Ahoj lidi, prosim o Vas o radu : Moje PC je uz celkem starecek (HW jednou za cas obmenuji tudiz tak nejak drzim krok s dobou), nikdy s nim nebyly nejake prehnane problemy az do doby kdy mi to zacalo hlasit ze muj sys. disk je temer plny. Koukal jsem kde muze byt problem a ten jsem nalezl ve slozce widli (mam origo visty) ktere mely za dobu nekolika let velikost temer 80Gb.. Rozhodl jsem se uz kvuli tomuto a dale treba i celkovemu zpomaleni reinstalovat : Ted k veci..Od te doby obcasne zamrzani jen tak kdyz necham pc dele v necinosti a nebo tzv. modra smrt pri pousteni si videa na youtube ci stream atd. Snazil jsem se reinstalovat vsechny mozne ovladace od zakladni desky az po grafiku ale zatim bez uspechu. Pokud by nekoho z Vas mistru zde napadlo co s tim, budu rad :)
Jo a jeste po startu Pc se mi zacala objevovat hlaska : Program hydraDm.exe je jiz spusten, nebo tak podobne.
ps:Za vycerpavajci psani se omlouvam, ale jsem vicemene lajk a tak jsem chtel problem popsat tak nejak od zakladu. V priloze posilam pro vsechny pripady log z hjt. Automaticke kontrole na webu neverim a asi bych se v tom ani nevyznal :) diky
zamrzani pc po reinstalaci Vyřešeno
Re: zamrzani pc po reinstalaci
Než se tě tu někdo ujme, log vlož, prosím, normálně jako text do těla příspěvku, nikoli jako přílohu. Normálně obsah toho texťáku zkopíruj přes schránku.
- Než položíte dotaz, nejprve se ptejte strejdy Gůůgla.
- Výňatek z pravidel fóra PC-HELP:
- Název tématu zvolte takový, aby co nejvýstižněji charakterizoval obsah tématu.
- Nesnažte se řešit jiný problém (i když podobný) v jednom tématu. Raději založte nové téma.
- Mýliti se je Myloš.
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43292
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: zamrzani pc po reinstalaci
Tak tak..
Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
Stáhni AdwCleaner (by Xplode)
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
Stáhni si Malwarebytes' Anti-Malware
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a nech vybranou možnost Provést rychlý sken a klikni na tlačítko Skenovat
- po proběhnutí programu se ti objeví hláška tak klikni na OK a pak na tlačítko Zobrazit výsledky
- pak zvol možnost uložit log a ulož si log na plochu
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Vlož sem pak obsah toho logu.
Pokud budou problémy , spusť v nouz. režimu.
Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
Stáhni AdwCleaner (by Xplode)
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
Stáhni si Malwarebytes' Anti-Malware
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a nech vybranou možnost Provést rychlý sken a klikni na tlačítko Skenovat
- po proběhnutí programu se ti objeví hláška tak klikni na OK a pak na tlačítko Zobrazit výsledky
- pak zvol možnost uložit log a ulož si log na plochu
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Vlož sem pak obsah toho logu.
Pokud budou problémy , spusť v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Re: zamrzani pc po reinstalaci
Log z hjt zde a jdu se vrhnout na to co popsal JARO3..
