![]() |
Win7: Virenscanner und MBAM finden immer öfter was, inzwischen fast täglich! Hallo, in den letzten 3-4 Wochen finden der Virenscanner und MBAM immer öfter etwas. Inzwischen schon fast täglich. Auch wurde schon die Startseite vom Browser verändert (das letzte mal konnte ich es zu Glück über Winpatrol blockieren). Anbei poste ich die Logfiles. Gruß Erik Code: defogger_disable by jpshortstuff (23.02.10.1) Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
Hier noch weitere Logfiles. [CODE]Additional FRST Logfile: Code: scan result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
Noch mehr Logfiles. [CODE][CODE]GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2015-07-02 12:51:33 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 WDC_WD1001FALS-00E8B0 rev.05.00K05 931,51GB Running: Gmer-19357.exe; Driver: C:\Users\Sorgend\AppData\Local\Temp\pwtdypob.sys ---- User code sections - GMER 2.1 ---- .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\system32\Dwm.exe[1828] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL b03 .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes JMP 0 .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL b03 .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiSetInternalUI 000007fef4e55c70 6 bytes {JMP QWORD [RIP+0x4aa3c0]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductA 000007fef4ed2ad4 2 bytes [FF, 25] .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductA + 3 000007fef4ed2ad7 3 bytes [D5, 3E, 00] .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\msi.dll!MsiInstallProductW 000007fef4ee167c 6 bytes {JMP QWORD [RIP+0x3fe9b4]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes JMP 300030 .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Windows\Explorer.EXE[1864] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ashampoo\Ashampoo Anti-Virus\AAV_Service_VISTA.exe[1932] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[2056] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes JMP 7b06c1 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes JMP 0 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes JMP fa850 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\backupService-sezbp.exe[2364] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes JMP 0 .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x984fc]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0xafc70]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text c:\Program Files\SuperEasy Software\Backup Pro\bin\oxHelper.exe[2916] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[2400] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files\Canon\MyPrinter\BJMYPRT.EXE[3108] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 717b000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 717b000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7175000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7175000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7178000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7178000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7181000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7181000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 717e000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 717e000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7172000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7172000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 716f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 716f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!WSALookupServiceBeginW 000000007688575a 6 bytes JMP 719f000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!connect 0000000076886bdd 6 bytes JMP 71a5000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\WS2_32.dll!listen 000000007688b001 6 bytes JMP 71a2000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7190000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 718a000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 718d000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 7193000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 719c000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 7199000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7184000a .text C:\Windows\Samsung\PanelMgr\SSMMgr.exe[3260] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a .text C:\Program Files (x86)\QuickTime\QTTask.exe[3292] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7196000a .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Windows\Samsung\PanelMgr\caller64.exe[3348] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 7181000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 7181000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 717b000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 717b000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 717e000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 717e000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7187000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7187000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 7184000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 7184000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7178000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7178000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 7175000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 7175000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71ac0000 .