![]() |
Win7: Virenscanner und MBAM finden immer öfter was, inzwischen fast täglich! Hallo, in den letzten 3-4 Wochen finden der Virenscanner und MBAM immer öfter etwas. Inzwischen schon fast täglich. Auch wurde schon die Startseite vom Browser verändert (das letzte mal konnte ich es zu Glück über Winpatrol blockieren). Anbei poste ich die Logfiles. Gruß Erik Code: defogger_disable by jpshortstuff (23.02.10.1) Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
Hier noch weitere Logfiles. [CODE]Additional FRST Logfile: Code: scan result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
Noch mehr Logfiles. [CODE][CODE]GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2015-07-02 12:51:33 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 WDC_WD1001FALS-00E8B0 rev.05.00K05 931,51GB Running: Gmer-19357.exe; Driver: C:\Users\Sorgend\AppData\Local\Temp\pwtdypob.sys ---- User code sections - GMER 2.1 ---- .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL b03 .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes JMP 0 .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL b03 .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiSetInternalUI 000007fef4e55c70 6 bytes {JMP QWORD [RIP+0x4aa3c0]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductA 000007fef4ed2ad4 2 bytes [FF, 25] .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductA + 3 000007fef4ed2ad7 3 bytes [D5, 3E, 00] .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductW 000007fef4ee167c 6 bytes {JMP QWORD [RIP+0x3fe9b4]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes JMP 300030 .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes JMP 7b06c1 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes JMP 0 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes JMP fa850 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes JMP 0 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x984fc]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0xafc70]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 717b000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 717b000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7175000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7175000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7178000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7178000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7181000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7181000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 717e000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 717e000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7172000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7172000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 716f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 716f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!WSALookupServiceBeginW 000000007688575a 6 bytes JMP 719f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!connect 0000000076886bdd 6 bytes JMP 71a5000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!listen 000000007688b001 6 bytes JMP 71a2000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7190000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 718a000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 718d000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 7193000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 719c000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 7199000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7184000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 7181000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 7181000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 717b000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 717b000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 717e000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 717e000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7187000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7187000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 7184000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 7184000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7178000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7178000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 7175000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 7175000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71ac0000 .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7196000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7190000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 7193000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 7199000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 719c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 719c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71a2000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 719f000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 718a000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 718d000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!WSALookupServiceBeginW 000000007688575a 6 bytes JMP 716c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!connect 0000000076886bdd 6 bytes JMP 7172000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!listen 000000007688b001 6 bytes JMP 716f000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes [FF, 25, 1E] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes [7A, 71] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 7178000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 7178000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7199000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7193000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes {JMP QWORD [RIP+0x7195001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes {JMP QWORD [RIP+0x719b001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes [FF, 25, 1E] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes [9E, 71] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes {JMP QWORD [RIP+0x71a4001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes {JMP QWORD [RIP+0x71a1001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes {JMP QWORD [RIP+0x718c001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes {JMP QWORD [RIP+0x718f001e]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL 9b6 .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes JMP 0 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7196000a .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x984fc]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0xafc70]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a |
Hier der Rest von Gmer. Code: .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a |
Leider sieht man illegales Zeugs auf deinem Rechner :pfui: Zitat:
![]() Illegale Software: Cracks, Keygens und Co Bitte lesen => http://www.trojaner-board.de/95393-c...-software.html Es geht weiter wenn du alles Illegale entfernt hast. Bei wiederholten Crack/Keygen Verstößen behalte ich es mir vor, den Support einzustellen, d.h. Hilfe nur noch bei der Datensicherung und Neuinstallation des Betriebssystems. |
Logs vom Virenscanner und MBAM. Code: 02.07.2015 06:58 (Fehler) Infektion "Application.Win32.InstallAd (A)" wurde in Quarantäne verschoben ; Key: HKEY_USERS\.DEFAULT\SOFTWARE\APPDATALOW\{1146AC44-2F03-4431-B4FD-889BC837521F} Code: 02.07.2015 11:04 (Erfolg) Infektion "Adware.Agent.PQQ (B)" wurde in Quarantäne verschoben ; C:\Users\Sorgend\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ILKOTRN5\34f54d30-708b-4e8e-9fe3-bc9e8a316ace[1].exe -> (RAR Sfx o) -> MetroInstallPack.MIP -> __TMPDeployFolder/IMGUpdater.exe Code: Malwarebytes Anti-Malware |
Der Rest von MBAM. Code: PUP.Optional.WikiBrowser.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WikiBrowserUpdateService, In Quarantäne, [2c6d00dc8dfd0036e998e4b6b84d9070], |
Der letzte Rest. Code: PUP.Optional.WikiBrowser.A, C:\Users\Sorgend\AppData\Local\WikiBrowser\extension.crx, In Quarantäne, [742532aa6a20b185b0e327d2b350a858], |
Der Rest. Code: PUP.Optional.WikiBrowser.A, C:\Users\Sorgend\AppData\Local\WikiBrowser\extension.crx, In Quarantäne, [742532aa6a20b185b0e327d2b350a858], |
Du hast doch den Crack/Keygen Disclaimer gelesen. Selbstverständlich muss das runter, und alles andere etwaig gecrackte auch. |
Wir haben laut meinem Sohn jetzt alles gelöscht. Er hat auch versprochen nichts ähnliches mehr herunter zu laden. Wie geht es jetzt weiter? Gruß Erik |
Dann bitte jetzt Combofix ausführen: Scan mit Combofix
|
Hier die Logfile von Combofix. Code: ComboFix 15-06-30.01 - Sorgend 02.07.2015 19:25:58.1.3 - x64 |
Adware/Junkware/Toolbars entfernen Alte Versionen von adwCleaner und falls vorhanden JRT vorher löschen, danach neu runterladen auf den Desktop! Virenscanner jetzt vor dem Einsatz dieser Tools bitte komplett deaktivieren! 1. Schritt: adwCleaner Downloade Dir bitte ![]()
2. Schritt: JRT - Junkware Removal Tool Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
3. Schritt: Frisches Log mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: ![]() (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
|
Hallo, hier die Logs. Code: # AdwCleaner v4.207 - Bericht erstellt 03/07/2015 um 09:43:38 Code: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
Alle Zeitangaben in WEZ +1. Es ist jetzt 22:56 Uhr. |
Copyright ©2000-2025, Trojaner-Board