<?xml version="1.0" encoding="UTF-16"?>
-<mbam-log>
-<header>
<date>2014/03/29 22:51:35 +0100</date>
<log>mbam-log-2014-03-29 (22-43-06).xml</log>
<isadmin>yes</isadmin>
</header>
-<engine>
<version>2.00.0.1000</version>
<rules-database>v2014.03.29.06</rules-database>
<swissarmy-database>v2014.03.27.01</swissarmy-database>
<license>trial</license>
<file-protection>enabled</file-protection>
<web-protection>enabled</web-protection>
<self-protection>disabled</self-protection>
</engine>
-<system>
<osversion>Windows 7 Service Pack 1</osversion>
<arch>x86</arch>
<username>Admin</username>
<filesys>NTFS</filesys>
</system>
-<summary>
<type>threat</type>
<result>completed</result>
<objects>212939</objects>
<time>506</time>
<processes>0</processes>
<modules>0</modules>
<keys>1</keys>
<values>1</values>
<datas>0</datas>
<folders>0</folders>
<files>2</files>
<sectors>0</sectors>
</summary>
-<options>
<memory>enabled</memory>
<startup>enabled</startup>
<filesystem>enabled</filesystem>
<archives>enabled</archives>
<rootkits>disabled</rootkits>
<deeprootkit>disabled</deeprootkit>
<shuriken>enabled</shuriken>
<pup>enabled</pup>
<pum>enabled</pum>
</options>
-<items>
-<key>
<path>HKU\S-1-5-21-3321851790-3634758337-735559634-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\CONDUIT\FF</path>
<vendor>PUP.Optional.Conduit.A</vendor>
<action>success</action>
<hash>25e5b4553f3ce650aea06d15e81b31cf</hash>
</key>
-<value>
<path>HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN</path>
<valuename>MSStp</valuename>
<vendor>Trojan.Agent.VBS</vendor>
<action>success</action>
<valuedata>C:\Windows\system32\msstp.vbe</valuedata>
<hash>14f6e029df9c092d0489035baa5802fe</hash>
</value>
-<file>
<path>C:\Windows\System32\msstp.vbe</path>
<vendor>Trojan.Agent.VBS</vendor>
<action>success</action>
<hash>14f6e029df9c092d0489035baa5802fe</hash>
</file>
-<file>
<path>C:\Windows\System32\roboot.exe</path>
<vendor>PUP.Optional.PCPerformer.A</vendor>
<action>success</action>
<hash>54b61bee06750333833c05786b98f50b</hash>
</file>
</items>
</mbam-log>
<?xml version="1.0" encoding="UTF-8"?>
-<logs>
<record subtype="Malware Protection" result="Starting" last_modified_tag="5991014b-b56d-4b5c-a359-b67a9e52df59" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:24:45.664483+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malware Protection" result="Started" last_modified_tag="23300701-f86e-4a7f-8768-b5fde52c1d2f" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:24:45.670483+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="e8d14062-af80-4b16-939d-9e15b230cb14" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:24:45.694485+01:00" LoggingEventType="2" severity="debug"/>
<record last_modified_tag="87ba023a-9103-4a6c-a6d6-e57b87ce4cd5" systemname="ADMIN-PC" username="SYSTEM" type="Update" source="Manual" datetime="2014-03-29T12:24:58.806546+01:00" LoggingEventType="1" severity="debug" toVersion="2014.3.27.1" name="Rootkit Database" fromVersion="2014.2.20.1"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="9b7deb81-9d5e-4e05-90fe-f51c54a0244e" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:25:19.262590+01:00" LoggingEventType="2" severity="debug"/>
<record last_modified_tag="085672a7-5178-486a-844a-06a820886b0d" systemname="ADMIN-PC" username="SYSTEM" type="Update" source="Manual" datetime="2014-03-29T12:26:01.162648+01:00" LoggingEventType="1" severity="debug" toVersion="2014.3.29.1" name="Malware Database" fromVersion="2014.3.4.9"/>
<record subtype="Refresh" result="Starting" last_modified_tag="45ed514b-b4b6-4772-91c9-93ac3de2aa92" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:02.356652+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopping" last_modified_tag="8ac1b651-9478-4cf6-b260-b265c2428269" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:02.356652+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopped" last_modified_tag="46c2a52e-2a70-4439-84e2-199876506ffb" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:02.516653+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Refresh" result="Success" last_modified_tag="a12b5063-5fca-46df-818a-6e1b8d6cd42d" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:05.700661+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="66b37ff5-b1c6-4449-bba8-a38e11f181b8" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:05.720661+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="9e4e68ea-05e5-4740-a556-d8d802506e39" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T12:26:06.202663+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malware Protection" result="Starting" last_modified_tag="07b8e563-401e-4363-9f74-5ccefc7607e0" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:40:04.389892+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malware Protection" result="Started" last_modified_tag="d3e9a21d-2b36-4ff1-b348-c71cc24278f8" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:40:04.421093+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="11665845-48e7-4ef9-9de1-49f8fe9f7622" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:40:04.436693+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="7442f8ec-a5b3-4787-a8a0-0d14c995d9ce" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:40:34.295145+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" last_modified_tag="14f3d93d-7544-471b-9b29-d4cfdc55ebf9" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T19:43:23.477604+01:00" LoggingEventType="0" severity="debug" port="62361" malwaretype="IP" ip="185.8.106.66" domain="msdrv64.com" direction="Outbound" process="C:\Program Files\Internet Explorer\iexplore.exe"/>
