GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2014-06-10 17:50:36
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\0000002d WDC_WD5000LPVX-22V0TT0 rev.01.01A01 465.76GB
Running: b1cses3j.exe; Driver: C:\Users\MATTQ~1\AppData\Local\Temp\uwlorkog.sys
---- Kernel code sections - GMER 2.1 ----
.text C:\WINDOWS\System32\win32k.sys!W32pServiceTable + 1 fffff960000c4201 7 bytes [20, 0A, 02, 00, F0, 70, 01]
.text C:\WINDOWS\System32\win32k.sys!W32pServiceTable + 9 fffff960000c4209 6 bytes [88, B0, FF, 01, 23, DC]
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007729137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077291512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077291551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077291577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077291784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772917c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772917e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077291834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077291841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077291a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077292ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077292c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[5500] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077292c43 8 bytes [7C, 68, 16, FF, 00, 00, 00, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007729137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077291512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077291551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077291577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077291784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772917c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772917e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077291834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077291841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077291a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077292ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077292c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Desktop\aswmbr.exe[5440] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077292c43 8 bytes [7C, 68, 4F, 7F, 00, 00, 00, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007fffea55293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007fffea552959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007fffea5529c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007fffea552aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007fffea552bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007fffea553018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007fffea5533bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007fffea553404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007fffea5535bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007fffea553fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007fffea554933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007fffea554bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007fffea554c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007fffea55543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007fffea5556b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007fffea555a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007fffea555f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007fffea555fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007fffea5560df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007fffea556113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007fffea55635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007fffea556658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007fffea556668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007fffea556867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007fffea556887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007fffea556bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007fffea556c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007fffea559188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007fffea5591a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007fffea5592f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007fffea55931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007fffea55950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007fffea559577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007fffea5595e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007fffea55986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007fffea559a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007fffea55a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007fffea55a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007fffea55aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007fffea55d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007fffea55d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007fffea55d75c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007fffea55e56b 