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 22:32:25, on 3.4.2014
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16982)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe
D:\Program Files (x86)\AVG\AVG2014\avgui.exe
D:\Program Files (x86)\Mozilla Firefox\firefox.exe
D:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Users\Condorito\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [AVG_UI] "D:\Program Files (x86)\AVG\AVG2014\avgui.exe" /TRAYONLY
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files (x86)\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [AVG-Secure-Search-Update_1213b] C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b
O4 - HKCU\..\Run: [DAEMON Tools Lite] "D:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKCU\..\Run: [HydraVisionDesktopManager] "C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe"
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: AVGIDSAgent - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgidsagent.exe
O23 - Service: AVG WatchDog (avgwd) - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgwdsvc.exe
O23 - Service: @dfsrres.dll,-101 (DFSR) - Unknown owner - C:\Windows\system32\DFSR.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - D:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\SLsvc.exe,-101 (slsvc) - Unknown owner - C:\Windows\system32\SLsvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 6278 bytes
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 22:32:25, on 3.4.2014
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16982)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe
D:\Program Files (x86)\AVG\AVG2014\avgui.exe
D:\Program Files (x86)\Mozilla Firefox\firefox.exe
D:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Users\Condorito\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [AVG_UI] "D:\Program Files (x86)\AVG\AVG2014\avgui.exe" /TRAYONLY
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files (x86)\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [AVG-Secure-Search-Update_1213b] C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b
O4 - HKCU\..\Run: [DAEMON Tools Lite] "D:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKCU\..\Run: [HydraVisionDesktopManager] "C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe"
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: AVGIDSAgent - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgidsagent.exe
O23 - Service: AVG WatchDog (avgwd) - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgwdsvc.exe
O23 - Service: @dfsrres.dll,-101 (DFSR) - Unknown owner - C:\Windows\system32\DFSR.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - D:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\SLsvc.exe,-101 (slsvc) - Unknown owner - C:\Windows\system32\SLsvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 6278 bytes
Re: zamrzani pc po reinstalaci
AdwCleaner log
# AdwCleaner v3.023 - Report created 03/04/2014 at 23:14:44
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Scan
***** [ Services ] *****
***** [ Files / Folders ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Found : HKCU\Software\AppDataLow\Software\SmartBar
Key Found : HKCU\Software\AVG Secure Search
Key Found : HKCU\Software\Conduit
Key Found : [x64] HKCU\Software\AVG Secure Search
Key Found : [x64] HKCU\Software\Conduit
Key Found : HKLM\Software\Conduit
***** [ Browsers ] *****
-\\ Internet Explorer v7.0.6000.16982
-\\ Mozilla Firefox v28.0 (cs)
[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1024 octets] - [03/04/2014 23:14:44]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1084 octets] ##########
# AdwCleaner v3.023 - Report created 03/04/2014 at 23:14:44
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Scan
***** [ Services ] *****
***** [ Files / Folders ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Found : HKCU\Software\AppDataLow\Software\SmartBar
Key Found : HKCU\Software\AVG Secure Search
Key Found : HKCU\Software\Conduit
Key Found : [x64] HKCU\Software\AVG Secure Search
Key Found : [x64] HKCU\Software\Conduit
Key Found : HKLM\Software\Conduit
***** [ Browsers ] *****
-\\ Internet Explorer v7.0.6000.16982
-\\ Mozilla Firefox v28.0 (cs)
[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1024 octets] - [03/04/2014 23:14:44]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1084 octets] ##########
Re: zamrzani pc po reinstalaci
Tak a posledni log je tu z Malwarebytes' Anti-Malware ..
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 3.4.2014
Scan Time: 23:23:56
Logfile: log.txt
Administrator: Yes
Version: 2.00.0.1000
Malware Database: v2014.04.03.09
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled
OS: Windows Vista
CPU: x64
File System: NTFS
User: Condorito
Scan Type: Hyper Scan
Result: Completed
Objects Scanned: 193977
Time Elapsed: 1 min, 3 sec
Memory: Enabled
Startup: Enabled
Filesystem: Disabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 0
(No malicious items detected)
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 0
(No malicious items detected)
Physical Sectors: 0
(No malicious items detected)
(end)
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 3.4.2014
Scan Time: 23:23:56
Logfile: log.txt
Administrator: Yes
Version: 2.00.0.1000
Malware Database: v2014.04.03.09
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled
OS: Windows Vista
CPU: x64
File System: NTFS
User: Condorito
Scan Type: Hyper Scan
Result: Completed
Objects Scanned: 193977
Time Elapsed: 1 min, 3 sec
Memory: Enabled
Startup: Enabled
Filesystem: Disabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 0
(No malicious items detected)
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 0
(No malicious items detected)
Physical Sectors: 0
(No malicious items detected)
(end)
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43292
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: zamrzani pc po reinstalaci
Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce“
klikni na „Prohledat-Scan“, po prohledání klikni na „ Vymazat-Clean“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
Stáhni si Junkware Removal Tool by Thisisu
na svojí plochu.
Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Platform: Windows Vista (WinNT 6.00.1904) doinstaluj si SP2!
klikni na „Prohledat-Scan“, po prohledání klikni na „ Vymazat-Clean“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
Stáhni si Junkware Removal Tool by Thisisu
na svojí plochu.
Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Platform: Windows Vista (WinNT 6.00.1904) doinstaluj si SP2!
