Hier noch das Logfile von GMER. Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-12-21 19:24:58
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 WDC_WD1001FALS-00E8B0 rev.05.00K05 931,51GB
Running: Gmer-19357.exe; Driver: C:\Users\Sorgend\AppData\Local\Temp\pwtdypob.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 528 fffff80003e04000 54 bytes [89, 07, 41, FF, 84, 24, 30, ...]
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 584 fffff80003e04038 7 bytes [63, 60, 00, FB, 81, FE, 42]
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000771d1510 6 bytes {JMP QWORD [RIP+0x8f6eb20]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000771d15e0 6 bytes {JMP QWORD [RIP+0x8faea50]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000771d1800 6 bytes {JMP QWORD [RIP+0x8f8e830]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 00000000771d18b0 6 bytes {JMP QWORD [RIP+0x8f2e780]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 00000000771d1e40 6 bytes {JMP QWORD [RIP+0x8f4e1f0]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771d27e0 6 bytes {JMP QWORD [RIP+0x8fcd850]}
.text C:\Windows\system32\Dwm.exe[3368] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 357 000007fefd269055 3 bytes [B5, 6F, 06]
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000771d1510 6 bytes {JMP QWORD [RIP+0x8f6eb20]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000771d15e0 6 bytes {JMP QWORD [RIP+0x8faea50]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000771d1800 6 bytes {JMP QWORD [RIP+0x8f8e830]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 00000000771d18b0 6 bytes {JMP QWORD [RIP+0x8f2e780]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 00000000771d1e40 6 bytes {JMP QWORD [RIP+0x8f4e1f0]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771d27e0 6 bytes {JMP QWORD [RIP+0x8fcd850]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 000000007707db80 6 bytes {JMP QWORD [RIP+0x91424b0]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 357 000007fefd269055 3 bytes CALL 9000027
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fef9ba7b34 6 bytes {JMP QWORD [RIP+0xc84fc]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fef9bb03c0 6 bytes {JMP QWORD [RIP+0xefc70]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007fefe723030 6 bytes {JMP QWORD [RIP+0x4fd000]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\WS2_32.dll!connect + 1 000007fefe7245c1 5 bytes JMP 0
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\WS2_32.dll!listen 000007fefe728290 6 bytes {JMP QWORD [RIP+0x4d7da0]}
.text C:\Windows\Explorer.EXE[3396] C:\Windows\system32\RASAPI32.dll!RasDialW + 1 000007fef8f196f5 5 bytes JMP 0
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes JMP 717b000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes JMP 717b000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 7175000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 7175000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7178000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7178000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes JMP 7181000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes JMP 7181000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [7D, 71]
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [71, 71]
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes JMP 716f000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes JMP 716f000a
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes {JMP QWORD [RIP+0x7183001e]}
.text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3612] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes {JMP QWORD [RIP+0x7186001e]}
.text C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe[3640] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes {JMP QWORD [RIP+0x7192001e]}
.text C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe[3640] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes {JMP QWORD [RIP+0x7195001e]}
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes [80, 71]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 717b000a
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 717b000a
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 717e000a
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 717e000a
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes [86, 71]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [83, 71]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [77, 71]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\HTC\HTC Sync 3.0\htcUPCTLoader.exe[3676] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [74, 71]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes JMP 7184000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes JMP 7184000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 717e000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 717e000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7181000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7181000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes JMP 718a000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes JMP 718a000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [86, 71]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [7A, 71]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [77, 71]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 493 0000000075072c9e 4 bytes CALL 71af0000
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075699679 6 bytes JMP 7199000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!PostMessageW 00000000756a12a5 6 bytes JMP 7193000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!PostMessageA 00000000756a3baa 6 bytes JMP 7196000a
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!SendMessageA 00000000756a612e 6 bytes {JMP QWORD [RIP+0x719b001e]}
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!SendInput 00000000756bff4a 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!SendInput + 4 00000000756bff4e 2 bytes [9E, 71]
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!mouse_event 00000000756f027b 6 bytes {JMP QWORD [RIP+0x71a4001e]}
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\USER32.dll!keybd_event 00000000756f02bf 6 bytes {JMP QWORD [RIP+0x71a1001e]}
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes {JMP QWORD [RIP+0x718c001e]}
.text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3708] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes {JMP QWORD [RIP+0x718f001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes [15, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 7110000a
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 7110000a
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7113000a
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7113000a
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes [1B, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [18, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [0C, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [09, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075699679 6 bytes {JMP QWORD [RIP+0x712a001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!PostMessageW 00000000756a12a5 6 bytes {JMP QWORD [RIP+0x7124001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!PostMessageA 00000000756a3baa 6 bytes {JMP QWORD [RIP+0x7127001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!SendMessageA 00000000756a612e 6 bytes {JMP QWORD [RIP+0x712d001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!SendInput 00000000756bff4a 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!SendInput + 4 00000000756bff4e 2 bytes [30, 71]
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!mouse_event 00000000756f027b 6 bytes {JMP QWORD [RIP+0x719b001e]}
.text C:\Program Files (x86)\MyDrive Connect\MyDriveConnect.exe[3840] C:\Windows\syswow64\USER32.dll!keybd_event 00000000756f02bf 6 bytes {JMP QWORD [RIP+0x7133001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes JMP 718a000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes JMP 718a000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 7184000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 7184000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7187000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7187000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes JMP 7190000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes JMP 7190000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes JMP 718d000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes JMP 718d000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [80, 71]