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7196000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7190000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 7193000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 7199000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 719c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 719c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71a2000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 719f000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 718a000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 718d000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!WSALookupServiceBeginW 000000007688575a 6 bytes JMP 716c000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!connect 0000000076886bdd 6 bytes JMP 7172000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\WS2_32.dll!listen 000000007688b001 6 bytes JMP 716f000a .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe[3488] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes [FF, 25, 1E] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes [7A, 71] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 7178000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 7178000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 7199000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7193000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes {JMP QWORD [RIP+0x7195001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes {JMP QWORD [RIP+0x719b001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes [FF, 25, 1E] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes [9E, 71] .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes {JMP QWORD [RIP+0x71a4001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes {JMP QWORD [RIP+0x71a1001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes {JMP QWORD [RIP+0x718c001e]} .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE[3500] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes {JMP QWORD [RIP+0x718f001e]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[3528] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0x9fc70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files (x86)\Bluetooth Suite\AthBtTray.exe[3540] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Windows\splwow64.exe[3584] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes CALL 9b6 .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x884fc]} .text C:\Windows\splwow64.exe[3584] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes JMP 0 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a .text C:\Program Files (x86)\Canon\Solution Menu EX\CNSEUPDT.EXE[3704] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000751d342c 6 bytes JMP 7196000a .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorA 000007fefa277b34 6 bytes {JMP QWORD [RIP+0x984fc]} .text C:\Program Files\SuperEasy Software\Backup Pro\bin\backupClient-sezbp.exe[3740] C:\Windows\system32\WINSPOOL.DRV!AddPrintProvidorW 000007fefa2803c0 6 bytes {JMP QWORD [RIP+0xafc70]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076e9de10 6 bytes {JMP QWORD [RIP+0x92a2220]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000076e9dee0 6 bytes {JMP QWORD [RIP+0x92e2150]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 0000000076e9e100 6 bytes {JMP QWORD [RIP+0x92c1f30]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtSetValueKey 0000000076e9e1b0 6 bytes {JMP QWORD [RIP+0x9261e80]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteValueKey 0000000076e9e740 6 bytes {JMP QWORD [RIP+0x92818f0]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076e9f0e0 6 bytes {JMP QWORD [RIP+0x9300f50]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\kernel32.dll!CreateProcessInternalW 0000000076d4dbc0 6 bytes {JMP QWORD [RIP+0x9472470]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 354 000007fefcc9b022 3 bytes [E8, 4F, 06] .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 000007feff093030 6 bytes {JMP QWORD [RIP+0x13d000]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!connect + 1 000007feff0945c1 5 bytes {JMP QWORD [RIP+0xfba70]} .text C:\Program Files\Logitech\SetPointP\SetPoint.exe[3764] C:\Windows\system32\WS2_32.dll!listen 000007feff098290 6 bytes {JMP QWORD [RIP+0x117da0]} .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess 000000007704fc6c 3 bytes JMP 718a000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 4 000000007704fc70 2 bytes JMP 718a000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007704fdb0 3 bytes JMP 7184000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 4 000000007704fdb4 2 bytes JMP 7184000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077050100 3 bytes JMP 7187000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 4 0000000077050104 2 bytes JMP 7187000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077050210 3 bytes JMP 7190000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey + 4 0000000077050214 2 bytes JMP 7190000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077050a90 3 bytes JMP 718d000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey + 4 0000000077050a94 2 bytes JMP 718d000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 000000007705196c 3 bytes JMP 7181000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread + 4 0000000077051970 2 bytes JMP 7181000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW 0000000075283bab 3 bytes JMP 717e000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\kernel32.dll!CreateProcessInternalW + 4 0000000075283baf 2 bytes JMP 717e000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW + 499 0000000075af2ca4 4 bytes CALL 71af0000 .