zamrzani pc po reinstalaci Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

zamrzani pc po reinstalaci

Příspěvekod Condorito » 02 dub 2014 21:26

Ahoj lidi, prosim o Vas o radu : Moje PC je uz celkem starecek (HW jednou za cas obmenuji tudiz tak nejak drzim krok s dobou), nikdy s nim nebyly nejake prehnane problemy az do doby kdy mi to zacalo hlasit ze muj sys. disk je temer plny. Koukal jsem kde muze byt problem a ten jsem nalezl ve slozce widli (mam origo visty) ktere mely za dobu nekolika let velikost temer 80Gb.. Rozhodl jsem se uz kvuli tomuto a dale treba i celkovemu zpomaleni reinstalovat : Ted k veci..Od te doby obcasne zamrzani jen tak kdyz necham pc dele v necinosti a nebo tzv. modra smrt pri pousteni si videa na youtube ci stream atd. Snazil jsem se reinstalovat vsechny mozne ovladace od zakladni desky az po grafiku ale zatim bez uspechu. Pokud by nekoho z Vas mistru zde napadlo co s tim, budu rad :)

Jo a jeste po startu Pc se mi zacala objevovat hlaska : Program hydraDm.exe je jiz spusten, nebo tak podobne.

ps:Za vycerpavajci psani se omlouvam, ale jsem vicemene lajk a tak jsem chtel problem popsat tak nejak od zakladu. V priloze posilam pro vsechny pripady log z hjt. Automaticke kontrole na webu neverim a asi bych se v tom ani nevyznal :) diky
Přílohy
ObrLOG.jpg
screen z logu, textak mi to nechtelo poslat nechapu :P

Reklama
Uživatelský avatar
Myloš
Master Level 8.5
Master Level 8.5
Příspěvky: 6990
Registrován: duben 06
Bydliště: Praha
Pohlaví: Muž
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Myloš » 02 dub 2014 22:32

Než se tě tu někdo ujme, log vlož, prosím, normálně jako text do těla příspěvku, nikoli jako přílohu. Normálně obsah toho texťáku zkopíruj přes schránku.
  • Než položíte dotaz, nejprve se ptejte strejdy Gůůgla.
  • Výňatek z pravidel fóra PC-HELP:
    • Název tématu zvolte takový, aby co nejvýstižněji charakterizoval obsah tématu.
    • Nesnažte se řešit jiný problém (i když podobný) v jednom tématu. Raději založte nové téma.
  • Mýliti se je Myloš. ;-)

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43292
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod jaro3 » 03 dub 2014 10:22

Tak tak..

Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.


Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.

Stáhni AdwCleaner (by Xplode)

Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.

Stáhni si Malwarebytes' Anti-Malware
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a nech vybranou možnost Provést rychlý sken a klikni na tlačítko Skenovat
- po proběhnutí programu se ti objeví hláška tak klikni na OK a pak na tlačítko Zobrazit výsledky
- pak zvol možnost uložit log a ulož si log na plochu
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Vlož sem pak obsah toho logu.

Pokud budou problémy , spusť v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 03 dub 2014 22:34

Log z hjt zde a jdu se vrhnout na to co popsal JARO3..

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 22:32:25, on 3.4.2014
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16982)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe
D:\Program Files (x86)\AVG\AVG2014\avgui.exe
D:\Program Files (x86)\Mozilla Firefox\firefox.exe
D:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_12_0_0_77.exe
C:\Users\Condorito\Desktop\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [AVG_UI] "D:\Program Files (x86)\AVG\AVG2014\avgui.exe" /TRAYONLY
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files (x86)\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [AVG-Secure-Search-Update_1213b] C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b
O4 - HKCU\..\Run: [DAEMON Tools Lite] "D:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKCU\..\Run: [HydraVisionDesktopManager] "C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe"
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: AVGIDSAgent - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgidsagent.exe
O23 - Service: AVG WatchDog (avgwd) - AVG Technologies CZ, s.r.o. - D:\Program Files (x86)\AVG\AVG2014\avgwdsvc.exe
O23 - Service: @dfsrres.dll,-101 (DFSR) - Unknown owner - C:\Windows\system32\DFSR.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - D:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\SLsvc.exe,-101 (slsvc) - Unknown owner - C:\Windows\system32\SLsvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 6278 bytes

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 03 dub 2014 23:19

AdwCleaner log

# AdwCleaner v3.023 - Report created 03/04/2014 at 23:14:44
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\AppDataLow\Software\SmartBar
Key Found : HKCU\Software\AVG Secure Search
Key Found : HKCU\Software\Conduit
Key Found : [x64] HKCU\Software\AVG Secure Search
Key Found : [x64] HKCU\Software\Conduit
Key Found : HKLM\Software\Conduit

***** [ Browsers ] *****

-\\ Internet Explorer v7.0.6000.16982


-\\ Mozilla Firefox v28.0 (cs)

[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]


-\\ Google Chrome v33.0.1750.154

[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1024 octets] - [03/04/2014 23:14:44]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1084 octets] ##########

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 03 dub 2014 23:26

Tak a posledni log je tu z Malwarebytes' Anti-Malware ..

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 3.4.2014
Scan Time: 23:23:56
Logfile: log.txt
Administrator: Yes

Version: 2.00.0.1000
Malware Database: v2014.04.03.09
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled

OS: Windows Vista
CPU: x64
File System: NTFS
User: Condorito

Scan Type: Hyper Scan
Result: Completed
Objects Scanned: 193977
Time Elapsed: 1 min, 3 sec

Memory: Enabled
Startup: Enabled
Filesystem: Disabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43292
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod jaro3 » 04 dub 2014 11:10

Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce
klikni na „Prohledat-Scan“, po prohledání klikni na „ Vymazat-Clean

Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.

Stáhni si Junkware Removal Tool by Thisisu

na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.

Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit

-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.

Platform: Windows Vista (WinNT 6.00.1904) doinstaluj si SP2!
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 07 dub 2014 15:20

zde je log po restartu z adwcleaner

# AdwCleaner v3.023 - Report created 07/04/2014 at 15:14:31
# Updated 01/04/2014 by Xplode
# Operating System : Windows (TM) Vista Home Premium (64 bits)
# Username : Condorito - CONDORITO-PC
# Running from : C:\Users\Condorito\Desktop\adwcleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKCU\Software\AVG Secure Search
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKLM\Software\Conduit

***** [ Browsers ] *****

-\\ Internet Explorer v7.0.6000.16982


-\\ Mozilla Firefox v28.0 (cs)

[ File : C:\Users\Condorito\AppData\Roaming\Mozilla\Firefox\Profiles\kwn55zu9.default\prefs.js ]


-\\ Google Chrome v33.0.1750.154

[ File : C:\Users\Condorito\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1172 octets] - [03/04/2014 23:14:44]
AdwCleaner[R1].txt - [1232 octets] - [07/04/2014 15:13:15]
AdwCleaner[S0].txt - [1069 octets] - [07/04/2014 15:14:31]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1129 octets] ##########

Ja jdu zatim na krok 2

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 07 dub 2014 15:35

Tak ani to dlouho netrvalo snad tri minutky (log z JRT)

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows (TM) Vista Home Premium x64
Ran by Condorito on po 07.04.2014 at 15:22:04,99
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 07.04.2014 at 15:28:30,03
End of JRT log

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 07 dub 2014 15:45

A ten posledni je zde (roguekiller)

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Kontrola -- Datum : 04/07/2014 15:40:49
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO

¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> NALEZENO

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E87D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D58F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17AED0)
[Address] EAT @explorer.exe (CoBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (CoCancelCall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114840)
[Address] EAT @explorer.exe (CoCreateGuid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1290E0)
[Address] EAT @explorer.exe (CoCreateInstance) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD268D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD100280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F3F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172380)
[Address] EAT @explorer.exe (CoFreeLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5870)
[Address] EAT @explorer.exe (CoGetCallState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C36E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD125840)
[Address] EAT @explorer.exe (CoGetClassVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD258390)
[Address] EAT @explorer.exe (CoGetComCatalog) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD113EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1014F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2402C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26B180)
[Address] EAT @explorer.exe (CoGetInterceptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD213B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ECAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B010)
[Address] EAT @explorer.exe (CoGetMalloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD121290)
[Address] EAT @explorer.exe (CoGetModuleType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA300)
[Address] EAT @explorer.exe (CoGetObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E7980)
[Address] EAT @explorer.exe (CoGetObjectContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1375E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1098B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD101B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD242530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5AC0)
[Address] EAT @explorer.exe (CoInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10B540)
[Address] EAT @explorer.exe (CoInitializeEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD111CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A370)
[Address] EAT @explorer.exe (CoInstall) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D7B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201230)
[Address] EAT @explorer.exe (CoIsOle1Class) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201520)
[Address] EAT @explorer.exe (CoLoadLibrary) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2428C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD120FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD239D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1297D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2236B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD112770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F42F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1149B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1084D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD240240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD230BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD107C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E68C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F4C80)
[Address] EAT @explorer.exe (CoRetireServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F5A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F51E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD231C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD108860)
[Address] EAT @explorer.exe (CoSetState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD236D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D980)
[Address] EAT @explorer.exe (CoTestCancel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F020)
[Address] EAT @explorer.exe (CoUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD124680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FFE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1029D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FE600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22C070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C840)
[Address] EAT @explorer.exe (CreateBindCtx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1361E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F2070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBD60)
[Address] EAT @explorer.exe (CreateDataCache) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD221E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB780)
[Address] EAT @explorer.exe (CreateFileMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E8470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1658B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1798F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD201BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD135090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12E780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E580)
[Address] EAT @explorer.exe (DllGetClassObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD103AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD229670)
[Address] EAT @explorer.exe (DoDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD269F40)
[Address] EAT @explorer.exe (EnableHookObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F6020)
[Address] EAT @explorer.exe (GetClassFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23A2B0)
[Address] EAT @explorer.exe (GetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228C00)
[Address] EAT @explorer.exe (GetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FBA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D600)
[Address] EAT @explorer.exe (GetHookInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1030F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE90)
[Address] EAT @explorer.exe (HICON_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D5290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E83B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D46E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16D8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FCE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD289F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3BB0)
[Address] EAT @explorer.exe (IIDFromString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FC720)
[Address] EAT @explorer.exe (IsAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D480)
[Address] EAT @explorer.exe (IsValidIid) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD12C510)
[Address] EAT @explorer.exe (IsValidInterface) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134690)
[Address] EAT @explorer.exe (IsValidPtrIn) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DB2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD212C00)
[Address] EAT @explorer.exe (OleBuildVersion) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD264FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25D980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25E210)
[Address] EAT @explorer.exe (OleCreate) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26D0E0)
[Address] EAT @explorer.exe (OleCreateEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E550)
[Address] EAT @explorer.exe (OleCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2704B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2702D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F5A0)
[Address] EAT @explorer.exe (OleCreateLink) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26EE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD270240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26FB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26F870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A260)
[Address] EAT @explorer.exe (OleDraw) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB570)
[Address] EAT @explorer.exe (OleDuplicateData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227380)
[Address] EAT @explorer.exe (OleGetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C5B0)
[Address] EAT @explorer.exe (OleInitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26DE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD23F520)
[Address] EAT @explorer.exe (OleIsRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB9D0)
[Address] EAT @explorer.exe (OleLoad) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26E4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBDB0)
[Address] EAT @explorer.exe (OleLockRunning) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD243570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25C070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25BE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD259150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179990)
[Address] EAT @explorer.exe (OleRegGetUserType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD227450)
[Address] EAT @explorer.exe (OleRun) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B770)
[Address] EAT @explorer.exe (OleSave) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2088F0)
[Address] EAT @explorer.exe (OleSetClipboard) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD26A140)
[Address] EAT @explorer.exe (OleSetContainedObject) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F9E40)
[Address] EAT @explorer.exe (OleUninitialize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16DC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5E40)
[Address] EAT @explorer.exe (PropSysAllocString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1790)
[Address] EAT @explorer.exe (PropSysFreeString) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1780)
[Address] EAT @explorer.exe (PropVariantChangeType) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225D60)
[Address] EAT @explorer.exe (PropVariantClear) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1345E0)
[Address] EAT @explorer.exe (PropVariantCopy) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD114690)
[Address] EAT @explorer.exe (ReadClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB820)
[Address] EAT @explorer.exe (ReadClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FBEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228AD0)
[Address] EAT @explorer.exe (ReadOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD263D20)
[Address] EAT @explorer.exe (ReadStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD10D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BB2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E7200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD222C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2669B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD266150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD265FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2602E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD260170)
[Address] EAT @explorer.exe (SetConvertStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD228BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD137750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD21BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2560D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD253C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F5F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD238040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F4B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B2800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD254D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD22EC60)
[Address] EAT @explorer.exe (StgOpenStorage) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FE4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16C8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD256250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD178DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD225730)
[Address] EAT @explorer.exe (StgSetTimes) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E1E40)
[Address] EAT @explorer.exe (StringFromCLSID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD116D40)
[Address] EAT @explorer.exe (StringFromIID) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD223900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD2584F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD237020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B34E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B30F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B3710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B33B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD286FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD28E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1FB7E0)
[Address] EAT @explorer.exe (WriteClassStm) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1794E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD25A0F0)
[Address] EAT @explorer.exe (WriteOleStg) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209A50)
[Address] EAT @explorer.exe (WriteStringStream) : WININET.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B4050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC67A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC72710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC65250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC70730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC999F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC709D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC99DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC688D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC68BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC63240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC652B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAC6B8E0)

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost
::1 localhost


¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

Dokončeno : << RKreport[0]_S_04072014_154049.txt >>



Mimochodem aktualizace Vist mi nenabizi sp2 nybrz pouze sp1 aktualizaci takze ani nevim kde jinde se po tom mam podivat :/

Uživatelský avatar
memphisto
Guru Level 13
Guru Level 13
Příspěvky: 21113
Registrován: září 06
Bydliště: Zlín - České Budějovice
Pohlaví: Muž
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod memphisto » 07 dub 2014 18:01

Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje "Smazání- Finished "
- Klikni na "Zprávy " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller

Stáhni si TDSSKiller

Na svojí plochu. Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller.2.2.7.1._(datum)_log.txt , vlož sem prosím celý obsah logu.
PRAVIDLA PC-HELP.CZ, PRAVIDLA sekce HijackThis, HijackThis návod, Memtest, CCleaner
Logy z programu HijackThis neposílejte prosím přes SZ, ale vkládejte je do patřičné sekce. Děkuji

Condorito
Level 1
Level 1
Příspěvky: 59
Registrován: červenec 08
Pohlaví: Nespecifikováno
Stav:
Offline

Re: zamrzani pc po reinstalaci

Příspěvekod Condorito » 07 dub 2014 20:55

zde je log z RogueKiller po smazani zmineneho...

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows Vista (6.0.6000 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : Condorito [Práva správce]
Mód : Odebrat -- Datum : 04/07/2014 20:52:19
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> VYMAZÁNO
[RUN][SUSP PATH] HKUS\S-1-5-21-1410354977-1552960266-3762102102-1000\[...]\Run : AVG-Secure-Search-Update_1213b (C:\Users\Condorito\AppData\Roaming\AVG 1213b Campaign\AVG-Secure-Search-Update-1213b.exe /PROMPT /mid=1c9d9b88aab147d2ac1ed1543be1e502-a01e9e89512bd70c0f6236020492ffec464d3735 /CMPID=1213b [x][x]) -> [0x2] Systém nemůže nalézt uvedený soubor.
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)

¤¤¤ naplánované úlohy : 1 ¤¤¤
[V2][SUSP PATH] AVG_SYS_TASK : C:\ProgramData\AVG 0214c Campaign\AVG-Secure-Search-Update-0214c.exe - --TASK_START_SYS --CMPID=0214c [x] -> VYMAZÁNO

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (BindMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BB80)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1687D0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168690)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B880)
[Address] EAT @explorer.exe (CLIPFORMAT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B7E0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1558F0)
[Address] EAT @explorer.exe (CLIPFORMAT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168480)
[Address] EAT @explorer.exe (CLSIDFromOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08ADD0)
[Address] EAT @explorer.exe (CLSIDFromProgID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5590)
[Address] EAT @explorer.exe (CLSIDFromProgIDEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BAB0)
[Address] EAT @explorer.exe (CLSIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4E80)
[Address] EAT @explorer.exe (CoAddRefServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD064560)
[Address] EAT @explorer.exe (CoAllowSetForegroundWindow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FAED0)
[Address] EAT @explorer.exe (CoBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (CoCancelCall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18ECC0)
[Address] EAT @explorer.exe (CoCopyProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07AC50)
[Address] EAT @explorer.exe (CoCreateFreeThreadedMarshaler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094840)
[Address] EAT @explorer.exe (CoCreateGuid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A90E0)
[Address] EAT @explorer.exe (CoCreateInstance) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B34C0)
[Address] EAT @explorer.exe (CoCreateInstanceEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0E10)
[Address] EAT @explorer.exe (CoCreateObjectInContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8DF0)
[Address] EAT @explorer.exe (CoDeactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3740)
[Address] EAT @explorer.exe (CoDisableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073FC0)
[Address] EAT @explorer.exe (CoDisconnectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E8D80)
[Address] EAT @explorer.exe (CoDisconnectObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD080280)
[Address] EAT @explorer.exe (CoDosDateTimeToFileTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E800)
[Address] EAT @explorer.exe (CoEnableCallCancellation) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD073F80)
[Address] EAT @explorer.exe (CoFileTimeNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E790)
[Address] EAT @explorer.exe (CoFileTimeToDosDateTime) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E860)
[Address] EAT @explorer.exe (CoFreeAllLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F2380)
[Address] EAT @explorer.exe (CoFreeLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECE0)
[Address] EAT @explorer.exe (CoFreeUnusedLibraries) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB380)
[Address] EAT @explorer.exe (CoFreeUnusedLibrariesEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC7A0)
[Address] EAT @explorer.exe (CoGetActivationState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D20)
[Address] EAT @explorer.exe (CoGetApartmentID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11CBF0)
[Address] EAT @explorer.exe (CoGetCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075870)
[Address] EAT @explorer.exe (CoGetCallState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1436E0)
[Address] EAT @explorer.exe (CoGetCallerTID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1E20)
[Address] EAT @explorer.exe (CoGetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18BC20)
[Address] EAT @explorer.exe (CoGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A5840)
[Address] EAT @explorer.exe (CoGetClassVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D8390)
[Address] EAT @explorer.exe (CoGetComCatalog) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD093EF0)
[Address] EAT @explorer.exe (CoGetContextToken) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5A20)
[Address] EAT @explorer.exe (CoGetCurrentLogicalThreadId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD11D9F0)
[Address] EAT @explorer.exe (CoGetCurrentProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0814F0)
[Address] EAT @explorer.exe (CoGetDefaultContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C02C0)
[Address] EAT @explorer.exe (CoGetInstanceFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB200)
[Address] EAT @explorer.exe (CoGetInstanceFromIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EB180)
[Address] EAT @explorer.exe (CoGetInterceptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD193B00)
[Address] EAT @explorer.exe (CoGetInterceptorFromTypeInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD06CAD0)
[Address] EAT @explorer.exe (CoGetInterfaceAndReleaseStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB010)
[Address] EAT @explorer.exe (CoGetMalloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094640)
[Address] EAT @explorer.exe (CoGetMarshalSizeMax) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A1290)
[Address] EAT @explorer.exe (CoGetModuleType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16A300)
[Address] EAT @explorer.exe (CoGetObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD067980)
[Address] EAT @explorer.exe (CoGetObjectContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B75E0)
[Address] EAT @explorer.exe (CoGetPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0898B0)
[Address] EAT @explorer.exe (CoGetProcessIdentifier) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2A0)
[Address] EAT @explorer.exe (CoGetStandardMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD081B40)
[Address] EAT @explorer.exe (CoGetStdMarshalEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C2530)
[Address] EAT @explorer.exe (CoGetSystemSecurityPermissions) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1D80)
[Address] EAT @explorer.exe (CoGetTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09F790)
[Address] EAT @explorer.exe (CoImpersonateClient) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075AC0)
[Address] EAT @explorer.exe (CoInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08B540)
[Address] EAT @explorer.exe (CoInitializeEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1260)
[Address] EAT @explorer.exe (CoInitializeSecurity) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD091CF0)
[Address] EAT @explorer.exe (CoInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA370)
[Address] EAT @explorer.exe (CoInstall) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD157B90)
[Address] EAT @explorer.exe (CoInvalidateRemoteMachineBindings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DF0)
[Address] EAT @explorer.exe (CoIsHandlerConnected) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181230)
[Address] EAT @explorer.exe (CoIsOle1Class) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181520)
[Address] EAT @explorer.exe (CoLoadLibrary) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13ECF0)
[Address] EAT @explorer.exe (CoLockObjectExternal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C28C0)
[Address] EAT @explorer.exe (CoMarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16FA30)
[Address] EAT @explorer.exe (CoMarshalInterThreadInterfaceInStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D420)
[Address] EAT @explorer.exe (CoMarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A0FB0)
[Address] EAT @explorer.exe (CoPopServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B9D50)
[Address] EAT @explorer.exe (CoPushServiceDomain) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1B40)
[Address] EAT @explorer.exe (CoQueryAuthenticationServices) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19DD20)
[Address] EAT @explorer.exe (CoQueryClientBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E4F30)
[Address] EAT @explorer.exe (CoQueryProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A97D0)
[Address] EAT @explorer.exe (CoQueryReleaseObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B6E0)
[Address] EAT @explorer.exe (CoReactivateObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A36B0)
[Address] EAT @explorer.exe (CoRegisterChannelHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD092770)
[Address] EAT @explorer.exe (CoRegisterClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0742F0)
[Address] EAT @explorer.exe (CoRegisterInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0949B0)
[Address] EAT @explorer.exe (CoRegisterMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA040)
[Address] EAT @explorer.exe (CoRegisterMessageFilter) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0884D0)
[Address] EAT @explorer.exe (CoRegisterPSClsid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C0240)
[Address] EAT @explorer.exe (CoRegisterSurrogate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B0BC0)
[Address] EAT @explorer.exe (CoRegisterSurrogateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD079DD0)
[Address] EAT @explorer.exe (CoReleaseMarshalData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD087C60)
[Address] EAT @explorer.exe (CoReleaseServerProcess) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0668C0)
[Address] EAT @explorer.exe (CoResumeClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD074C80)
[Address] EAT @explorer.exe (CoRetireServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1DC0)
[Address] EAT @explorer.exe (CoRevertToSelf) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD075A70)
[Address] EAT @explorer.exe (CoRevokeClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0751E0)
[Address] EAT @explorer.exe (CoRevokeInitializeSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC5D0)
[Address] EAT @explorer.exe (CoRevokeMallocSpy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F8D0)
[Address] EAT @explorer.exe (CoSetCancelObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B1C50)
[Address] EAT @explorer.exe (CoSetProxyBlanket) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD088860)
[Address] EAT @explorer.exe (CoSetState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096BF0)
[Address] EAT @explorer.exe (CoSuspendClassObjects) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B6D20)
[Address] EAT @explorer.exe (CoSwitchCallContext) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD072DA0)
[Address] EAT @explorer.exe (CoTaskMemAlloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F00)
[Address] EAT @explorer.exe (CoTaskMemFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B3F50)
[Address] EAT @explorer.exe (CoTaskMemRealloc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D980)
[Address] EAT @explorer.exe (CoTestCancel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC5B0)
[Address] EAT @explorer.exe (CoTreatAsClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F020)
[Address] EAT @explorer.exe (CoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B1980)
[Address] EAT @explorer.exe (CoUnloadingWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF040)
[Address] EAT @explorer.exe (CoUnmarshalHresult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD16F9E0)
[Address] EAT @explorer.exe (CoUnmarshalInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0A4680)
[Address] EAT @explorer.exe (CoVrfCheckThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17FE80)
[Address] EAT @explorer.exe (CoVrfGetThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC220)
[Address] EAT @explorer.exe (CoVrfReleaseThreadState) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD140140)
[Address] EAT @explorer.exe (CoWaitForMultipleHandles) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0829D0)
[Address] EAT @explorer.exe (ComPs_NdrDllCanUnloadNow) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (ComPs_NdrDllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17E600)
[Address] EAT @explorer.exe (ComPs_NdrDllRegisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC0A0)
[Address] EAT @explorer.exe (ComPs_NdrDllUnregisterProxy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AC070)
[Address] EAT @explorer.exe (CreateAntiMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C840)
[Address] EAT @explorer.exe (CreateBindCtx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B61E0)
[Address] EAT @explorer.exe (CreateClassMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD172070)
[Address] EAT @explorer.exe (CreateDataAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BD60)
[Address] EAT @explorer.exe (CreateDataCache) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A1E60)
[Address] EAT @explorer.exe (CreateErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07B780)
[Address] EAT @explorer.exe (CreateFileMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C8A0)
[Address] EAT @explorer.exe (CreateGenericComposite) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD068470)
[Address] EAT @explorer.exe (CreateILockBytesOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0E58B0)
[Address] EAT @explorer.exe (CreateItemMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083550)
[Address] EAT @explorer.exe (CreateObjrefMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18F920)
[Address] EAT @explorer.exe (CreateOleAdviseHolder) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F98F0)
[Address] EAT @explorer.exe (CreatePointerMoniker) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C540)
[Address] EAT @explorer.exe (CreateStdProgressIndicator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD181BD0)
[Address] EAT @explorer.exe (CreateStreamOnHGlobal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B5090)
[Address] EAT @explorer.exe (DcomChannelSetHResult) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AE780)
[Address] EAT @explorer.exe (DllDebugObjectRPCHook) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E580)
[Address] EAT @explorer.exe (DllGetClassObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllGetClassObjectWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD083AC0)
[Address] EAT @explorer.exe (DllRegisterServer) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A9670)
[Address] EAT @explorer.exe (DoDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E9F40)
[Address] EAT @explorer.exe (EnableHookObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD18C4A0)
[Address] EAT @explorer.exe (FmtIdToPropStgName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175EB0)
[Address] EAT @explorer.exe (FreePropVariantArray) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD076020)
[Address] EAT @explorer.exe (GetClassFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BA2B0)
[Address] EAT @explorer.exe (GetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BB0)
[Address] EAT @explorer.exe (GetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8C00)
[Address] EAT @explorer.exe (GetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC470)
[Address] EAT @explorer.exe (GetHGlobalFromILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17BA70)
[Address] EAT @explorer.exe (GetHGlobalFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D600)
[Address] EAT @explorer.exe (GetHookInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BE0)
[Address] EAT @explorer.exe (GetRunningObjectTable) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0830F0)
[Address] EAT @explorer.exe (HACCEL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HACCEL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HACCEL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HACCEL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBITMAP_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155760)
[Address] EAT @explorer.exe (HBITMAP_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED900)
[Address] EAT @explorer.exe (HBITMAP_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155870)
[Address] EAT @explorer.exe (HBITMAP_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED960)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168420)
[Address] EAT @explorer.exe (HBITMAP_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED9A0)
[Address] EAT @explorer.exe (HBRUSH_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HBRUSH_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HBRUSH_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HDC_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HDC_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HDC_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HDC_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B5D0)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154E60)
[Address] EAT @explorer.exe (HENHMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154750)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B680)
[Address] EAT @explorer.exe (HENHMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154820)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD168350)
[Address] EAT @explorer.exe (HENHMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF00)
[Address] EAT @explorer.exe (HGLOBAL_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4F0)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154550)
[Address] EAT @explorer.exe (HGLOBAL_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154250)
[Address] EAT @explorer.exe (HGLOBAL_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B570)
[Address] EAT @explorer.exe (HGLOBAL_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B520)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D10)
[Address] EAT @explorer.exe (HGLOBAL_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE90)
[Address] EAT @explorer.exe (HICON_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HICON_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HICON_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HICON_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HICON_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HMENU_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HMENU_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMENU_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B6D0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD155290)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154890)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B740)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154A10)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1683B0)
[Address] EAT @explorer.exe (HMETAFILEPICT_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CF60)
[Address] EAT @explorer.exe (HMETAFILE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B600)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154C50)
[Address] EAT @explorer.exe (HMETAFILE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154610)
[Address] EAT @explorer.exe (HMETAFILE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B630)
[Address] EAT @explorer.exe (HMETAFILE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1546E0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154AD0)
[Address] EAT @explorer.exe (HMETAFILE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167D80)
[Address] EAT @explorer.exe (HPALETTE_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0ED8A0)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD154140)
[Address] EAT @explorer.exe (HPALETTE_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD153E20)
[Address] EAT @explorer.exe (HPALETTE_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B4A0)
[Address] EAT @explorer.exe (HPALETTE_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B450)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167AB0)
[Address] EAT @explorer.exe (HPALETTE_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17CE30)
[Address] EAT @explorer.exe (HRGN_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HRGN_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HRGN_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HRGN_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F40)
[Address] EAT @explorer.exe (HWND_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209EB0)
[Address] EAT @explorer.exe (HWND_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F00)
[Address] EAT @explorer.exe (HWND_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HWND_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD209F50)
[Address] EAT @explorer.exe (HkOleRegisterObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143BB0)
[Address] EAT @explorer.exe (IIDFromString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07C720)
[Address] EAT @explorer.exe (IsAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD164FA0)
[Address] EAT @explorer.exe (IsEqualGUID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD09D480)
[Address] EAT @explorer.exe (IsValidIid) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0AC510)
[Address] EAT @explorer.exe (IsValidInterface) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4690)
[Address] EAT @explorer.exe (IsValidPtrIn) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (IsValidPtrOut) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15B2C0)
[Address] EAT @explorer.exe (MkParseDisplayName) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BF30)
[Address] EAT @explorer.exe (MonikerCommonPrefixWith) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD15C7A0)
[Address] EAT @explorer.exe (MonikerRelativePathTo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD192C00)
[Address] EAT @explorer.exe (OleBuildVersion) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD143CE0)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAM) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5200)
[Address] EAT @explorer.exe (OleConvertIStorageToOLESTREAMEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E4FF0)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DD980)
[Address] EAT @explorer.exe (OleConvertOLESTREAMToIStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DE210)
[Address] EAT @explorer.exe (OleCreate) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE780)
[Address] EAT @explorer.exe (OleCreateDefaultHandler) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED200)
[Address] EAT @explorer.exe (OleCreateEmbeddingHelper) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1ED0E0)
[Address] EAT @explorer.exe (OleCreateEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE550)
[Address] EAT @explorer.exe (OleCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F04B0)
[Address] EAT @explorer.exe (OleCreateFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F02D0)
[Address] EAT @explorer.exe (OleCreateFromFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF7D0)
[Address] EAT @explorer.exe (OleCreateFromFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF5A0)
[Address] EAT @explorer.exe (OleCreateLink) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEFB0)
[Address] EAT @explorer.exe (OleCreateLinkEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EEE00)
[Address] EAT @explorer.exe (OleCreateLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1F0240)
[Address] EAT @explorer.exe (OleCreateLinkFromDataEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFEC0)
[Address] EAT @explorer.exe (OleCreateLinkToFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EFB90)
[Address] EAT @explorer.exe (OleCreateLinkToFileEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EF870)
[Address] EAT @explorer.exe (OleCreateMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165110)
[Address] EAT @explorer.exe (OleCreateStaticFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE0A0)
[Address] EAT @explorer.exe (OleDestroyMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD136070)
[Address] EAT @explorer.exe (OleDoAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA260)
[Address] EAT @explorer.exe (OleDraw) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B570)
[Address] EAT @explorer.exe (OleDuplicateData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD165CC0)
[Address] EAT @explorer.exe (OleFlushClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB420)
[Address] EAT @explorer.exe (OleGetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7380)
[Address] EAT @explorer.exe (OleGetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9EA0)
[Address] EAT @explorer.exe (OleGetIconOfClass) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9B70)
[Address] EAT @explorer.exe (OleGetIconOfFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC5B0)
[Address] EAT @explorer.exe (OleInitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08A720)
[Address] EAT @explorer.exe (OleInitializeWOW) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EDE30)
[Address] EAT @explorer.exe (OleIsCurrentClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1BF520)
[Address] EAT @explorer.exe (OleIsRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B9D0)
[Address] EAT @explorer.exe (OleLoad) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EE4F0)
[Address] EAT @explorer.exe (OleLoadFromStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BDB0)
[Address] EAT @explorer.exe (OleLockRunning) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9550)
[Address] EAT @explorer.exe (OleMetafilePictFromIconAndLabel) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD163D90)
[Address] EAT @explorer.exe (OleNoteObjectVisible) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1C3570)
[Address] EAT @explorer.exe (OleQueryCreateFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DC070)
[Address] EAT @explorer.exe (OleQueryLinkFromData) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DBE30)
[Address] EAT @explorer.exe (OleRegEnumFormatEtc) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9670)
[Address] EAT @explorer.exe (OleRegEnumVerbs) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D9150)
[Address] EAT @explorer.exe (OleRegGetMiscStatus) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9990)
[Address] EAT @explorer.exe (OleRegGetUserType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A7450)
[Address] EAT @explorer.exe (OleRun) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB770)
[Address] EAT @explorer.exe (OleSave) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B8C0)
[Address] EAT @explorer.exe (OleSaveToStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F9440)
[Address] EAT @explorer.exe (OleSetAutoConvert) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1888F0)
[Address] EAT @explorer.exe (OleSetClipboard) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1EA140)
[Address] EAT @explorer.exe (OleSetContainedObject) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B960)
[Address] EAT @explorer.exe (OleSetMenuDescriptor) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179F50)
[Address] EAT @explorer.exe (OleTranslateAccelerator) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD179E40)
[Address] EAT @explorer.exe (OleUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB5C0)
[Address] EAT @explorer.exe (OpenOrCreateStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134120)
[Address] EAT @explorer.exe (ProgIDFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EDC80)
[Address] EAT @explorer.exe (PropStgNameToFmtId) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175E40)
[Address] EAT @explorer.exe (PropSysAllocString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131790)
[Address] EAT @explorer.exe (PropSysFreeString) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD131780)
[Address] EAT @explorer.exe (PropVariantChangeType) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5D60)
[Address] EAT @explorer.exe (PropVariantClear) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B45E0)
[Address] EAT @explorer.exe (PropVariantCopy) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD094690)
[Address] EAT @explorer.exe (ReadClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B820)
[Address] EAT @explorer.exe (ReadClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07BEB0)
[Address] EAT @explorer.exe (ReadFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8AD0)
[Address] EAT @explorer.exe (ReadOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E3D20)
[Address] EAT @explorer.exe (ReadStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19C670)
[Address] EAT @explorer.exe (RegisterDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD08D2B0)
[Address] EAT @explorer.exe (ReleaseStgMedium) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B6B60)
[Address] EAT @explorer.exe (RevokeDragDrop) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0FB7C0)
[Address] EAT @explorer.exe (SNB_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1B0)
[Address] EAT @explorer.exe (SNB_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B320)
[Address] EAT @explorer.exe (SNB_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B1E0)
[Address] EAT @explorer.exe (SNB_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B3E0)
[Address] EAT @explorer.exe (SNB_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD13B2B0)
[Address] EAT @explorer.exe (SNB_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167550)
[Address] EAT @explorer.exe (SNB_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD167200)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A2C80)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6BC0)
[Address] EAT @explorer.exe (STGMEDIUM_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E69B0)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E6150)
[Address] EAT @explorer.exe (STGMEDIUM_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E5FB0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E02E0)
[Address] EAT @explorer.exe (STGMEDIUM_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1E0170)
[Address] EAT @explorer.exe (SetConvertStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8B90)
[Address] EAT @explorer.exe (SetDocumentBitStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A8BE0)
[Address] EAT @explorer.exe (SetErrorInfo) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B7750)
[Address] EAT @explorer.exe (StgConvertPropertyToVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8710)
[Address] EAT @explorer.exe (StgConvertVariantToProperty) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD19BBB0)
[Address] EAT @explorer.exe (StgCreateDocfile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D60D0)
[Address] EAT @explorer.exe (StgCreateDocfileOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D3C90)
[Address] EAT @explorer.exe (StgCreatePropSetStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD175F10)
[Address] EAT @explorer.exe (StgCreatePropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEDF0)
[Address] EAT @explorer.exe (StgCreateStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6290)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B8040)
[Address] EAT @explorer.exe (StgGetIFillLockBytesOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD174B00)
[Address] EAT @explorer.exe (StgIsStorageFile) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161F10)
[Address] EAT @explorer.exe (StgIsStorageILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD132800)
[Address] EAT @explorer.exe (StgOpenAsyncDocfileOnIFillLockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D4D80)
[Address] EAT @explorer.exe (StgOpenPropStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1AEC60)
[Address] EAT @explorer.exe (StgOpenStorage) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD07E4C0)
[Address] EAT @explorer.exe (StgOpenStorageEx) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0EC8C0)
[Address] EAT @explorer.exe (StgOpenStorageOnHandle) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D6250)
[Address] EAT @explorer.exe (StgOpenStorageOnILockBytes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F8DB0)
[Address] EAT @explorer.exe (StgPropertyLengthAsVariant) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A5730)
[Address] EAT @explorer.exe (StgSetTimes) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD161E40)
[Address] EAT @explorer.exe (StringFromCLSID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0B4EF0)
[Address] EAT @explorer.exe (StringFromGUID2) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD096D40)
[Address] EAT @explorer.exe (StringFromIID) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1A3900)
[Address] EAT @explorer.exe (UpdateDCOMSettings) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1D84F0)
[Address] EAT @explorer.exe (UpdateProcessTracing) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1B7020)
[Address] EAT @explorer.exe (UtConvertDvtd16toDvtd32) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1334E0)
[Address] EAT @explorer.exe (UtConvertDvtd32toDvtd16) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1330F0)
[Address] EAT @explorer.exe (UtGetDvtd16Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD133710)
[Address] EAT @explorer.exe (UtGetDvtd32Info) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1333B0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20C340)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserFree64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20D550)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206980)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserMarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20EA10)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206910)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserSize64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E970)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD206FA0)
[Address] EAT @explorer.exe (WdtpInterfacePointer_UserUnmarshal64) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD20E8F0)
[Address] EAT @explorer.exe (WriteClassStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD17B7E0)
[Address] EAT @explorer.exe (WriteClassStm) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD0F94E0)
[Address] EAT @explorer.exe (WriteFmtUserTypeStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD1DA0F0)
[Address] EAT @explorer.exe (WriteOleStg) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD189A50)
[Address] EAT @explorer.exe (WriteStringStream) : MSCTF.dll -> HOOKED (C:\Windows\system32\ole32.dll @ 0xFD134050)
[Address] EAT @explorer.exe (AccessibleChildren) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB57A10)
[Address] EAT @explorer.exe (AccessibleObjectFromEvent) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89BA0)
[Address] EAT @explorer.exe (AccessibleObjectFromPoint) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB62710)
[Address] EAT @explorer.exe (AccessibleObjectFromWindow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53F00)
[Address] EAT @explorer.exe (CreateStdAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB55250)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89E30)
[Address] EAT @explorer.exe (CreateStdAccessibleProxyW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB60730)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AD50)
[Address] EAT @explorer.exe (DllGetClassObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5AE20)
[Address] EAT @explorer.exe (DllRegisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89880)
[Address] EAT @explorer.exe (DllUnregisterServer) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB899F0)
[Address] EAT @explorer.exe (GetOleaccVersionInfo) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89EF0)
[Address] EAT @explorer.exe (GetProcessHandleFromHwnd) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5F9F0)
[Address] EAT @explorer.exe (GetRoleTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB609D0)
[Address] EAT @explorer.exe (GetRoleTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5C2C0)
[Address] EAT @explorer.exe (GetStateTextA) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89D50)
[Address] EAT @explorer.exe (GetStateTextW) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB89DE0)
[Address] EAT @explorer.exe (IID_IAccessible) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588E8)
[Address] EAT @explorer.exe (IID_IAccessibleHandler) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB588D8)
[Address] EAT @explorer.exe (LIBID_Accessibility) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB58BE8)
[Address] EAT @explorer.exe (LresultFromObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB53240)
[Address] EAT @explorer.exe (ObjectFromLresult) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB552B0)
[Address] EAT @explorer.exe (WindowFromAccessibleObject) : WINMM.dll -> HOOKED (C:\Windows\system32\OLEACC.dll @ 0xFAB5B8E0)
[Address] EAT @firefox.exe (FREEBL_GetVector) : RASAPI32.dll -> HOOKED (D:\Program Files (x86)\Mozilla Firefox\freebl3.dll @ 0x71B51000)

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost
::1 localhost


¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5001ABYS-01YNA0 ATA Device +++++
--- User ---
[MBR] d427451e4cf5bab846fcdcc30486e566
[BSP] ef461c07fcbaa49807ea376f6f733da9 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100000 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 204802048 | Size: 376936 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD20EARS-00MVWB0 ATA Device +++++
--- User ---
[MBR] c074465a049331b64a83e62ff3ac15bd
[BSP] 542b1c9950b67d6fe021c7990e059f6f : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic USB SD Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic USB CF Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic USB SM Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic USB MS Reader USB Device +++++
Error reading User MBR! ([0x15] Za?ízení není p?ipraveno. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] Po?adavek není podporován. )

Dokončeno : << RKreport[0]_D_04072014_205219.txt >>
RKreport[0]_S_04072014_154049.txt;RKreport[0]_S_04072014_205130.txt


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 53 hostů