<record subtype="Malicious Website Protection" last_modified_tag="49c02a98-d62d-4546-bf45-0b07c4fac2c9" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T19:43:23.527604+01:00" LoggingEventType="0" severity="debug" port="62361" malwaretype="IP" ip="185.8.106.66" domain="msdrv64.com" direction="Outbound" process="C:\Program Files\Internet Explorer\iexplore.exe"/>
<record subtype="Malware Protection" last_modified_tag="811bf5fd-da11-4f71-81fc-8c3894bf6d47" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T19:44:50.340877+01:00" LoggingEventType="0" severity="debug" malwaretype="File" vendor="Trojan.BitMiner" hash="b84df7122d4e71c51563106355acf40c" filename="C:\Windows\inf\mncpags\mncpags.exe" action="Quarantine"/>
<record subtype="Malware Protection" last_modified_tag="0665b378-4db4-43c9-b3a5-1e77dcf01ba3" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T19:46:03.296417+01:00" LoggingEventType="0" severity="debug" malwaretype="File" vendor="Trojan.BitMiner" hash="b84df7122d4e71c51563106355acf40c" filename="c:\windows\inf\mncpags\mncpags.exe" action="Quarantine"/>
<record result="Failed" last_modified_tag="8bffc437-5d68-46c9-8dbc-db932352628d" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:46:03.403423+01:00" LoggingEventType="2" severity="debug" filename="c:\windows\inf\mncpags\mncpags.exe" message="SDKQuarantine" code="1"/>
<record result="Failed" last_modified_tag="8bffc437-5d68-46c9-8dbc-db932352628d" systemname="ADMIN-PC" username="SYSTEM" type="Error" source="Protection" datetime="2014-03-29T19:46:03.408423+01:00" LoggingEventType="4" severity="debug" filename="c:\windows\inf\mncpags\mncpags.exe" message="SDKQuarantine" code="1"/>
<record last_modified_tag="2a679423-a3a7-4799-a594-34ae4db6894a" systemname="ADMIN-PC" username="SYSTEM" type="Update" source="Scheduler" datetime="2014-03-29T19:46:56.330450+01:00" LoggingEventType="1" severity="debug" toVersion="2014.3.29.4" name="Malware Database" fromVersion="2014.3.29.1"/>
<record subtype="Refresh" result="Starting" last_modified_tag="b9e3477e-db6e-427d-aa10-5c09ea84d79e" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:46:57.403511+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopping" last_modified_tag="f419309e-21e7-4660-8a26-9ec44b7f912d" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:46:57.412512+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopped" last_modified_tag="67a7d05d-024d-4429-b38d-9b1db2ee2658" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:46:57.539519+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Refresh" result="Success" last_modified_tag="f71ecf2e-e04a-4503-be9d-ef0125550672" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:47:01.026719+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="433d2964-17a7-4335-af6e-8c102c5ea493" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:47:01.047720+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="3c2f5a67-7c54-4c95-9ee3-8972a1276984" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T19:47:01.580750+01:00" LoggingEventType="2" severity="debug"/>
<record last_modified_tag="29584987-1f23-4074-9260-7d5e0aee56a5" systemname="ADMIN-PC" username="SYSTEM" type="Update" source="Scheduler" datetime="2014-03-29T20:34:13.156605+01:00" LoggingEventType="1" severity="debug" toVersion="2014.3.29.5" name="Malware Database" fromVersion="2014.3.29.4"/>
<record subtype="Refresh" result="Starting" last_modified_tag="580ce1a9-9a76-448f-8f96-6fa18a3282de" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:14.427614+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopping" last_modified_tag="f9275395-4f39-404e-86b3-5e6c63373bc1" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:14.437614+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopped" last_modified_tag="7890ddf5-0c9d-4faf-b868-533d5c092a55" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:14.577614+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Refresh" result="Success" last_modified_tag="d1950abe-6597-4674-83aa-e9f7204e2572" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:18.121646+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="0656f956-754c-42dd-9ff1-b10bb7dd924e" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:18.150647+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="d0ccf8b0-9514-449f-8627-40d44cd53647" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T20:34:18.769650+01:00" LoggingEventType="2" severity="debug"/>
<record last_modified_tag="cb444d83-5f4c-4521-ba28-d92d89bde847" systemname="ADMIN-PC" username="SYSTEM" type="Update" source="Scheduler" datetime="2014-03-29T21:36:51.491985+01:00" LoggingEventType="1" severity="debug" toVersion="2014.3.29.6" name="Malware Database" fromVersion="2014.3.29.5"/>
<record subtype="Refresh" result="Starting" last_modified_tag="7b5bba6a-28aa-42b9-a891-0838c7793fa3" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:52.587997+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopping" last_modified_tag="230a4864-bb4b-4e18-aa72-aecd793223db" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:52.597997+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Stopped" last_modified_tag="caf6ec83-cd4d-485e-81ac-4b4e58bf7263" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:52.719998+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Refresh" result="Success" last_modified_tag="965c12d4-bdd4-49d1-a1d8-ffbf64ae6f3a" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:56.380041+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="f3f039d9-66a8-4548-a204-2a815f9bc21d" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:56.407042+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="7e135fb2-3dc0-4f93-84e9-741c28823207" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T21:36:57.012046+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" last_modified_tag="e9d07c69-9ffd-4a47-806b-753b718743c3" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T22:19:31.159708+01:00" LoggingEventType="0" severity="debug" port="63051" malwaretype="IP" ip="103.31.186.13" domain="mubdykneqwut.dyndns.biz" direction="Outbound" process="C:\Program Files\Mozilla Firefox\firefox.exe"/>
<record subtype="Malicious Website Protection" last_modified_tag="4b976b63-6291-4c44-a6d5-028ad1335864" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T22:19:31.259713+01:00" LoggingEventType="0" severity="debug" port="63051" malwaretype="IP" ip="103.31.186.13" domain="mubdykneqwut.dyndns.biz" direction="Outbound" process="C:\Program Files\Mozilla Firefox\firefox.exe"/>
<record subtype="Malicious Website Protection" last_modified_tag="72403b94-c5f2-4dff-b95d-bfbd09df14d6" systemname="ADMIN-PC" username="SYSTEM" type="Detection" source="Protection" datetime="2014-03-29T22:19:31.386721+01:00" LoggingEventType="0" severity="debug" port="63052" malwaretype="IP" ip="103.31.186.13" domain="mubdykneqwut.dyndns.biz" direction="Outbound" process="C:\Program Files\Mozilla Firefox\firefox.exe"/>
<record subtype="Malware Protection" result="Starting" last_modified_tag="9f6b0e21-6284-43f4-8216-724716ce132a" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T22:53:01.292466+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malware Protection" result="Started" last_modified_tag="2e7da098-0ffd-413b-abbb-f60441ba3247" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T22:53:01.342466+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Starting" last_modified_tag="b9428991-0140-4a22-84a1-68beca6eafca" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T22:53:01.352466+01:00" LoggingEventType="2" severity="debug"/>
<record subtype="Malicious Website Protection" result="Started" last_modified_tag="5c328d42-23c3-47bd-b19b-9bb597cc0225" systemname="ADMIN-PC" username="SYSTEM" type="Protection" source="Protection" datetime="2014-03-29T22:53:45.320343+01:00" LoggingEventType="2" severity="debug"/>
</logs>
# AdwCleaner v3.022 - Report created 29/03/2014 at 23:12:04
# Updated 13/03/2014 by Xplode
# Operating System : Windows 7 Ultimate Service Pack 1 (32 bits)
# Username : Admin - ADMIN-PC
# Running from : C:\Users\Admin\Downloads\adwcleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\Windows\system32\AI_RecycleBin
Folder Deleted : C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ni55833.default\CT3289075
Folder Deleted : C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ni55833.default\Extensions\{96f454ea-9d38-474f-b504-56193e00c1a5}
File Deleted : C:\END
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.16521
-\\ Mozilla Firefox v28.0 (cs)
[ File : C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ni55833.default\prefs.js ]
Line Deleted : user_pref("CT3289075.FF19Solved", "true");
Line Deleted : user_pref("CT3289075.UserID", "UN14680876221108692");
Line Deleted : user_pref("CT3289075.fullUserID", "UN14680876221108692.IN.20140315004208");
Line Deleted : user_pref("CT3289075.installDate", "15/03/2014 00:42:12");
Line Deleted : user_pref("CT3289075.installSessionId", "{ABEEA609-3007-402D-9EFF-D386A3E9EE40}");
Line Deleted : user_pref("CT3289075.installSp", "false");
Line Deleted : user_pref("CT3289075.installerVersion", "1.8.1.4");
Line Deleted : user_pref("CT3289075.searchRevert", "false");
Line Deleted : user_pref("CT3289075.searchUninstallUserMode", "1");
Line Deleted : user_pref("CT3289075.searchUserMode", "1");
Line Deleted : user_pref("CT3289075.toolbarInstallDate", "15-03-2014 00:42:09");
Line Deleted : user_pref("CT3289075.versionFromInstaller", "10.23.0.722");
Line Deleted : user_pref("CT3289075.xpeMode", "1");
Line Deleted : user_pref("smartbar.machineId", "NN1+8/YIRJPGWCWV0TSK3AJJMUDV7BSBUXHAOGLJFZQ+IYJIWNFU6NL8THT9KLJOW3WCYNJ77E3XOEWSJXSMGG");
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [2324 octets] - [29/03/2014 23:08:09]
AdwCleaner[S0].txt - [2289 octets] - [29/03/2014 23:12:04]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [2349 octets] ##########
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.3 (03.23.2014:1)
OS: Windows 7 Ultimate x86
Ran by Admin on so 29.03.2014 at 23:23:32,41
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
~~~ Files
~~~ Folders
~~~ FireFox
Emptied folder: C:\Users\Admin\AppData\Roaming\mozilla\firefox\profiles\4ni55833.default\minidumps [30 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on so 29.03.2014 at 23:25:14,65
Computer was rebooted
End of JRT log
RogueKiller V8.8.15 [Mar 27 2014] by Adlice Software
mail :
http://www.adlice.com/contact/Podpora :
http://forum.adlice.comWebové stránky :
http://www.adlice.com/softwares/roguekiller/ :
http://www.adlice.comOperační systém : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Spuštěno v : Normální režim
Uživatel : Admin [Práva správce]
Mód : Kontrola -- Datum : 03/29/2014 23:35:07
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NAHRÁNO] ¤¤¤
[Address] EAT @explorer.exe (BeginBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F09AE)
[Address] EAT @explorer.exe (BeginBufferedPaint) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E49A1)
[Address] EAT @explorer.exe (BeginPanningFeedback) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74610731)
[Address] EAT @explorer.exe (BufferedPaintClear) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E6395)
[Address] EAT @explorer.exe (BufferedPaintInit) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E940E)
[Address] EAT @explorer.exe (BufferedPaintRenderAnimation) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F08ED)
[Address] EAT @explorer.exe (BufferedPaintSetAlpha) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745FE6B3)
[Address] EAT @explorer.exe (BufferedPaintStopAllAnimations) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745FD395)
[Address] EAT @explorer.exe (BufferedPaintUnInit) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E94AB)
[Address] EAT @explorer.exe (CloseThemeData) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E6A18)
[Address] EAT @explorer.exe (DrawThemeBackground) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E3982)
[Address] EAT @explorer.exe (DrawThemeBackgroundEx) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745FD9DA)
[Address] EAT @explorer.exe (DrawThemeEdge) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74603B52)
[Address] EAT @explorer.exe (DrawThemeIcon) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x746135E7)
[Address] EAT @explorer.exe (DrawThemeParentBackground) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E53E5)
[Address] EAT @explorer.exe (DrawThemeParentBackgroundEx) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E51BF)
[Address] EAT @explorer.exe (DrawThemeText) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E4EA1)
[Address] EAT @explorer.exe (DrawThemeTextEx) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E63E6)
[Address] EAT @explorer.exe (EnableThemeDialogTexture) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EFCAF)
[Address] EAT @explorer.exe (EnableTheming) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612FEB)
[Address] EAT @explorer.exe (EndBufferedAnimation) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E3F9A)
[Address] EAT @explorer.exe (EndBufferedPaint) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E3F9A)
[Address] EAT @explorer.exe (EndPanningFeedback) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x746106CC)
[Address] EAT @explorer.exe (GetBufferedPaintBits) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E4BAF)
[Address] EAT @explorer.exe (GetBufferedPaintDC) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F04BC)
[Address] EAT @explorer.exe (GetBufferedPaintTargetDC) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F0473)
[Address] EAT @explorer.exe (GetBufferedPaintTargetRect) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612E7F)
[Address] EAT @explorer.exe (GetCurrentThemeName) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F05DD)
[Address] EAT @explorer.exe (GetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F0FB1)
[Address] EAT @explorer.exe (GetThemeBackgroundContentRect) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745ECD2E)
[Address] EAT @explorer.exe (GetThemeBackgroundExtent) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EF8BF)
[Address] EAT @explorer.exe (GetThemeBackgroundRegion) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F165D)
[Address] EAT @explorer.exe (GetThemeBitmap) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EBF93)
[Address] EAT @explorer.exe (GetThemeBool) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E7C1F)
[Address] EAT @explorer.exe (GetThemeColor) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E616C)
[Address] EAT @explorer.exe (GetThemeDocumentationProperty) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612932)
[Address] EAT @explorer.exe (GetThemeEnumValue) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E616C)
[Address] EAT @explorer.exe (GetThemeFilename) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612412)
[Address] EAT @explorer.exe (GetThemeFont) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EFF21)
[Address] EAT @explorer.exe (GetThemeInt) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E616C)
[Address] EAT @explorer.exe (GetThemeIntList) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x746123B1)
[Address] EAT @explorer.exe (GetThemeMargins) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E86E9)
[Address] EAT @explorer.exe (GetThemeMetric) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F06E2)
[Address] EAT @explorer.exe (GetThemePartSize) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745ECDB1)
[Address] EAT @explorer.exe (GetThemePosition) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612350)
[Address] EAT @explorer.exe (GetThemePropertyOrigin) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74603FBB)
[Address] EAT @explorer.exe (GetThemeRect) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F3611)
[Address] EAT @explorer.exe (GetThemeStream) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F39D9)
[Address] EAT @explorer.exe (GetThemeString) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x746122E4)
[Address] EAT @explorer.exe (GetThemeSysBool) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74613172)
[Address] EAT @explorer.exe (GetThemeSysColor) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74603274)
[Address] EAT @explorer.exe (GetThemeSysColorBrush) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x7461301E)
[Address] EAT @explorer.exe (GetThemeSysFont) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x746129C4)
[Address] EAT @explorer.exe (GetThemeSysInt) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612BD3)
[Address] EAT @explorer.exe (GetThemeSysSize) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x7461320B)
[Address] EAT @explorer.exe (GetThemeSysString) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74612B3F)
[Address] EAT @explorer.exe (GetThemeTextExtent) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E2D57)
[Address] EAT @explorer.exe (GetThemeTextMetrics) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EF992)
[Address] EAT @explorer.exe (GetThemeTransitionDuration) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F1081)
[Address] EAT @explorer.exe (GetWindowTheme) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EDF46)
[Address] EAT @explorer.exe (HitTestThemeBackground) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F3CE3)
[Address] EAT @explorer.exe (IsAppThemed) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EF869)
[Address] EAT @explorer.exe (IsCompositionActive) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E2E9A)
[Address] EAT @explorer.exe (IsThemeActive) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EF785)
[Address] EAT @explorer.exe (IsThemeBackgroundPartiallyTransparent) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E60AB)
[Address] EAT @explorer.exe (IsThemeDialogTextureEnabled) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x7461312B)
[Address] EAT @explorer.exe (IsThemePartDefined) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E85B4)
[Address] EAT @explorer.exe (OpenThemeData) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745E73D2)
[Address] EAT @explorer.exe (OpenThemeDataEx) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74603D43)
[Address] EAT @explorer.exe (SetThemeAppProperties) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x74613296)
[Address] EAT @explorer.exe (SetWindowTheme) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745F0134)
[Address] EAT @explorer.exe (SetWindowThemeAttribute) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745FCFE6)
[Address] EAT @explorer.exe (ThemeInitApiHook) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x745EB176)
[Address] EAT @explorer.exe (UpdatePanningFeedback) : PROPSYS.dll -> HOOKED (C:\Windows\system32\UxTheme.dll @ 0x7461068D)
[Address] EAT @explorer.exe (DllGetClassObject) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417CF9D)
[Address] EAT @explorer.exe (IEnumString_Next_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E000)
[Address] EAT @explorer.exe (IEnumString_Reset_WIC_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E029)
[Address] EAT @explorer.exe (IPropertyBag2_Write_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E049)
[Address] EAT @explorer.exe (IWICBitmapClipper_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD2A)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportAnimation_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EA9A)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportLossless_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EABD)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_DoesSupportMultiframe_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EAE0)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E9D3)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceManufacturer_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E9F6)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetDeviceModels_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EA1F)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetFileExtensions_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EA71)
[Address] EAT @explorer.exe (IWICBitmapCodecInfo_GetMimeTypes_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EA48)
[Address] EAT @explorer.exe (IWICBitmapDecoder_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D845)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E9AA)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetDecoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D822)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrameCount_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D9A2)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetFrame_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D868)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D8DA)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetPreview_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC74)
[Address] EAT @explorer.exe (IWICBitmapDecoder_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E9D3)
[Address] EAT @explorer.exe (IWICBitmapEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC05)
[Address] EAT @explorer.exe (IWICBitmapEncoder_CreateNewFrame_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DB87)
[Address] EAT @explorer.exe (IWICBitmapEncoder_GetEncoderInfo_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DB5E)
[Address] EAT @explorer.exe (IWICBitmapEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D9A2)
[Address] EAT @explorer.exe (IWICBitmapEncoder_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DB32)
[Address] EAT @explorer.exe (IWICBitmapEncoder_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DBDC)
[Address] EAT @explorer.exe (IWICBitmapEncoder_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DBB3)
[Address] EAT @explorer.exe (IWICBitmapFlipRotator_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD2A)
[Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D88E)
[Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetMetadataQueryReader_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D8DA)
[Address] EAT @explorer.exe (IWICBitmapFrameDecode_GetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D8B7)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D9C5)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB03)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DFB7)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetColorContexts_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DB06)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DA17)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetSize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D9E5)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_SetThumbnail_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DADD)
[Address] EAT @explorer.exe (IWICBitmapFrameEncode_WriteSource_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DA71)
[Address] EAT @explorer.exe (IWICBitmapLock_GetDataPointer_STA_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7FC)
[Address] EAT @explorer.exe (IWICBitmapLock_GetStride_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC25)
[Address] EAT @explorer.exe (IWICBitmapScaler_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DCFE)
[Address] EAT @explorer.exe (IWICBitmapSource_CopyPalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D822)
[Address] EAT @explorer.exe (IWICBitmapSource_CopyPixels_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC48)
[Address] EAT @explorer.exe (IWICBitmapSource_GetPixelFormat_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC25)
[Address] EAT @explorer.exe (IWICBitmapSource_GetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7FC)
[Address] EAT @explorer.exe (IWICBitmapSource_GetSize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D91D)
[Address] EAT @explorer.exe (IWICBitmap_Lock_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E981)
[Address] EAT @explorer.exe (IWICBitmap_SetPalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC74)
[Address] EAT @explorer.exe (IWICBitmap_SetResolution_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC97)
[Address] EAT @explorer.exe (IWICColorContext_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB75)
[Address] EAT @explorer.exe (IWICComponentFactory_CreateMetadataWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7AA)
[Address] EAT @explorer.exe (IWICComponentFactory_CreateQueryWriterFromBlockWriter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7D3)
[Address] EAT @explorer.exe (IWICComponentInfo_GetAuthor_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E958)
[Address] EAT @explorer.exe (IWICComponentInfo_GetCLSID_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC25)
[Address] EAT @explorer.exe (IWICComponentInfo_GetFriendlyName_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E9AA)
[Address] EAT @explorer.exe (IWICComponentInfo_GetSpecVersion_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D88E)
[Address] EAT @explorer.exe (IWICComponentInfo_GetVersion_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E981)
[Address] EAT @explorer.exe (IWICFastMetadataEncoder_Commit_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D8FD)
[Address] EAT @explorer.exe (IWICFastMetadataEncoder_GetMetadataQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC25)
[Address] EAT @explorer.exe (IWICFormatConverter_Initialize_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DCC7)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapClipper_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D557)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFlipRotator_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D580)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHBITMAP_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D6BA)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromHICON_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D6E6)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D656)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapFromSource_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D62D)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmapScaler_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D52E)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D68B)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateComponentInfo_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D4D9)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFileHandle_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D4A1)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromFilename_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D466)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateDecoderFromStream_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D42E)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateEncoder_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D5D2)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromDecoder_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D70C)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateFastMetadataEncoderFromFrameDecode_Prox>Ê) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D732)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateFormatConverter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D505)
[Address] EAT @explorer.exe (IWICImagingFactory_CreatePalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DADD)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriterFromReader_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D781)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateQueryWriter_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D758)
[Address] EAT @explorer.exe (IWICImagingFactory_CreateStream_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D5A9)
[Address] EAT @explorer.exe (IWICMetadataBlockReader_GetCount_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DC25)
[Address] EAT @explorer.exe (IWICMetadataBlockReader_GetReaderByIndex_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7FC)
[Address] EAT @explorer.exe (IWICMetadataQueryReader_GetContainerFormat_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DFB7)
[Address] EAT @explorer.exe (IWICMetadataQueryReader_GetEnumerator_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D822)
[Address] EAT @explorer.exe (IWICMetadataQueryReader_GetLocation_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E049)
[Address] EAT @explorer.exe (IWICMetadataQueryReader_GetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D7FC)
[Address] EAT @explorer.exe (IWICMetadataQueryWriter_RemoveMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D8DA)
[Address] EAT @explorer.exe (IWICMetadataQueryWriter_SetMetadataByName_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DFDA)
[Address] EAT @explorer.exe (IWICPalette_GetColorCount_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D96C)
[Address] EAT @explorer.exe (IWICPalette_GetColors_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D88E)
[Address] EAT @explorer.exe (IWICPalette_GetType_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D845)
[Address] EAT @explorer.exe (IWICPalette_HasAlpha_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D9A2)
[Address] EAT @explorer.exe (IWICPalette_InitializeCustom_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB75)
[Address] EAT @explorer.exe (IWICPalette_InitializeFromBitmap_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D943)
[Address] EAT @explorer.exe (IWICPalette_InitializeFromPalette_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D822)
[Address] EAT @explorer.exe (IWICPalette_InitializePredefined_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D91D)
[Address] EAT @explorer.exe (IWICPixelFormatInfo_GetBitsPerPixel_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB03)
[Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelCount_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD50)
[Address] EAT @explorer.exe (IWICPixelFormatInfo_GetChannelMask_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB26)
[Address] EAT @explorer.exe (IWICStream_InitializeFromIStream_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD50)
[Address] EAT @explorer.exe (IWICStream_InitializeFromMemory_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD73)
[Address] EAT @explorer.exe (WICConvertBitmapSource) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DDB8)
[Address] EAT @explorer.exe (WICCreateBitmapFromSection) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DF8D)
[Address] EAT @explorer.exe (WICCreateBitmapFromSectionEx) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DE8C)
[Address] EAT @explorer.exe (WICCreateColorContext_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417EB52)
[Address] EAT @explorer.exe (WICCreateImagingFactory_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D02B)
[Address] EAT @explorer.exe (WICGetMetadataContentSize) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E61D)
[Address] EAT @explorer.exe (WICMapGuidToShortName) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D0EC)
[Address] EAT @explorer.exe (WICMapSchemaToName) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D2E0)
[Address] EAT @explorer.exe (WICMapShortNameToGuid) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417D217)
[Address] EAT @explorer.exe (WICMatchMetadataContent) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E072)
[Address] EAT @explorer.exe (WICSerializeMetadataContent) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417E1B4)
[Address] EAT @explorer.exe (WICSetEncoderFormat_Proxy) : XmlLite.dll -> HOOKED (C:\Windows\system32\WindowsCodecs.dll @ 0x7417DD99)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD800JB-00JJA0 ATA Device +++++
--- User ---
[MBR] ac2f17d530c3f24ed0e6bcba3e533331
[BSP] 2c3fd9afef49606bb390baf270ef5165 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 76217 MB
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[0]_S_03292014_233507.txt >>
Tak snad to je všechno to, co potrebujes