Hallo Cosinus,
warum Windows professional habe, kann ich nicht mal beantworten. Ich habe den Rechner mit Windows gekauft und mir wurde nicht die Wahl gelassen. Es ist ein Arbeitsrechner, wenn auch mein eigener und nicht von einem Büro.
Ich habe alle Schritte wie beschrieben durchgeführt.
Gmer Log: Code:
GMER 2.1.19155 - hxxp://www.gmer.net
Rootkit scan 2013-03-12 19:57:30
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 ST950042 rev.0003 465,76GB
Running: gmer_2.1.19155.exe; Driver: C:\Users\Raquel\AppData\Local\Temp\kwroipob.sys
---- User code sections - GMER 2.1 ----
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe[1556] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\ThinkVantage Fingerprint Software\upeksvr.exe[1916] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[2268] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[2268] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\Application Updater\ApplicationUpdater.exe[2336] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Application Updater\ApplicationUpdater.exe[2336] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe[2372] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe[2372] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe[2948] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe[2948] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3672] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3672] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~1\LENOVO\VIRTSCRL\virtscrl.exe[3132] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe[3584] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Windows\system32\Dwm.exe[3680] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\ProgramData\DatacardService\DCSHelper.exe[4256] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4356] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[4376] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\Lenovo\Access Connections\AcDeskBandHlpr.exe[4460] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[4716] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Windows\System32\TpShocks.exe[4728] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\System32\TpShocks.exe[4728] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\System32\TpShocks.exe[4728] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\System32\TpShocks.exe[4728] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\System32\TpShocks.exe[4728] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\CONEXANT\ForteConfig\fmapp.exe[4740] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Windows\System32\igfxpers.exe[4812] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files\Lenovo\Communications Utility\TpKnrres.exe[4824] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\ksuser.dll!KsCreatePin + 35 0000000074b711a8 2 bytes [B7, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\ksuser.dll!KsCreateAllocator + 21 0000000074b713a8 2 bytes [B7, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\ksuser.dll!KsCreateClock + 21 0000000074b71422 2 bytes [B7, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\ksuser.dll!KsCreateTopologyNode + 19 0000000074b71498 2 bytes [B7, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 195 0000000074b81b41 2 bytes [B8, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 362 0000000074b81be8 2 bytes [B8, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 418 0000000074b81c20 2 bytes [B8, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 596 0000000074b81cd2 2 bytes [B8, 74]
.text C:\Program Files\Lenovo\AutoLock\ALCKRESI.exe[4852] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 628 0000000074b81cf2 2 bytes [B8, 74]
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Windows\vsnpstd3.exe[4940] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\ThinkPad\Bluetooth Software\BTTray.exe[4984] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe[5024] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[5100] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Windows\FixCamera.exe[3972] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Windows\tsnpstd3.exe[4276] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Paragon Software\Slovoed 7\Slovoed.exe[4604] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent.exe[4608] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe[5156] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[5172] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files (x86)\ABBYY Lingvo x5\LvAgent64.exe[5232] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files (x86)\AVG\AVG10\Identity Protection\agent\bin\avgidsmonitor.exe[5712] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Windows\SysWOW64\ResStub.exe[6000] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6072] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Windows\SysWOW64\RunDll32.exe[5912] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Windows\SysWOW64\RunDll32.exe[5912] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\PROGRA~1\Lenovo\Zoom\TPSCREX.EXE[4132] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\PROGRA~1\Lenovo\HOTKEY\TPONSCR.EXE[5428] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\PROGRA~1\Lenovo\HOTKEY\tpnumlkd.exe[5984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\PROGRA~1\Lenovo\HOTKEY\tpnumlkd.exe[5984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\PROGRA~1\Lenovo\HOTKEY\tpnumlkd.exe[5984] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\PROGRA~1\Lenovo\HOTKEY\tpnumlkd.exe[5984] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\PROGRA~1\Lenovo\HOTKEY\tpnumlkd.exe[5984] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\ThinkPad\Bluetooth Software\BtStackServer.exe[2992] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[6300] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Program Files\ThinkPad\Bluetooth Software\Bluetooth Headset Helper.exe[6652] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files\ThinkPad\Bluetooth Software\BluetoothHeadsetProxy.exe[4204] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1104] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1104] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe[3128] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000077641465 2 bytes [64, 77]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe[3128] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000776414bb 2 bytes [64, 77]
.text ... * 2
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefea77490 11 bytes JMP 000007fffd0c0228
.text C:\Windows\system32\taskeng.exe[6504] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefea8bf00 7 bytes JMP 000007fffd0c0260
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\kernel32.dll!K32GetMappedFileNameW 000000007725efc0 5 bytes JMP 000000016fff0148
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\kernel32.dll!K32EnumProcessModulesEx 00000000772899a0 7 bytes JMP 000000016fff00d8
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\kernel32.dll!K32GetModuleInformation 00000000772994c0 5 bytes JMP 000000016fff0180
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\kernel32.dll!K32GetModuleFileNameExW 0000000077299630 5 bytes JMP 000000016fff0110
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\kernel32.dll!RegSetValueExA 00000000772ba4f0 7 bytes JMP 000000016fff01b8
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd113450 1 byte JMP 000007fffd0c00d8
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW + 2 000007fefd113452 5 bytes {JMP 0xfffffffffffacc88}
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd119180 5 bytes JMP 000007fffd0c0180
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd119320 5 bytes JMP 000007fffd0c0110
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd11c5e0 6 bytes JMP 000007fffd0c0148
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefe7289e0 8 bytes JMP 000007fffd0c01f0
.text C:\Windows\System32\dinotify.exe[6680] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefe72be40 8 bytes JMP 000007fffd0c01b8
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075151411 7 bytes JMP 0000000171721e90
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\kernel32.dll!K32GetModuleFileNameExW 000000007516b203 5 bytes JMP 0000000171721da0
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 00000000751e88dc 7 bytes JMP 0000000171721d90
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 00000000751e8961 5 bytes JMP 0000000171721e80
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000751e8cb7 5 bytes JMP 0000000171721e10
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 000000007525130f 5 bytes JMP 0000000171722450
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 00000000752513bd 5 bytes JMP 00000001717224b0
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000075252097 5 bytes JMP 0000000171722520
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 00000000752522fd 5 bytes JMP 0000000171722620
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007554e9a2 5 bytes JMP 0000000171721a00
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007554ebdc 5 bytes JMP 0000000171721a90
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000074f05ea5 5 bytes JMP 0000000171721ce0
.text C:\Users\Raquel\Desktop\gmer_2.1.19155.exe[1792] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000074f39d0b 5 bytes JMP 0000000171721c70
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\ec55f9ee5b16
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\ec55f9ee5b16 (not active ControlSet)
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ---- Malwarebytes Anti-rootkit, erster Durchlauf: Code:
Malwarebytes Anti-Rootkit BETA 1.01.0.1021
www.malwarebytes.org
Database version: v2013.03.12.04
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Raquel :: RAQUEL-THINK [administrator]
12.03.2013 20:23:05
mbar-log-2013-03-12 (20-23-05).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 31231
Time elapsed: 12 minute(s), 51 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 2
HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load (PUM.UserWLoad) -> Data: C:\Users\Raquel\LOCALS~1\Temp\msakou.cmd -> Delete on reboot.
HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load (Trojan.Ransom) -> Data: C:\Users\Raquel\LOCALS~1\Temp\msakou.cmd -> Delete on reboot.
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end) Malwarebytes Anti rootkit, zweiter Durchlauf, nach RE-booten: Code:
Malwarebytes Anti-Rootkit BETA 1.01.0.1021
www.malwarebytes.org
Database version: v2013.03.12.04
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Raquel :: RAQUEL-THINK [administrator]
12.03.2013 20:56:37
mbar-log-2013-03-12 (20-56-37).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 31220
Time elapsed: 14 minute(s), 27 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end) Bin ich den Virus nun los?
Muss ich nun was rückgängig machen, was ich mit defogger oder OTL abgeschaltet habe? (bitte entschuldige die ungenaue Frage - ich habe nicht recht verstanden, was die Programme gemacht haben). Gibt es eine Möglichkeit, meine externe Festplatte,wieder zu verwenden, ohne den Virus wieder auf dem REchner zu haben? Wenn ja, wie komme ich an die Daten? Es erschien ja zumächst nur eine Verknüpfung zur Festplatte selbst, die nach Verschieben von Dateien in Quarantäre nicht mehr zu öffnen war. Vielen Dank! |