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes JMP 717e000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes JMP 717e000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 493 0000000075072c9e 4 bytes CALL 71af0000
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075699679 6 bytes JMP 719f000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!PostMessageW 00000000756a12a5 6 bytes {JMP QWORD [RIP+0x7198001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!PostMessageA 00000000756a3baa 6 bytes JMP 719c000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!SendMessageA 00000000756a612e 6 bytes JMP 71a2000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!SendInput 00000000756bff4a 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!SendInput + 4 00000000756bff4e 2 bytes [A4, 71]
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!mouse_event 00000000756f027b 6 bytes {JMP QWORD [RIP+0x71aa001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\USER32.dll!keybd_event 00000000756f02bf 6 bytes {JMP QWORD [RIP+0x71a7001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes {JMP QWORD [RIP+0x7192001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes {JMP QWORD [RIP+0x7195001e]}
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\WS2_32.dll!WSALookupServiceBeginW 0000000074e3575a 6 bytes JMP 716f000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\WS2_32.dll!connect 0000000074e36bdd 6 bytes JMP 7175000a
.text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3848] C:\Windows\syswow64\WS2_32.dll!listen 0000000074e3b001 6 bytes JMP 7172000a
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes [7A, 71]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes [74, 71]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7178000a
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7178000a
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes [80, 71]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [7D, 71]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [71, 71]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe[3872] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [6E, 71]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes JMP 718a000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes JMP 718a000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 7184000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 7184000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7187000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7187000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes JMP 7190000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes JMP 7190000a
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [8C, 71]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [80, 71]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[3880] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [7D, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes [83, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes [7D, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7181000a
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7181000a
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes [89, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes [86, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes [7A, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes [FF, 25, 1E]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes [77, 71]
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes {JMP QWORD [RIP+0x718c001e]}
.text C:\Users\Sorgend\AppData\Roaming\SkypEmoticons\SE.exe[3888] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes {JMP QWORD [RIP+0x718f001e]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000771d1510 6 bytes {JMP QWORD [RIP+0x8f6eb20]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000771d15e0 6 bytes {JMP QWORD [RIP+0x8faea50]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000771d1800 6 bytes {JMP QWORD [RIP+0x8f8e830]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 00000000771d18b0 6 bytes {JMP QWORD [RIP+0x8f2e780]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 00000000771d1e40 6 bytes {JMP QWORD [RIP+0x8f4e1f0]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771d27e0 6 bytes {JMP QWORD [RIP+0x8fcd850]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 000000007707db80 6 bytes {JMP QWORD [RIP+0x91424b0]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 357 000007fefd269055 3 bytes [B5, 6F, 06]
.text C:\Windows\splwow64.exe[1268] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fef9ba7b34 6 bytes {JMP QWORD [RIP+0x884fc]}
.text C:\Windows\splwow64.exe[1268] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fef9bb03c0 6 bytes {JMP QWORD [RIP+0x9fc70]}
.text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[4996] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[4996] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007737fc20 3 bytes JMP 718a000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007737fc24 2 bytes JMP 718a000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007737fd64 3 bytes JMP 7184000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007737fd68 2 bytes JMP 7184000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 00000000773800b4 3 bytes JMP 7187000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 00000000773800b8 2 bytes JMP 7187000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 00000000773801c4 3 bytes JMP 7190000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 00000000773801c8 2 bytes JMP 7190000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077380a44 3 bytes JMP 718d000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077380a48 2 bytes JMP 718d000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077381920 3 bytes JMP 7181000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077381924 2 bytes JMP 7181000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000076953bbb 3 bytes JMP 717e000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000076953bbf 2 bytes JMP 717e000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 493 0000000075072c9e 4 bytes CALL 71af0000
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075699679 6 bytes JMP 719f000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!PostMessageW 00000000756a12a5 6 bytes JMP 7199000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!PostMessageA 00000000756a3baa 6 bytes JMP 719c000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!SendMessageA 00000000756a612e 6 bytes JMP 71a2000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!SendInput 00000000756bff4a 3 bytes JMP 71a5000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!SendInput + 4 00000000756bff4e 2 bytes JMP 71a5000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!mouse_event 00000000756f027b 6 bytes JMP 71ab000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\USER32.dll!keybd_event 00000000756f02bf 6 bytes JMP 71a8000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000757a70c4 6 bytes JMP 7193000a
.text C:\Users\Sorgend\Downloads\Gmer-19357.exe[5224] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000757c3264 6 bytes JMP 7196000a
---- Threads - GMER 2.1 ----
Thread C:\Windows\System32\svchost.exe [1512:4492] 000007fef7179688
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [2320:3824] 000007fef9472bf8
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\0026832c1d2e
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\0026832c1d2e (not active ControlSet)
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Joni\xb4s Ordner\spiele\7ZipSetup.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Joni\xb4s Ordner\spiele\sweetimsetup.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Joni\xb4s Ordner\spiele\iLividSetup.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Joni\xb4s Ordner\Schule\Solid Edge V17\Autorun.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\spiele\SteamSetup.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\spiele\steam\uninstall.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\TeamSpeak3-Client-win64-3.0.16.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\ts3\OverwolfTeamSpeakInstaller.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\spiele\SoftonicDownloader_fuer_happy-wheels.exe 1
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Sorgend\Documents\Laurin\xb4s Ordner\skype\SkypeSetupFull.exe 1
---- EOF - GMER 2.1 ---- |