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Re: zamrzani pc po reinstalaci
zde je log po restartu z adwcleaner
# AdwCleaner v3.023 - Report created 07/04/2014 at 15:14:31
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKCU\Software\AVG Secure Search
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKLM\Software\Conduit
***** [ Browsers ] *****
-\\ Internet Explorer v7.0.6000.16982
-\\ Mozilla Firefox v28.0 (cs)
[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1172 octets] - [03/04/2014 23:14:44]
AdwCleaner[R1].txt - [1232 octets] - [07/04/2014 15:13:15]
AdwCleaner[S0].txt - [1069 octets] - [07/04/2014 15:14:31]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1129 octets] ##########
Ja jdu zatim na krok 2
# AdwCleaner v3.023 - Report created 07/04/2014 at 15:14:31
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKCU\Software\AVG Secure Search
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKLM\Software\Conduit
***** [ Browsers ] *****
-\\ Internet Explorer v7.0.6000.16982
-\\ Mozilla Firefox v28.0 (cs)
[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]
-\\ Google Chrome v33.0.1750.154
[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1172 octets] - [03/04/2014 23:14:44]
AdwCleaner[R1].txt - [1232 octets] - [07/04/2014 15:13:15]
AdwCleaner[S0].txt - [1069 octets] - [07/04/2014 15:14:31]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1129 octets] ##########
Ja jdu zatim na krok 2
Re: zamrzani pc po reinstalaci
Tak ani to dlouho netrvalo snad tri minutky (log z JRT)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows (TM) Vista Home Premium x64
Ran by Condorito on po 07.04.2014 at 15:22:04,99
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL
~~~ Registry Keys
~~~ Files
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 07.04.2014 at 15:28:30,03
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows (TM) Vista Home Premium x64
Ran by Condorito on po 07.04.2014 at 15:22:04,99
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL
~~~ Registry Keys
~~~ Files
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 07.04.2014 at 15:28:30,03
End of JRT log
Re: zamrzani pc po reinstalaci
A ten posledni je zde (roguekiller)
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Kontrola -- Datum : 04/07/2014 15:40:49
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> NALEZENO
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E87D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D58F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17AED0)
[Address] EAT @explorer.exe (CoBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (CoCancelCall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114840)
[Address] EAT @explorer.exe (CoCreateGuid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1290E0)
[Address] EAT @explorer.exe (CoCreateInstance) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD100280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CoFreeLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5870)
[Address] EAT @explorer.exe (CoGetCallState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C36E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD125840)
[Address] EAT @explorer.exe (CoGetClassVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD258390)
[Address] EAT @explorer.exe (CoGetComCatalog) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD113EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1014F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2402C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B180)
[Address] EAT @explorer.exe (CoGetInterceptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD213B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ECAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B010)
[Address] EAT @explorer.exe (CoGetMalloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD121290)
[Address] EAT @explorer.exe (CoGetModuleType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA300)
[Address] EAT @explorer.exe (CoGetObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E7980)
[Address] EAT @explorer.exe (CoGetObjectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1375E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1098B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD101B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD242530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5AC0)
[Address] EAT @explorer.exe (CoInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10B540)
[Address] EAT @explorer.exe (CoInitializeEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD111CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A370)
[Address] EAT @explorer.exe (CoInstall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D7B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201230)
[Address] EAT @explorer.exe (CoIsOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201520)
[Address] EAT @explorer.exe (CoLoadLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2428C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD239D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1297D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2236B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD112770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F42F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1149B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1084D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD240240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD230BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD107C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E68C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F4C80)
[Address] EAT @explorer.exe (CoRetireServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F51E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD108860)
[Address] EAT @explorer.exe (CoSetState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD236D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D980)
[Address] EAT @explorer.exe (CoTestCancel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F020)
[Address] EAT @explorer.exe (CoUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD124680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FFE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1029D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C840)
[Address] EAT @explorer.exe (CreateBindCtx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1361E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F2070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBD60)
[Address] EAT @explorer.exe (CreateDataCache) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD221E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB780)
[Address] EAT @explorer.exe (CreateFileMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E8470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1658B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1798F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12E780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E580)
[Address] EAT @explorer.exe (DllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD229670)
[Address] EAT @explorer.exe (DoDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD269F40)
[Address] EAT @explorer.exe (EnableHookObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F6020)
[Address] EAT @explorer.exe (GetClassFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A2B0)
[Address] EAT @explorer.exe (GetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228C00)
[Address] EAT @explorer.exe (GetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D600)
[Address] EAT @explorer.exe (GetHookInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1030F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE90)
[Address] EAT @explorer.exe (HICON_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E83B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D46E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BB0)
[Address] EAT @explorer.exe (IIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC720)
[Address] EAT @explorer.exe (IsAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D480)
[Address] EAT @explorer.exe (IsValidIid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (IsValidInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134690)
[Address] EAT @explorer.exe (IsValidPtrIn) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD212C00)
[Address] EAT @explorer.exe (OleBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD264FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25D980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25E210)
[Address] EAT @explorer.exe (OleCreate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D0E0)
[Address] EAT @explorer.exe (OleCreateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E550)
