922&q={searchTerms}
BHO: No Name - {11111111-1111-1111-1111-110511311172} - No File
BHO: No Name - {11111111-1111-1111-1111-110511421146} - No File
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies)
Tcpip\Parameters: [DhcpNameServer] 192.168.0.1
FireFox:
========
FF ProfilePath: C:\Users\Marcel\AppData\Roaming\Mozilla\Firefox\Profiles\ix8kzwxi.default
FF NewTab: hxxp://istart.webssearches.com/newtab/?type=nt&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
FF DefaultSearchEngine: webssearches
FF SearchEngineOrder.user_pref("browser.search.order.1", "");: user_pref("browser.search.order.1", "");
FF SearchEngineOrder.user_pref("browser.search.order.1,S", "");: user_pref("browser.search.order.1,S", "");
FF SelectedSearchEngine: webssearches
FF Homepage: hxxp://istart.webssearches.com/?type=hp&ts=1397146050&from=tugs&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
FF Keyword.URL: hxxp://feed.snapdo.com/?publisher=SnapdoOpenCandy&dpid=SnapdoOpenCandy&co=TJ&userid=ee52b741-83e0-46e1-9f4d-29ed19886cf7&searchtype=ds&installDate=01/01/1970&q=
FF NetworkProxy: "http", "www-proxy.t-online.de"
FF NetworkProxy: "http_port", 80
FF NetworkProxy: "share_proxy_settings", true
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_214.dll ()
FF Plugin: @java.com/DTPlugin,version=10.9.2 - C:\Windows\system32\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.9.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_214.dll ()
FF Plugin-x32: @adobe.com/ShockwavePlayer - C:\Windows\system32\Adobe\Director\np32dsw.dll No File
FF Plugin-x32: @Apple.com/iTunes,version=1.0 - D:\Programme\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.51.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks)
FF Plugin-x32: @tools.google.com/Google Update;version=3 - C:\Program Files (x86)\Google\Update\1.3.22.5\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 - C:\Program Files (x86)\Google\Update\1.3.22.5\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF Plugin HKCU: @unity3d.com/UnityPlayer,version=1.0 - C:\Users\Marcel\AppData\LocalLow\Unity\WebPlayer\loader\npUnity3D32.dll (Unity Technologies ApS)
FF Plugin HKCU: pandonetworks.com/PandoWebPlugin - C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks)
FF user.js: detected! => C:\Users\Marcel\AppData\Roaming\Mozilla\Firefox\Profiles\ix8kzwxi.default\user.js
FF SearchPlugin: C:\Users\Marcel\AppData\Roaming\Mozilla\Firefox\Profiles\ix8kzwxi.default\searchplugins\Web Search.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\webssearches.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: No Name - C:\Users\Marcel\AppData\Roaming\Mozilla\Firefox\Profiles\ix8kzwxi.default\Extensions\staged [2014-05-21]
FF HKLM-x32\...\Firefox\Extensions: [quick_start@gmail.com] - C:\Users\Marcel\AppData\Roaming\Mozilla\Firefox\Profiles\ix8kzwxi.default\extensions\quick_start@gmail.com
Chrome:
=======
CHR StartupUrls: "hxxp://google.de/"
CHR Extension: (UeTAdREmovalApp) - C:\Users\Marcel\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebcfhbpljkfobkefihkfgfaliepdkbhl [2014-07-07]
CHR HKLM-x32\...\Chrome\Extension: [fgnippahjheicjenccifemomfgjofdhp] - C:\ProgramData\TheBflix\fgnippahjheicjenccifemomfgjofdhp.crx [2012-04-20]
CHR StartMenuInternet: Google Chrome - C:\Program Files (x86)\Google\Chrome\Application\chrome.exe hxxp://www.delta-homes.com/?type=sc&ts=1402637522&from=wpm0612&uid=WDCXWD20EARX-22PASB0_WD-WMAZA660592205922
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
==================== Services (Whitelisted) =================
R2 IePluginService; C:\ProgramData\IePluginService\PluginService.exe [705136 2014-04-11] (Cherished Technololgy LIMITED)
R2 IePluginServices; C:\ProgramData\IePluginServices\PluginService.exe [761968 2014-06-12] (Cherished Technololgy LIMITED)
R2 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [76888 2012-12-08] ()