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075251401 2 bytes JMP 7529b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075251419 2 bytes JMP 7529b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075251431 2 bytes JMP 75318f29 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007525144a 2 bytes CALL 7527489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000752514dd 2 bytes JMP 75318822 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000752514f5 2 bytes JMP 753189f8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007525150d 2 bytes JMP 75318718 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075251525 2 bytes JMP 75318ae2 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007525153d 2 bytes JMP 7528fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075251555 2 bytes JMP 752968ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007525156d 2 bytes JMP 75318fe3 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075251585 2 bytes JMP 75318b42 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007525159d 2 bytes JMP 753186dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000752515b5 2 bytes JMP 7528fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000752515cd 2 bytes JMP 7529b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000752516b2 2 bytes JMP 75318ea4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000752516bd 2 bytes JMP 75318671 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendMessageW 0000000075b49679 6 bytes JMP 719f000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!PostMessageW 0000000075b512a5 6 bytes JMP 7199000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!PostMessageA 0000000075b53baa 6 bytes JMP 719c000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendMessageA 0000000075b5612e 6 bytes JMP 71a2000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendInput 0000000075b6ff4a 3 bytes JMP 71a5000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!SendInput + 4 0000000075b6ff4e 2 bytes JMP 71a5000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!mouse_event 0000000075ba027b 6 bytes JMP 71ab000a .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\USER32.dll!keybd_event 0000000075ba02bf 6 bytes JMP 71a8000a |
Hier der Rest von Gmer. Code: .text C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe[3804] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 00000000751b7154 6 bytes JMP 7193000a |
Leider sieht man illegales Zeugs auf deinem Rechner :pfui: Zitat:
![]() Illegale Software: Cracks, Keygens und Co Bitte lesen => http://www.trojaner-board.de/95393-c...-software.html Es geht weiter wenn du alles Illegale entfernt hast. Bei wiederholten Crack/Keygen Verstößen behalte ich es mir vor, den Support einzustellen, d.h. Hilfe nur noch bei der Datensicherung und Neuinstallation des Betriebssystems. |
Logs vom Virenscanner und MBAM. Code: 02.07.2015 06:58 (Fehler) Infektion "Application.Win32.InstallAd (A)" wurde in Quarantäne verschoben ; Key: HKEY_USERS\.DEFAULT\SOFTWARE\APPDATALOW\{1146AC44-2F03-4431-B4FD-889BC837521F} Code: 02.07.2015 11:04 (Erfolg) Infektion "Adware.Agent.PQQ (B)" wurde in Quarantäne verschoben ; C:\Users\Sorgend\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ILKOTRN5\34f54d30-708b-4e8e-9fe3-bc9e8a316ace[1].exe -> (RAR Sfx o) -> MetroInstallPack.MIP -> __TMPDeployFolder/IMGUpdater.exe Code: Malwarebytes Anti-Malware |
Der Rest von MBAM. Code: PUP.Optional.WikiBrowser.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WikiBrowserUpdateService, In Quarantäne, [2c6d00dc8dfd0036e998e4b6b84d9070], |
Der letzte Rest. Code: PUP.Optional.WikiBrowser.A, C:\Users\Sorgend\AppData\Local\WikiBrowser\extension.crx, In Quarantäne, [742532aa6a20b185b0e327d2b350a858], |
Der Rest. Code: PUP.Optional.WikiBrowser.A, C:\Users\Sorgend\AppData\Local\WikiBrowser\extension.crx, In Quarantäne, [742532aa6a20b185b0e327d2b350a858], |
Du hast doch den Crack/Keygen Disclaimer gelesen. Selbstverständlich muss das runter, und alles andere etwaig gecrackte auch. |
Wir haben laut meinem Sohn jetzt alles gelöscht. Er hat auch versprochen nichts ähnliches mehr herunter zu laden. Wie geht es jetzt weiter? Gruß Erik |
Dann bitte jetzt Combofix ausführen: Scan mit Combofix
|
Hier die Logfile von Combofix. Code: ComboFix 15-06-30.01 - Sorgend 02.07.2015 19:25:58.1.3 - x64 |
Adware/Junkware/Toolbars entfernen Alte Versionen von adwCleaner und falls vorhanden JRT vorher löschen, danach neu runterladen auf den Desktop! Virenscanner jetzt vor dem Einsatz dieser Tools bitte komplett deaktivieren! 1. Schritt: adwCleaner Downloade Dir bitte ![]()
2. Schritt: JRT - Junkware Removal Tool Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
3. Schritt: Frisches Log mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: ![]() (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
|
Hallo, hier die Logs. Code: # AdwCleaner v4.207 - Bericht erstellt 03/07/2015 um 09:43:38 Code: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
[CODE]Additional FRST Logfile: Code: scan result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
FRST-Fix Virenscanner jetzt bitte komplett deaktivieren, damit sichergestellt ist, dass der Fix sauber durchläuft! Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Hier die Fixlog. Code: Fix result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
Dann zeig mal frische FRST Logs. Haken setzen bei addition.txt dann auf Scan klicken http://saved.im/mtg0mjy4yjlu/2014-04...ryscantool.png |
Hallo, hier die Logs. Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
[CODE]Additional FRST Logfile: Code: scan result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
FRST.txt ist unvollständig, bitte richtig machen |
Ich hoffe diesmal ist alles dabei. Code: Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:28-06-2015 01 |
FRST-Fix Virenscanner jetzt bitte komplett deaktivieren, damit sichergestellt ist, dass der Fix sauber durchläuft! Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: C:\Users\Sorgend\AppData\Roaming\J6aFqR6TdiG2147BH0b Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Hallo, hier die Fislog! Code: Fix result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
Okay, dann Kontrollscans mit MBAM und ESET bitte: Downloade Dir bitte ![]()
ESET Online Scanner
|
Hier die Logs von MBAM und ESET Scan. Code: ESETSmartInstaller@High as downloader log: Code: Malwarebytes Anti-Malware |
FRST-Fix Virenscanner jetzt bitte komplett deaktivieren, damit sichergestellt ist, dass der Fix sauber durchläuft! Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: E:\SuperEasy\Mein Backup\data\C\Users\Sorgend\Downloads\adusetup_ashampoo-[2015-03-13--08-58 [0615a3]].exe Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Hier das Fixlog. Code: Fix result of Farbar Recovery Scan Tool (x64) Version:28-06-2015 01 |
Sieht soweit ok aus :daumenhoc Wegen Cookies und anderer Dinge im Web: Um die Pest von vornherein zu blocken (also TrackingCookies, Werbebanner etc.) empfehle ich die Erweiterung Ghostery, diese verhindert weitgehend Usertracking bzw. das Anzeigen von Werbebannern. Info: Cookies sind keine Schädlinge direkt, aber es besteht die Gefahr der missbräuchlichen Verwendung (eindeutige Wiedererkennung zB für gezielte Werbung o.ä. => HTTP-Cookie ) Ansonsten gibt es noch gute Cookiemanager, Erweiterungen für den Firefox zB wäre da CookieCuller Wenn du aber damit leben kannst, dich bei jeder Browsersession überall neu einzuloggen (zB Facebook, Ebay, GMX, oder auch Trojaner-Board) dann stell den Browser einfach so ein, dass einfach alles beim Beenden des Browser inkl. Cookies gelöscht wird. Ist dein System nun wieder in Ordnung oder gibt's noch andere Funde oder Probleme? |
Scheint jetzt wieder alles gut zu laufen. Virenscanner und MBAM haben nichts mehr gefunden, und auch so scheint alles in Ordnung. Was muss ich jetzt noch machen, bzw. deinstallieren? |
Dann wären wir durch! :daumenhoc Wenn Du möchtest, kannst Du hier sagen, ob Du mit mir und meiner Hilfe zufrieden warst...:dankeschoen:und/oder das Forum mit einer kleinen Spende http://www.trojaner-board.de/extra/spende.png unterstützen. :applaus: Abschließend müssen wir noch ein paar Schritte unternehmen, um deinen Pc aufzuräumen und abzusichern. http://deeprybka.trojaner-board.de/b...cleanupneu.png Cleanup: (Die Reihenfolge ist hier entscheidend) Falls Defogger verwendet wurde: Erneut starten und auf Re-enable klicken. Falls Combofix verwendet wurde: http://deeprybka.trojaner-board.de/b.../combofix2.pngCombofix deinstallieren
Alle Logs gepostet? Dann lade Dir bitte http://filepony.de/icon/tiny/delfix.pngDelFix herunter.
Hinweis: DelFix entfernt u.a. alle verwendeten Programme, die Quarantäne unserer Scanner, den Java-Cache und löscht sich abschließend selbst. Starte Deinen Rechner abschließend neu. Sollten jetzt noch Programme aus unserer Bereinigung übrig sein, kannst Du diese bedenkenlos löschen. http://deeprybka.trojaner-board.de/b...ast/schild.png Absicherung: Beim Betriebsystem Windows die automatischen Updates aktivieren. Auch die sicherheitsrelevante Software sollte immer nur in der aktuellsten Version vorliegen: Browser Java Flash-Player PDF-Reader Sicherheitslücken in deren alten Versionen werden dazu ausgenutzt, um beim einfachen Besuch einer manipulierten Website per "Drive-by" Malware zu installieren. Ich empfehle z.B. die Verwendung von Mozilla Firefox statt des Internet Explorers. Zudem lassen sich mit dem Firefox auch PDF-Dokumente öffnen. Aktiviere eine Firewall. Die in Windows integrierte genügt im Normalfall völlig. Verwende ein einziges der folgenden Antivirusprogramme mit Echtzeitscanner und stets aktueller Signaturendatenbank: Zusätzlich kannst Du Deinen PC regelmäßig mit Malwarebytes Anti-Malware und ESET scannen. Optional: http://filepony.de/icon/noscript.png NoScript verhindert das Ausführen von aktiven Inhalten (Java, JavaScript, Flash,...) für sämtliche Websites. Man kann aber nach dem Prinzip einer Whitelist festlegen, auf welchen Seiten Scripts erlaubt werden sollen. http://filepony.de/icon/malwarebytes_anti_exploit.pngMalwarebytes Anti Exploit: Schützt die Anwendungen des Computers vor der Ausnutzung bekannter Schwachstellen. Lade Software von einem sauberen Portal wie http://filepony.de/images/microbanner.gif. Wähle beim Installieren von Software immer die benutzerdefinierte Option und entferne den Haken bei allen optional angebotenen Toolbars oder sonstigen, fürs Programm, irrelevanten Ergänzungen. Um Adware wieder los zu werden, empfiehlt sich zunächst die Deinstallation sowie die anschließende Resteentfernung mit Adwcleaner . Abschließend noch ein paar grundsätzliche Bemerkungen: Ändere regelmäßig Deine wichtigen Online-Passwörter und erstelle regelmäßig Backups Deiner wichtigen Dateien oder des Systems. Der Nutzen von Registry-Cleanern, Optimizern usw. zur Performancesteigerung ist umstritten. Ich empfehle deshalb, die Finger von der Registry zu lassen und lieber die windowseigene Datenträgerbereinigung zu verwenden. Hinweis: Bitte gib mir eine kurze Rückmeldung wenn alles erledigt ist und keine Fragen mehr vorhanden sind, so dass ich dieses Thema aus meinen Abos löschen kann. |
Hab alles gemacht. Alles läuft super. |
Alle Zeitangaben in WEZ +1. Es ist jetzt 07:10 Uhr. |
Copyright ©2000-2025, Trojaner-Board