[Address] EAT @explorer.exe (OleCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2704B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2702D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F5A0)
[Address] EAT @explorer.exe (OleCreateLink) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD270240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A260)
[Address] EAT @explorer.exe (OleDraw) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB570)
[Address] EAT @explorer.exe (OleDuplicateData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227380)
[Address] EAT @explorer.exe (OleGetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C5B0)
[Address] EAT @explorer.exe (OleInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26DE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23F520)
[Address] EAT @explorer.exe (OleIsRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB9D0)
[Address] EAT @explorer.exe (OleLoad) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBDB0)
[Address] EAT @explorer.exe (OleLockRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD243570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25BE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179990)
[Address] EAT @explorer.exe (OleRegGetUserType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227450)
[Address] EAT @explorer.exe (OleRun) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B770)
[Address] EAT @explorer.exe (OleSave) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2088F0)
[Address] EAT @explorer.exe (OleSetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A140)
[Address] EAT @explorer.exe (OleSetContainedObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9E40)
[Address] EAT @explorer.exe (OleUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16DC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5E40)
[Address] EAT @explorer.exe (PropSysAllocString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1790)
[Address] EAT @explorer.exe (PropSysFreeString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1780)
[Address] EAT @explorer.exe (PropVariantChangeType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225D60)
[Address] EAT @explorer.exe (PropVariantClear) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1345E0)
[Address] EAT @explorer.exe (PropVariantCopy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114690)
[Address] EAT @explorer.exe (ReadClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB820)
[Address] EAT @explorer.exe (ReadClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228AD0)
[Address] EAT @explorer.exe (ReadOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD263D20)
[Address] EAT @explorer.exe (ReadStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2669B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2602E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD260170)
[Address] EAT @explorer.exe (SetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD137750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2560D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD253C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F4B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B2800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD254D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EC60)
[Address] EAT @explorer.exe (StgOpenStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FE4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16C8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD178DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225730)
[Address] EAT @explorer.exe (StgSetTimes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1E40)
[Address] EAT @explorer.exe (StringFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116D40)
[Address] EAT @explorer.exe (StringFromIID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2584F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD237020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B34E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B30F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B3710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B33B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB7E0)
[Address] EAT @explorer.exe (WriteClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1794E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A0F0)
[Address] EAT @explorer.exe (WriteOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209A50)
[Address] EAT @explorer.exe (WriteStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC67A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC72710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC65250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC70730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC999F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC709D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC68BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC652B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6B8E0)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
127.0.0.1 localhost
::1 localhost
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
Dokončeno : << RKreport[0]_S_04072014_154049.txt >>
Mimochodem aktualizace Vist mi nenabizi sp2 nybrz pouze sp1 aktualizaci takze ani nevim kde jinde se po tom mam podivat :/
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Kontrola -- Datum : 04/07/2014 15:40:49
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> NALEZENO
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E87D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D58F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17AED0)
[Address] EAT @explorer.exe (CoBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (CoCancelCall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114840)
[Address] EAT @explorer.exe (CoCreateGuid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1290E0)
[Address] EAT @explorer.exe (CoCreateInstance) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD100280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CoFreeLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5870)
[Address] EAT @explorer.exe (CoGetCallState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C36E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD125840)
[Address] EAT @explorer.exe (CoGetClassVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD258390)
[Address] EAT @explorer.exe (CoGetComCatalog) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD113EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1014F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2402C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B180)
[Address] EAT @explorer.exe (CoGetInterceptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD213B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ECAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B010)
[Address] EAT @explorer.exe (CoGetMalloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD121290)
[Address] EAT @explorer.exe (CoGetModuleType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA300)
[Address] EAT @explorer.exe (CoGetObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E7980)
[Address] EAT @explorer.exe (CoGetObjectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1375E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1098B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD101B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD242530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5AC0)
[Address] EAT @explorer.exe (CoInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10B540)
[Address] EAT @explorer.exe (CoInitializeEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD111CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A370)
[Address] EAT @explorer.exe (CoInstall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D7B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201230)
[Address] EAT @explorer.exe (CoIsOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201520)
[Address] EAT @explorer.exe (CoLoadLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2428C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD239D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1297D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2236B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD112770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F42F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1149B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1084D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD240240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD230BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD107C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E68C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F4C80)
[Address] EAT @explorer.exe (CoRetireServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F51E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD108860)
[Address] EAT @explorer.exe (CoSetState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD236D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D980)
[Address] EAT @explorer.exe (CoTestCancel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F020)
[Address] EAT @explorer.exe (CoUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD124680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FFE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1029D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C840)
[Address] EAT @explorer.exe (CreateBindCtx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1361E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F2070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBD60)
[Address] EAT @explorer.exe (CreateDataCache) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD221E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB780)
[Address] EAT @explorer.exe (CreateFileMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E8470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1658B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1798F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12E780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E580)
[Address] EAT @explorer.exe (DllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD229670)
[Address] EAT @explorer.exe (DoDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD269F40)
[Address] EAT @explorer.exe (EnableHookObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F6020)
[Address] EAT @explorer.exe (GetClassFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A2B0)
[Address] EAT @explorer.exe (GetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228C00)
[Address] EAT @explorer.exe (GetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D600)
[Address] EAT @explorer.exe (GetHookInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1030F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE90)
[Address] EAT @explorer.exe (HICON_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E83B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D46E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BB0)
[Address] EAT @explorer.exe (IIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC720)
[Address] EAT @explorer.exe (IsAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D480)
[Address] EAT @explorer.exe (IsValidIid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (IsValidInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134690)
[Address] EAT @explorer.exe (IsValidPtrIn) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD212C00)
[Address] EAT @explorer.exe (OleBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD264FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25D980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25E210)
[Address] EAT @explorer.exe (OleCreate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D0E0)
[Address] EAT @explorer.exe (OleCreateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E550)
[Address] EAT @explorer.exe (OleCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2704B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2702D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F5A0)
[Address] EAT @explorer.exe (OleCreateLink) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD270240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A260)
[Address] EAT @explorer.exe (OleDraw) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB570)
[Address] EAT @explorer.exe (OleDuplicateData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227380)
[Address] EAT @explorer.exe (OleGetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C5B0)
[Address] EAT @explorer.exe (OleInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26DE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23F520)
[Address] EAT @explorer.exe (OleIsRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB9D0)
[Address] EAT @explorer.exe (OleLoad) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBDB0)
[Address] EAT @explorer.exe (OleLockRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD243570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25BE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179990)
[Address] EAT @explorer.exe (OleRegGetUserType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227450)
[Address] EAT @explorer.exe (OleRun) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B770)
[Address] EAT @explorer.exe (OleSave) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2088F0)
[Address] EAT @explorer.exe (OleSetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A140)
[Address] EAT @explorer.exe (OleSetContainedObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9E40)
[Address] EAT @explorer.exe (OleUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16DC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5E40)
[Address] EAT @explorer.exe (PropSysAllocString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1790)
[Address] EAT @explorer.exe (PropSysFreeString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1780)
[Address] EAT @explorer.exe (PropVariantChangeType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225D60)
[Address] EAT @explorer.exe (PropVariantClear) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1345E0)
[Address] EAT @explorer.exe (PropVariantCopy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114690)
[Address] EAT @explorer.exe (ReadClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB820)
[Address] EAT @explorer.exe (ReadClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228AD0)
[Address] EAT @explorer.exe (ReadOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD263D20)
[Address] EAT @explorer.exe (ReadStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2669B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2602E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD260170)
[Address] EAT @explorer.exe (SetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD137750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2560D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD253C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F4B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B2800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD254D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EC60)
[Address] EAT @explorer.exe (StgOpenStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FE4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16C8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD178DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225730)
[Address] EAT @explorer.exe (StgSetTimes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1E40)
[Address] EAT @explorer.exe (StringFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116D40)
[Address] EAT @explorer.exe (StringFromIID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2584F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD237020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B34E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B30F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B3710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B33B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB7E0)
[Address] EAT @explorer.exe (WriteClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1794E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A0F0)
[Address] EAT @explorer.exe (WriteOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209A50)
[Address] EAT @explorer.exe (WriteStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC67A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC72710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC65250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC70730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC999F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC709D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC68BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC652B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6B8E0)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
127.0.0.1 localhost
::1 localhost
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
Dokončeno : << RKreport[0]_S_04072014_154049.txt >>
Mimochodem aktualizace Vist mi nenabizi sp2 nybrz pouze sp1 aktualizaci takze ani nevim kde jinde se po tom mam podivat :/
- memphisto
- Guru Level 13
- Příspěvky: 21113
- Registrován: září 06
- Bydliště: Zlín - České Budějovice
- Pohlaví:
- Stav:
Offline
Re: zamrzani pc po reinstalaci
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje "Smazání- Finished "
- Klikni na "Zprávy " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Stáhni si TDSSKiller
Na svojí plochu. Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller.2.2.7.1._(datum)_log.txt , vlož sem prosím celý obsah logu.
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje "Smazání- Finished "
- Klikni na "Zprávy " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Stáhni si TDSSKiller
Na svojí plochu. Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller.2.2.7.1._(datum)_log.txt , vlož sem prosím celý obsah logu.
PRAVIDLA PC-HELP.CZ, PRAVIDLA sekce HijackThis, HijackThis návod, Memtest, CCleaner
Logy z programu HijackThis neposílejte prosím přes SZ, ale vkládejte je do patřičné sekce. Děkuji
Logy z programu HijackThis neposílejte prosím přes SZ, ale vkládejte je do patřičné sekce. Děkuji
Re: zamrzani pc po reinstalaci
zde je log z RogueKiller po smazani zmineneho...
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Odebrat -- Datum : 04/07/2014 20:52:19
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> VYMAZÁNO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> [0x2] Systém nemůže nalézt uvedený soubor.
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> VYMAZÁNO
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1687D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1558F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD064560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAED0)
[Address] EAT @explorer.exe (CoBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (CoCancelCall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07AC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094840)
[Address] EAT @explorer.exe (CoCreateGuid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A90E0)
[Address] EAT @explorer.exe (CoCreateInstance) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B34C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD080280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CoFreeLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075870)
[Address] EAT @explorer.exe (CoGetCallState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1436E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A5840)
[Address] EAT @explorer.exe (CoGetClassVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D8390)
[Address] EAT @explorer.exe (CoGetComCatalog) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD093EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0814F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C02C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB180)
[Address] EAT @explorer.exe (CoGetInterceptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD193B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD06CAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB010)
[Address] EAT @explorer.exe (CoGetMalloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A1290)
[Address] EAT @explorer.exe (CoGetModuleType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16A300)
[Address] EAT @explorer.exe (CoGetObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD067980)
[Address] EAT @explorer.exe (CoGetObjectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B75E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0898B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD081B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C2530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075AC0)
[Address] EAT @explorer.exe (CoInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08B540)
[Address] EAT @explorer.exe (CoInitializeEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD091CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA370)
[Address] EAT @explorer.exe (CoInstall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD157B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181230)
[Address] EAT @explorer.exe (CoIsOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181520)
[Address] EAT @explorer.exe (CoLoadLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C28C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16FA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B9D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A97D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A36B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD092770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0742F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0949B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0884D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B0BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD079DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD087C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0668C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD074C80)
[Address] EAT @explorer.exe (CoRetireServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0751E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD088860)
[Address] EAT @explorer.exe (CoSetState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD072DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D980)
[Address] EAT @explorer.exe (CoTestCancel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F020)
[Address] EAT @explorer.exe (CoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A4680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17FE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD140140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0829D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C840)
[Address] EAT @explorer.exe (CreateBindCtx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B61E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BD60)
[Address] EAT @explorer.exe (CreateDataCache) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A1E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07B780)
[Address] EAT @explorer.exe (CreateFileMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD068470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E58B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F98F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AE780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E580)
[Address] EAT @explorer.exe (DllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A9670)
[Address] EAT @explorer.exe (DoDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E9F40)
[Address] EAT @explorer.exe (EnableHookObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD076020)
[Address] EAT @explorer.exe (GetClassFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA2B0)
[Address] EAT @explorer.exe (GetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8C00)
[Address] EAT @explorer.exe (GetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D600)
[Address] EAT @explorer.exe (GetHookInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0830F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE90)
[Address] EAT @explorer.exe (HICON_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1683B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1546E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD153E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BB0)
[Address] EAT @explorer.exe (IIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C720)
[Address] EAT @explorer.exe (IsAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09D480)
[Address] EAT @explorer.exe (IsValidIid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (IsValidInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4690)
[Address] EAT @explorer.exe (IsValidPtrIn) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15C7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD192C00)
[Address] EAT @explorer.exe (OleBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DD980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DE210)
[Address] EAT @explorer.exe (OleCreate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED0E0)
[Address] EAT @explorer.exe (OleCreateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE550)
[Address] EAT @explorer.exe (OleCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F04B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F02D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF5A0)
[Address] EAT @explorer.exe (OleCreateLink) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F0240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA260)
[Address] EAT @explorer.exe (OleDraw) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B570)
[Address] EAT @explorer.exe (OleDuplicateData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7380)
[Address] EAT @explorer.exe (OleGetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC5B0)
[Address] EAT @explorer.exe (OleInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EDE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BF520)
[Address] EAT @explorer.exe (OleIsRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B9D0)
[Address] EAT @explorer.exe (OleLoad) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BDB0)
[Address] EAT @explorer.exe (OleLockRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD163D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DBE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9990)
[Address] EAT @explorer.exe (OleRegGetUserType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7450)
[Address] EAT @explorer.exe (OleRun) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB770)
[Address] EAT @explorer.exe (OleSave) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1888F0)
[Address] EAT @explorer.exe (OleSetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA140)
[Address] EAT @explorer.exe (OleSetContainedObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179E40)
[Address] EAT @explorer.exe (OleUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EDC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175E40)
[Address] EAT @explorer.exe (PropSysAllocString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131790)
[Address] EAT @explorer.exe (PropSysFreeString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131780)
[Address] EAT @explorer.exe (PropVariantChangeType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5D60)
[Address] EAT @explorer.exe (PropVariantClear) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B45E0)
[Address] EAT @explorer.exe (PropVariantCopy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094690)
[Address] EAT @explorer.exe (ReadClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B820)
[Address] EAT @explorer.exe (ReadClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8AD0)
[Address] EAT @explorer.exe (ReadOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D20)
[Address] EAT @explorer.exe (ReadStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B6B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E69B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E02E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E0170)
[Address] EAT @explorer.exe (SetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B7750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D60D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD174B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD132800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEC60)
[Address] EAT @explorer.exe (StgOpenStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07E4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EC8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F8DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5730)
[Address] EAT @explorer.exe (StgSetTimes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161E40)
[Address] EAT @explorer.exe (StringFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096D40)
[Address] EAT @explorer.exe (StringFromIID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D84F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B7020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1330F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1333B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7E0)
[Address] EAT @explorer.exe (WriteClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F94E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA0F0)
[Address] EAT @explorer.exe (WriteOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD189A50)
[Address] EAT @explorer.exe (WriteStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB57A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB62710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB55250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB60730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB899F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB609D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB58BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB552B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5B8E0)
[Address] EAT @firefox.exe (FREEBL_GetVector) : RASAPI32.dll -> HOOKED (D:\Program Files (x86)\Mozilla Firefox\freebl3.dll @ 0x71B51000)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
127.0.0.1 localhost
::1 localhost
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
Dokončeno : << RKreport[0]_D_04072014_205219.txt >>
RKreport[0]_S_04072014_154049.txt;RKreport[0]_S_04072014_205130.txt
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Odebrat -- Datum : 04/07/2014 20:52:19
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> VYMAZÁNO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> [0x2] Systém nemůže nalézt uvedený soubor.
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> VYMAZÁNO
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1687D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1558F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD064560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAED0)
[Address] EAT @explorer.exe (CoBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (CoCancelCall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07AC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094840)
[Address] EAT @explorer.exe (CoCreateGuid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A90E0)
[Address] EAT @explorer.exe (CoCreateInstance) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B34C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD080280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CoFreeLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075870)
[Address] EAT @explorer.exe (CoGetCallState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1436E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A5840)
[Address] EAT @explorer.exe (CoGetClassVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D8390)
[Address] EAT @explorer.exe (CoGetComCatalog) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD093EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0814F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C02C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB180)
[Address] EAT @explorer.exe (CoGetInterceptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD193B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD06CAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB010)
[Address] EAT @explorer.exe (CoGetMalloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A1290)
[Address] EAT @explorer.exe (CoGetModuleType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16A300)
[Address] EAT @explorer.exe (CoGetObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD067980)
[Address] EAT @explorer.exe (CoGetObjectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B75E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0898B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD081B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C2530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075AC0)
[Address] EAT @explorer.exe (CoInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08B540)
[Address] EAT @explorer.exe (CoInitializeEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD091CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA370)
[Address] EAT @explorer.exe (CoInstall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD157B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181230)
[Address] EAT @explorer.exe (CoIsOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181520)
[Address] EAT @explorer.exe (CoLoadLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C28C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16FA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B9D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A97D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A36B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD092770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0742F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0949B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0884D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B0BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD079DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD087C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0668C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD074C80)
[Address] EAT @explorer.exe (CoRetireServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0751E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD088860)
[Address] EAT @explorer.exe (CoSetState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD072DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D980)
[Address] EAT @explorer.exe (CoTestCancel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F020)
[Address] EAT @explorer.exe (CoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A4680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17FE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD140140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0829D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C840)
[Address] EAT @explorer.exe (CreateBindCtx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B61E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BD60)
[Address] EAT @explorer.exe (CreateDataCache) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A1E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07B780)
[Address] EAT @explorer.exe (CreateFileMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD068470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E58B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F98F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AE780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E580)
[Address] EAT @explorer.exe (DllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A9670)
[Address] EAT @explorer.exe (DoDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E9F40)
[Address] EAT @explorer.exe (EnableHookObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD076020)
[Address] EAT @explorer.exe (GetClassFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA2B0)
[Address] EAT @explorer.exe (GetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8C00)
[Address] EAT @explorer.exe (GetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D600)
[Address] EAT @explorer.exe (GetHookInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0830F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE90)
[Address] EAT @explorer.exe (HICON_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1683B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1546E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD153E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BB0)
[Address] EAT @explorer.exe (IIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C720)
[Address] EAT @explorer.exe (IsAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09D480)
[Address] EAT @explorer.exe (IsValidIid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (IsValidInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4690)
[Address] EAT @explorer.exe (IsValidPtrIn) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15C7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD192C00)
[Address] EAT @explorer.exe (OleBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DD980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DE210)
[Address] EAT @explorer.exe (OleCreate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED0E0)
[Address] EAT @explorer.exe (OleCreateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE550)
[Address] EAT @explorer.exe (OleCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F04B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F02D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF5A0)
[Address] EAT @explorer.exe (OleCreateLink) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F0240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA260)
[Address] EAT @explorer.exe (OleDraw) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B570)
[Address] EAT @explorer.exe (OleDuplicateData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7380)
[Address] EAT @explorer.exe (OleGetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC5B0)
[Address] EAT @explorer.exe (OleInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EDE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BF520)
[Address] EAT @explorer.exe (OleIsRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B9D0)
[Address] EAT @explorer.exe (OleLoad) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BDB0)
[Address] EAT @explorer.exe (OleLockRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD163D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DBE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9990)
[Address] EAT @explorer.exe (OleRegGetUserType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7450)
[Address] EAT @explorer.exe (OleRun) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB770)
[Address] EAT @explorer.exe (OleSave) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1888F0)
[Address] EAT @explorer.exe (OleSetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA140)
[Address] EAT @explorer.exe (OleSetContainedObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179E40)
[Address] EAT @explorer.exe (OleUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EDC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175E40)
[Address] EAT @explorer.exe (PropSysAllocString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131790)
[Address] EAT @explorer.exe (PropSysFreeString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131780)
[Address] EAT @explorer.exe (PropVariantChangeType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5D60)
[Address] EAT @explorer.exe (PropVariantClear) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B45E0)
[Address] EAT @explorer.exe (PropVariantCopy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094690)
[Address] EAT @explorer.exe (ReadClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B820)
[Address] EAT @explorer.exe (ReadClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8AD0)
[Address] EAT @explorer.exe (ReadOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D20)
[Address] EAT @explorer.exe (ReadStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B6B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E69B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E02E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E0170)
[Address] EAT @explorer.exe (SetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B7750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D60D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD174B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD132800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEC60)
[Address] EAT @explorer.exe (StgOpenStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07E4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EC8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F8DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5730)
[Address] EAT @explorer.exe (StgSetTimes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161E40)
[Address] EAT @explorer.exe (StringFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096D40)
[Address] EAT @explorer.exe (StringFromIID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D84F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B7020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1330F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1333B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7E0)
[Address] EAT @explorer.exe (WriteClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F94E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA0F0)
[Address] EAT @explorer.exe (WriteOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD189A50)
[Address] EAT @explorer.exe (WriteStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB57A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB62710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB55250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB60730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB899F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB609D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB58BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB552B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5B8E0)
[Address] EAT @firefox.exe (FREEBL_GetVector) : RASAPI32.dll -> HOOKED (D:\Program Files (x86)\Mozilla Firefox\freebl3.dll @ 0x71B51000)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
127.0.0.1 localhost
::1 localhost
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!
+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )
Dokončeno : << RKreport[0]_D_04072014_205219.txt >>
RKreport[0]_S_04072014_154049.txt;RKreport[0]_S_04072014_205130.txt
Kdo je online
Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 52 hostů