8 bytes [D0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007fffea55e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007fffea55e6c3 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007fffea55e847 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007fffea5dac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007fffea5dadd0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007fffea5dae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007fffea5daf20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007fffea5dafd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007fffea5db690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007fffea5db990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007fffea5dc210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007729137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077291512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077291551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077291577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077291784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772917c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772917e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077291834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077291841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077291a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077292ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077292c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Matt Q\Downloads\b1cses3j.exe[4524] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077292c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
---- User IAT/EAT - GMER 2.1 ----
IAT C:\WINDOWS\Explorer.EXE[2616] @ C:\WINDOWS\system32\RPCRT4.dll[ntdll.dll!NtAlpcConnectPortEx] [52d41250]
---- Threads - GMER 2.1 ----
Thread C:\WINDOWS\system32\csrss.exe [720:912] fffff96000944b90
Thread C:\WINDOWS\system32\svchost.exe [904:360] 00007fffe6591b40
Thread C:\WINDOWS\System32\svchost.exe [456:1088] 00007fffe34b1400
Thread C:\WINDOWS\System32\svchost.exe [456:1144] 00007fffe3441ed0
Thread C:\WINDOWS\System32\svchost.exe [456:1204] 00007fffe30ee054
Thread C:\WINDOWS\System32\svchost.exe [456:1212] 00007fffe333e840
Thread C:\WINDOWS\System32\svchost.exe [456:1256] 00007fffe2c1ed08
Thread C:\WINDOWS\System32\svchost.exe [456:1296] 00007fffe314482c
Thread C:\WINDOWS\System32\svchost.exe [456:3848] 00007fffdc196dd0
Thread C:\WINDOWS\System32\svchost.exe [456:3856] 00007fffdc194f30
Thread C:\WINDOWS\system32\svchost.exe [616:1308] 00007fffe1261ee0
Thread C:\WINDOWS\system32\svchost.exe [616:2368] 00007fffde2dcbc0
Thread C:\WINDOWS\system32\svchost.exe [616:2412] 00007fffdf401b40
Thread C:\WINDOWS\system32\svchost.exe [616:3004] 00007fffdc5b79a0
Thread C:\WINDOWS\system32\svchost.exe [616:3008] 00007fffdc5b73e0
Thread C:\WINDOWS\system32\svchost.exe [616:3012] 00007fffdc614e0c
Thread C:\WINDOWS\system32\svchost.exe [616:2608] 00007fffdc3b2b48
Thread C:\WINDOWS\system32\svchost.exe [616:2604] 00007fffdc45130c
Thread C:\WINDOWS\system32\svchost.exe [616:2700] 00007fffdc45130c
Thread C:\WINDOWS\system32\svchost.exe [616:1340] 00007fffdc614e0c
Thread C:\WINDOWS\system32\svchost.exe [616:6412] 00007fffde9d5340
Thread C:\WINDOWS\system32\svchost.exe [616:6652] 00007fffdcd710e0
Thread C:\WINDOWS\system32\svchost.exe [616:3636] 00007fffc40438e0
Thread C:\WINDOWS\system32\svchost.exe [724:2636] 00007fffddf10b50
Thread C:\WINDOWS\system32\svchost.exe [724:2680] 00007fffddf0c574
Thread C:\WINDOWS\system32\svchost.exe [724:2684] 00007fffddf0f55c
Thread C:\WINDOWS\system32\svchost.exe [724:2688] 00007fffddf11674
Thread C:\WINDOWS\system32\svchost.exe [724:2692] 00007fffddf07490
Thread C:\WINDOWS\system32\svchost.exe [724:2760] 00007fffddb74b04
Thread C:\WINDOWS\system32\svchost.exe [724:1564] 00007fffddf0d5a0
Thread C:\WINDOWS\system32\svchost.exe [724:5776] 00007fffc40c6c08
Thread C:\WINDOWS\system32\svchost.exe [724:4760] 00007fffc40c6800
Thread C:\WINDOWS\system32\svchost.exe [1128:1116] 00007fffdf7e4b30
Thread C:\WINDOWS\system32\svchost.exe [1128:2056] 00007fffdeb2dff0
Thread C:\WINDOWS\system32\svchost.exe [1128:2668] 00007fffddc73584
Thread C:\WINDOWS\system32\svchost.exe [1128:2672] 00007fffddc73560
Thread C:\WINDOWS\system32\svchost.exe [1128:2676] 00007fffddc86738
Thread C:\WINDOWS\system32\svchost.exe [1128:2828] 00007fffdd541ef8
Thread C:\WINDOWS\system32\svchost.exe [1128:2836] 00007fffdd5335f4
Thread C:\WINDOWS\system32\svchost.exe [1128:2844] 00007fffdd5335f4
Thread C:\WINDOWS\system32\svchost.exe [1128:2848] 00007fffdd5335f4
Thread C:\WINDOWS\system32\svchost.exe [1128:2852] 00007fffdd5335f4
Thread C:\WINDOWS\system32\svchost.exe [1128:2856] 00007fffdd5335f4
Thread C:\WINDOWS\system32\svchost.exe [1128:3624] 00007fffde9d5340
Thread C:\WINDOWS\system32\svchost.exe [1128:3464] 00007fffdfb514f0
Thread C:\WINDOWS\system32\svchost.exe [1360:1800] 00007fffdfb22b90
Thread C:\WINDOWS\system32\svchost.exe [1360:2620] 00007fffdfb267bc