R2 Wpm; C:\ProgramData\WPM\wprotectmanager.exe [540304 2014-06-11] (Cherished Technololgy LIMITED)
S3 BrYNSvc; "C:\Program Files (x86)\Browny02\BrYNSvc.exe" [X]
==================== Drivers (Whitelisted) ====================
R1 dtsoftbus01; C:\Windows\System32\DRIVERS\dtsoftbus01.sys [283200 2013-03-06] (DT Soft Ltd)
R1 LUMDriver; C:\Windows\system32\drivers\LUMDriver.sys [24848 2008-01-02] (IBM)
S3 Netaapl; C:\Windows\System32\DRIVERS\netaapl64.sys [22528 2011-08-02] (Apple Inc.) [File not signed]
S3 massfilter; system32\drivers\massfilter.sys [X]
S3 X6va009; \??\C:\Windows\SysWOW64\Drivers\X6va009 [X]
S3 ZTEusbmdm6k; system32\DRIVERS\ZTEusbmdm6k.sys [X]
S3 ZTEusbnmea; system32\DRIVERS\ZTEusbnmea.sys [X]
S3 ZTEusbser6k; system32\DRIVERS\ZTEusbser6k.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-07-07 22:39 - 2014-07-07 22:40 - 00017647 _____ () C:\Users\Marcel\Downloads\FRST.txt
2014-07-07 22:39 - 2014-07-07 22:39 - 07031360 _____ (383 Media, Inc.) C:\Users\Marcel\Downloads\DriverRestore.exe
2014-07-07 22:39 - 2014-07-07 22:39 - 02084352 _____ (Farbar) C:\Users\Marcel\Downloads\FRST64.exe
2014-07-07 22:39 - 2014-07-07 22:39 - 00000000 ____D () C:\FRST
2014-07-07 22:38 - 2014-07-07 22:38 - 00000474 _____ () C:\Users\Marcel\Downloads\defogger_disable.log
2014-07-07 22:38 - 2014-07-07 22:38 - 00000000 _____ () C:\Users\Marcel\defogger_reenable
2014-07-07 22:37 - 2014-07-07 22:37 - 00050477 _____ () C:\Users\Marcel\Downloads\Defogger.exe
2014-07-07 22:28 - 2014-07-07 22:29 - 01369712 _____ () C:\Users\Marcel\Downloads\PandaCloud301Antivirus (1).exe
2014-07-07 22:16 - 2014-07-07 22:16 - 01010424 _____ () C:\Users\Marcel\Downloads\setup (1).exe
2014-07-07 22:13 - 2014-07-07 22:13 - 00068640 _____ () C:\Users\Marcel\AppData\Local\GDIPFONTCACHEV1.DAT
2014-07-07 22:11 - 2014-07-07 22:22 - 00000112 _____ () C:\Windows\setupact.log
2014-07-07 22:11 - 2014-07-07 22:11 - 00000000 _____ () C:\Windows\setuperr.log
2014-07-07 22:10 - 2014-07-07 22:11 - 02875128 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-07-07 22:10 - 2014-07-07 22:10 - 00002682 _____ () C:\Windows\PFRO.log
2014-07-07 22:08 - 2014-07-07 22:08 - 01369712 _____ () C:\Users\Marcel\Downloads\PandaCloud301Antivirus.exe
2014-07-07 21:53 - 2014-07-07 21:53 - 00000000 ____D () C:\Program Files (x86)\predm
2014-07-05 14:29 - 2014-07-07 21:56 - 00000000 ____D () C:\Users\Marcel\AppData\Local\side_07051229
2014-07-05 14:29 - 2014-07-05 14:29 - 00000266 _____ () C:\Users\Marcel\AppData\Local\dsbqi.bat
2014-07-05 14:29 - 2014-07-05 14:29 - 00000000 ____D () C:\Users\Marcel\AppData\Local\JFileManager
2014-07-03 14:46 - 2014-07-07 22:10 - 00000000 ____D () C:\ProgramData\SaVeoLots
2014-06-19 20:37 - 2014-06-19 20:37 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\Unity
2014-06-19 20:36 - 2014-06-19 20:36 - 00000000 ____D () C:\Users\Marcel\AppData\Local\Unity
2014-06-15 16:52 - 2014-07-07 22:08 - 00086742 _____ () C:\Users\Marcel\AppData\Roaming\svchost
2014-06-14 18:31 - 2014-07-07 22:10 - 00000000 ____D () C:\ProgramData\MianiMUmPPriice
2014-06-13 07:32 - 2014-07-07 21:51 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\337Games
2014-06-13 07:32 - 2014-06-13 07:33 - 00000000 ____D () C:\ProgramData\IePluginServices
2014-06-11 12:22 - 2014-05-30 12:21 - 23414784 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-06-11 12:22 - 2014-05-30 12:02 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-06-11 12:22 - 2014-05-30 12:02 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-06-11 12:22 - 2014-05-30 11:45 - 02768384 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-06-11 12:22 - 2014-05-30 11:39 - 00548352 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-06-11 12:22 - 2014-05-30 11:39 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-06-11 12:22 - 2014-05-30 11:38 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-06-11 12:22 - 2014-05-30 11:28 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-06-11 12:22 - 2014-05-30 11:27 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-06-11 12:22 - 2014-05-30 11:24 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-06-11 12:22 - 2014-05-30 11:21 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-06-11 12:22 - 2014-05-30 11:21 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-06-11 12:22 - 2014-05-30 11:20 - 00752640 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-06-11 12:22 - 2014-05-30 11:18 - 17271296 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-06-11 12:22 - 2014-05-30 11:11 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-06-11 12:22 - 2014-05-30 11:08 - 05782528 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-06-11 12:22 - 2014-05-30 11:06 - 00452096 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-06-11 12:22 - 2014-05-30 11:02 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-06-11 12:22 - 2014-05-30 10:55 - 00038400 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-06-11 12:22 - 2014-05-30 10:49 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-06-11 12:22 - 2014-05-30 10:46 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-06-11 12:22 - 2014-05-30 10:44 - 00455168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2014-06-11 12:22 - 2014-05-30 10:44 - 00295424 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-06-11 12:22 - 2014-05-30 10:43 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-06-11 12:22 - 2014-05-30 10:42 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-06-11 12:22 - 2014-05-30 10:38 - 02179072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-06-11 12:22 - 2014-05-30 10:35 - 00608768 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-06-11 12:22 - 2014-05-30 10:34 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-06-11 12:22 - 2014-05-30 10:33 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-06-11 12:22 - 2014-05-30 10:30 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-06-11 12:22 - 2014-05-30 10:29 - 00631808 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-06-11 12:22 - 2014-05-30 10:28 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-06-11 12:22 - 2014-05-30 10:27 - 00592896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-06-11 12:22 - 2014-05-30 10:24 - 01249280 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2014-06-11 12:22 - 2014-05-30 10:23 - 02040832 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-06-11 12:22 - 2014-05-30 10:16 - 00368128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2014-06-11 12:22 - 2014-05-30 10:10 - 00032256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2014-06-11 12:22 - 2014-05-30 10:06 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-06-11 12:22 - 2014-05-30 10:04 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-06-11 12:22 - 2014-05-30 10:02 - 00242688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2014-06-11 12:22 - 2014-05-30 09:56 - 04244992 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-06-11 12:22 - 2014-05-30 09:56 - 02266112 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-06-11 12:22 - 2014-05-30 09:54 - 00526336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-06-11 12:22 - 2014-05-30 09:50 - 01068032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll
2014-06-11 12:22 - 2014-05-30 09:49 - 01964544 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-06-11 12:22 - 2014-05-30 09:43 - 13522944 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-06-11 12:22 - 2014-05-30 09:40 - 11725312 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-06-11 12:22 - 2014-05-30 09:30 - 01398272 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-06-11 12:22 - 2014-05-30 09:21 - 01790976 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-06-11 12:22 - 2014-05-30 09:15 - 01143296 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-06-11 12:22 - 2014-05-30 09:13 - 00846336 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-06-11 12:22 - 2014-05-30 09:13 - 00704512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-06-11 12:22 - 2014-04-25 04:34 - 00801280 _____ (Microsoft Corporation) C:\Windows\system32\usp10.dll
2014-06-11 12:22 - 2014-04-25 04:06 - 00626688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\usp10.dll
2014-06-11 12:22 - 2014-04-05 04:47 - 01903552 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\tcpip.sys
2014-06-11 12:22 - 2014-04-05 04:47 - 00288192 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\FWPKCLNT.SYS
2014-06-11 12:22 - 2014-03-26 16:44 - 02002432 _____ (Microsoft Corporation) C:\Windows\system32\msxml6.dll
2014-06-11 12:22 - 2014-03-26 16:44 - 01882112 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-06-11 12:22 - 2014-03-26 16:41 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\msxml6r.dll
2014-06-11 12:22 - 2014-03-26 16:41 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\msxml3r.dll
2014-06-11 12:22 - 2014-03-26 16:27 - 01389056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml6.dll
2014-06-11 12:22 - 2014-03-26 16:27 - 01237504 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml3.dll
2014-06-11 12:22 - 2014-03-26 16:25 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml6r.dll
2014-06-11 12:22 - 2014-03-26 16:25 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msxml3r.dll
2014-06-11 12:21 - 2014-06-08 11:13 - 00506368 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-06-11 12:21 - 2014-06-08 11:08 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
==================== One Month Modified Files and Folders =======
2014-07-07 22:40 - 2014-07-07 22:39 - 00017647 _____ () C:\Users\Marcel\Downloads\FRST.txt
2014-07-07 22:39 - 2014-07-07 22:39 - 07031360 _____ (383 Media, Inc.) C:\Users\Marcel\Downloads\DriverRestore.exe
2014-07-07 22:39 - 2014-07-07 22:39 - 02084352 _____ (Farbar) C:\Users\Marcel\Downloads\FRST64.exe
2014-07-07 22:39 - 2014-07-07 22:39 - 00000000 ____D () C:\FRST
2014-07-07 22:39 - 2013-06-23 20:01 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\tor
2014-07-07 22:38 - 2014-07-07 22:38 - 00000474 _____ () C:\Users\Marcel\Downloads\defogger_disable.log
2014-07-07 22:38 - 2014-07-07 22:38 - 00000000 _____ () C:\Users\Marcel\defogger_reenable
2014-07-07 22:38 - 2012-04-12 17:07 - 00000000 ____D () C:\Users\Marcel
2014-07-07 22:37 - 2014-07-07 22:37 - 00050477 _____ () C:\Users\Marcel\Downloads\Defogger.exe
2014-07-07 22:31 - 2009-07-14 06:45 - 00016752 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-07-07 22:31 - 2009-07-14 06:45 - 00016752 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-07-07 22:29 - 2014-07-07 22:28 - 01369712 _____ () C:\Users\Marcel\Downloads\PandaCloud301Antivirus (1).exe
2014-07-07 22:27 - 2012-12-14 19:07 - 02002748 _____ () C:\Windows\WindowsUpdate.log
2014-07-07 22:27 - 2012-04-13 02:13 - 02265982 _____ () C:\Windows\system32\perfh007.dat
2014-07-07 22:27 - 2012-04-13 02:13 - 00637622 _____ () C:\Windows\system32\perfc007.dat
2014-07-07 22:27 - 2009-07-14 07:13 - 00006690 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-07-07 22:23 - 2014-05-05 12:11 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\DropboxMaster
2014-07-07 22:23 - 2012-10-17 23:24 - 00000000 ___RD () C:\Users\Marcel\Dropbox
2014-07-07 22:23 - 2012-10-17 23:23 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\Dropbox
2014-07-07 22:22 - 2014-07-07 22:11 - 00000112 _____ () C:\Windows\setupact.log
2014-07-07 22:22 - 2012-11-20 01:40 - 00065536 _____ () C:\Windows\system32\Ikeext.etl
2014-07-07 22:22 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-07-07 22:22 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\tracing
2014-07-07 22:16 - 2014-07-07 22:16 - 01010424 _____ () C:\Users\Marcel\Downloads\setup (1).exe
2014-07-07 22:13 - 2014-07-07 22:13 - 00068640 _____ () C:\Users\Marcel\AppData\Local\GDIPFONTCACHEV1.DAT
2014-07-07 22:11 - 2014-07-07 22:11 - 00000000 _____ () C:\Windows\setuperr.log
2014-07-07 22:11 - 2014-07-07 22:10 - 02875128 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-07-07 22:10 - 2014-07-07 22:10 - 00002682 _____ () C:\Windows\PFRO.log
2014-07-07 22:10 - 2014-07-03 14:46 - 00000000 ____D () C:\ProgramData\SaVeoLots
2014-07-07 22:10 - 2014-06-14 18:31 - 00000000 ____D () C:\ProgramData\MianiMUmPPriice
2014-07-07 22:10 - 2014-05-23 20:35 - 00000000 ____D () C:\ProgramData\ShoppDrop
2014-07-07 22:08 - 2014-07-07 22:08 - 01369712 _____ () C:\Users\Marcel\Downloads\PandaCloud301Antivirus.exe
2014-07-07 22:08 - 2014-06-15 16:52 - 00086742 _____ () C:\Users\Marcel\AppData\Roaming\svchost
2014-07-07 22:08 - 2012-04-12 17:21 - 00000000 ____D () C:\ProgramData\Panda Security
2014-07-07 22:05 - 2013-03-06 16:51 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DAEMON Tools Pro
2014-07-07 21:56 - 2014-07-05 14:29 - 00000000 ____D () C:\Users\Marcel\AppData\Local\side_07051229
2014-07-07 21:55 - 2014-06-06 16:22 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\DVDVideoSoft
2014-07-07 21:55 - 2014-02-13 21:15 - 00000000 ____D () C:\ProgramData\f1ab4f6828398a92
2014-07-07 21:53 - 2014-07-07 21:53 - 00000000 ____D () C:\Program Files (x86)\predm
2014-07-07 21:51 - 2014-06-13 07:32 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\337Games
2014-07-05 14:29 - 2014-07-05 14:29 - 00000266 _____ () C:\Users\Marcel\AppData\Local\dsbqi.bat
2014-07-05 14:29 - 2014-07-05 14:29 - 00000000 ____D () C:\Users\Marcel\AppData\Local\JFileManager
2014-07-01 12:57 - 2012-07-21 23:02 - 00000000 ____D () C:\Users\Marcel\AppData\Local\PMB Files
2014-06-29 13:11 - 2012-04-12 17:35 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\UseNeXT
2014-06-25 21:51 - 2012-08-18 18:08 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\Spotify
2014-06-25 16:29 - 2012-08-18 18:08 - 00000000 ____D () C:\Users\Marcel\AppData\Local\Spotify
2014-06-20 16:09 - 2014-04-06 00:12 - 00000000 ____D () C:\Program Files (x86)\Battle.net
2014-06-20 16:08 - 2014-04-06 00:13 - 00000000 ____D () C:\Users\Marcel\AppData\Local\Battle.net
2014-06-19 20:37 - 2014-06-19 20:37 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\Unity
2014-06-19 20:36 - 2014-06-19 20:36 - 00000000 ____D () C:\Users\Marcel\AppData\Local\Unity
2014-06-14 19:57 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\rescache
2014-06-13 07:33 - 2014-06-13 07:32 - 00000000 ____D () C:\ProgramData\IePluginServices
2014-06-13 07:32 - 2014-04-10 18:08 - 00000000 ____D () C:\ProgramData\WPM
2014-06-13 07:32 - 2012-04-12 17:10 - 00001647 _____ () C:\Users\Marcel\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
2014-06-11 16:50 - 2013-08-14 23:30 - 00000000 ____D () C:\Windows\system32\MRT
2014-06-11 16:49 - 2012-04-17 08:03 - 95414520 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-06-11 16:48 - 2014-05-06 16:12 - 00000000 ___SD () C:\Windows\system32\CompatTel
2014-06-11 16:47 - 2012-04-12 17:25 - 00000000 ____D () C:\Users\Marcel\AppData\Roaming\Skype
2014-06-08 11:13 - 2014-06-11 12:21 - 00506368 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-06-08 11:08 - 2014-06-11 12:21 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
Some content of TEMP:
====================
C:\Users\Marcel\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpuenwy0.dll
==================== Bamital & volsnap Check =================
C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed
LastRegBack: 2014-06-24 18:50
==================== End Of Log ============================ --- --- ---
--- --- --- |