Thread C:\WINDOWS\system32\svchost.exe [1360:2816] 00007fffdd092110
Thread C:\WINDOWS\system32\svchost.exe [1360:2820] 00007fffdd061584
Thread C:\WINDOWS\system32\svchost.exe [1360:2868] 00007fffdcfd1b40
Thread C:\WINDOWS\system32\svchost.exe [1360:992] 00007fffe35a1040
Thread C:\WINDOWS\system32\svchost.exe [1360:76] 00007fffe35a4608
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:1640] 0000000000c2301f
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:1728] 00000000711e6c50
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3088] 000000006f721120
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3180] 00000000713257fe
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3208] 000000006f4df6c8
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3212] 000000006f4df6c8
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3344] 000000006cd3b503
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3356] 000000006cd3b503
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3360] 000000006cd3b503
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3376] 000000006c2b6b60
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3380] 000000006c2b6b60
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3388] 000000006c300320
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3396] 000000006c6f975d
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3460] 000000006f4df6c8
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:3472] 000000006cbb8730
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:2552] 0000000055c01b6e
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [1636:5920] 000000007325a4c5
Thread C:\WINDOWS\SYSTEM32\ntdll.dll [2120:2124] 000000000040f0bc
Thread C:\WINDOWS\system32\taskhostex.exe [2072:3232] 00007fffdd7d2310
Thread C:\WINDOWS\system32\taskhostex.exe [2072:1312] 00007fffdd9022a0
Thread C:\WINDOWS\system32\taskhostex.exe [2072:1460] 00007fffea01bc40
Thread C:\WINDOWS\system32\taskhostex.exe [2072:344] 00007fffe1011120
Thread C:\WINDOWS\system32\taskhostex.exe [2072:3568] 00007fffdf7e4b30
Thread C:\WINDOWS\Explorer.EXE [2616:1216] 00007fffd41157a4
Thread C:\WINDOWS\Explorer.EXE [2616:3288] 00007fffd233e780
Thread C:\WINDOWS\Explorer.EXE [2616:1588] 00007fffe2c1ed08
Thread C:\WINDOWS\Explorer.EXE [2616:1584] 00007fffe2c1ed08
Thread C:\WINDOWS\Explorer.EXE [2616:3456] 00007fffd216a760
Thread C:\WINDOWS\Explorer.EXE [2616:1220] 00007fffe2c1ed08
Thread C:\WINDOWS\Explorer.EXE [2616:2396] 00007fffdfc71e40
Thread C:\WINDOWS\Explorer.EXE [2616:1528] 00007fffdd318c54
Thread C:\WINDOWS\Explorer.EXE [2616:5428] 00007fffd40076cc
Thread C:\WINDOWS\Explorer.EXE [2616:5724] 00007fffd40076cc
Thread C:\WINDOWS\Explorer.EXE [2616:5548] 00007fffd40076cc
Thread C:\WINDOWS\Explorer.EXE [2616:3096] 00007fffd40076cc
Thread C:\WINDOWS\Explorer.EXE [2616:6576] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:4888] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:1196] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:2912] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:1576] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:5528] 00007fffe04c2774
Thread C:\WINDOWS\Explorer.EXE [2616:3488] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:7100] 00007fffe1f71e70
Thread C:\WINDOWS\Explorer.EXE [2616:5948] 00007fffe1f71c00
Thread C:\WINDOWS\Explorer.EXE [2616:5652] 00007fffdd31d6bc
Thread C:\WINDOWS\Explorer.EXE [2616:4528] 00007fffdd31d6bc
Thread C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe [3820:1096] 00007fffe04c2774
Thread C:\WINDOWS\System32\Taskmgr.exe [5180:3052] 00007fffe04c2774
---- Processes - GMER 2.1 ----
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\aswEngin.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (High level antivirus engine/ALWIL Software)(2014-06-11 00:38:44) 0000000064280000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\aswScan.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (Low level antivirus engine/ALWIL Software)(2014-06-11 00:38:44) 0000000064200000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\MSVCP71.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (Microsoft® C++ Runtime Library/Microsoft Corporation)(2014-06-11 00:38:44) 000000007c3a0000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\aswCmnOS.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (Antivirus HW dependent library/ALWIL Software)(2014-06-11 00:38:44) 0000000064000000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\aswCmnB.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (High level portable functions/ALWIL Software)(2014-06-11 00:38:44) 0000000064080000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\aswCmnS.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (Common non-portable functions/ALWIL Software)(2014-06-11 00:38:44) 0000000064100000
Library C:\Users\MATTQ~1\AppData\Local\Temp\_av4_\MSVCR71.dll (*** suspicious ***) @ C:\Users\Matt Q\Desktop\aswmbr.exe [5440] (Microsoft® C Runtime Library/Microsoft Corporation)(2014-06-11 00:38:44) 000000007c340000
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ----