Ahoj prosím o kontrolu logu manželčina noťase.
Nějak se jí pomaleji vše načítá a padá net.
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 20:56:39, on 9. 5. 2014
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.9600.17037)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files (x86)\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe
C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe
C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BtTray.exe
C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
C:\Program Files (x86)\CyberLink\Power2Go8\CLMLSvc_P2G8.exe
C:\Program Files (x86)\CyberLink\YouCam\YCMMirage.exe
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Program Files (x86)\Free Download Manager\fdm.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\SysWOW64\Macromed\Flash\FlashPlayerPlugin_13_0_0_206.exe
C:\WINDOWS\SysWOW64\Macromed\Flash\FlashPlayerPlugin_13_0_0_206.exe
C:\Downloads\Software\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.bing.com?pc=CPNTDFJS
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://seznam.cz/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe
O2 - BHO: avast! Online Security - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O2 - BHO: Free Download Manager - {CC59E0F9-7E43-44FA-9FAA-8377850BF205} - C:\Program Files (x86)\Free Download Manager\iefdm2.dll
O2 - BHO: HP Network Check Helper - {E76FD755-C1BA-4DCB-9F13-99BD91223ADE} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll
O4 - HKLM\..\Run: [RemoteControl10] "C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe"
O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s
O4 - HKLM\..\Run: [BtTray] "C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BtTray.exe"
O4 - HKLM\..\Run: [HP Quick Launch] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
O4 - HKLM\..\Run: [CLVirtualDrive] "C:\Program Files (x86)\CyberLink\Power2Go8\VirtualDrive.exe" /R
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [AvastUI.exe] "C:\Program Files\AVAST Software\Avast\AvastUI.exe" /nogui
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files (x86)\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [Facebook Update] "C:\Users\euronics\AppData\Local\Facebook\Update\FacebookUpdate.exe" /c /nocrashserver
O8 - Extra context menu item: Stáhnout Free Download Managerem - file://C:\Program Files (x86)\Free Download Manager\dllink.htm
O8 - Extra context menu item: Stáhnout video Free Download Managerem - file://C:\Program Files (x86)\Free Download Manager\dlfvideo.htm
O8 - Extra context menu item: Stáhnout vybrané Free Download Managerem - file://C:\Program Files (x86)\Free Download Manager\dlselected.htm
O8 - Extra context menu item: Stáhnout vše Free Download Managerem - file://C:\Program Files (x86)\Free Download Manager\dlall.htm
O9 - Extra button: @C:\Program Files (x86)\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1004 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: @C:\Program Files (x86)\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1003 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: @C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll,-103 - {25510184-5A38-4A99-B273-DCA8EEF6CD08} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\NCLauncherFromIE.exe
O9 - Extra 'Tools' menuitem: @C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll,-102 - {25510184-5A38-4A99-B273-DCA8EEF6CD08} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\NCLauncherFromIE.exe
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {CF84DAC5-A4F5-419E-A0BA-C01FFD71112F} (SysInfo Class) - http://content.systemrequirementslab.co ... 5.13.0.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Windows\SysWow64\skype4com.dll
O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: Andrea RT Filters Service (AERTFilters) - Andrea Electronics Corporation - C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\WINDOWS\System32\alg.exe (file missing)
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: BlueSoleilCS - IVT Corporation - C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BlueSoleilCS.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: BsHelpCS - IVT Corporation - C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BsHelpCS.exe
O23 - Service: Intel(R) Content Protection HECI Service (cphs) - Intel Corporation - C:\WINDOWS\SysWow64\IntelCpHeciSvc.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\WINDOWS\system32\fxssvc.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: HP Support Assistant Service - Hewlett-Packard Company - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe
O23 - Service: HP Software Framework Service (hpqwmiex) - Hewlett-Packard Company - C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
O23 - Service: HPWMISVC - Hewlett-Packard Development Company, L.P. - C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
O23 - Service: Úložná technologie Intel® Rapid (IAStorDataMgrSvc) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
O23 - Service: Intel(R) Integrated Clock Controller Service - Intel(R) ICCS (ICCS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
O23 - Service: IconMan_R - Realsil Microelectronics Inc. - C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\WINDOWS\system32\IEEtwCollector.exe (file missing)
O23 - Service: Intel(R) Capability Licensing Service Interface - Intel(R) Corporation - C:\Program Files\Intel\iCLS Client\HeciServer.exe
O23 - Service: Intel(R) Dynamic Application Loader Host Interface Service (jhi_service) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: Intel(R) Management and Security Application Local Management Service (LMS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\WINDOWS\System32\msdtc.exe (file missing)
O23 - Service: NBService - Nero AG - C:\Program Files (x86)\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: NMIndexingService - Nero AG - C:\Program Files (x86)\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: Intel(R) Management and Security Application User Notification Service (UNS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 11894 bytes
kontrola logu
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43298
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: kontrola logu
Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
Stáhni AdwCleaner (by Xplode)
http://www.bleepingcomputer.com/download/adwcleaner/
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a klikni na Skenovat nyní a
- po proběhnutí programu se ti objeví hláška vpravo dole tak klikni na b] Kopírovat do schránky [/b]a a vlož sem celý log.
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Pokud budou problémy , spusť v nouz. režimu.
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
Stáhni AdwCleaner (by Xplode)
http://www.bleepingcomputer.com/download/adwcleaner/
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a klikni na Skenovat nyní a
- po proběhnutí programu se ti objeví hláška vpravo dole tak klikni na b] Kopírovat do schránky [/b]a a vlož sem celý log.
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Pokud budou problémy , spusť v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Re: kontrola logu
# AdwCleaner v3.207 - Report created 11/05/2014 at 12:11:16
# Updated 05/05/2014 by Xplode
# Operating System : Windows 8.1 (64 bits)
# Username : euronics - NTB
# Running from : C:\Users\euronics\Desktop\adwcleaner.exe
# Option : Scan
***** [ Services ] *****
***** [ Files / Folders ] *****
File Found : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\user.js
File Found : C:\WINDOWS\System32\roboot64.exe
Folder Found : C:\Users\euronics\AppData\Roaming\Systweak
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Found : HKCU\Software\APN PIP
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : HKCU\Software\Softonic
Key Found : [x64] HKCU\Software\APN PIP
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : [x64] HKCU\Software\Softonic
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : HKLM\Software\PIP
Key Found : HKLM\Software\systweak
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17037
-\\ Mozilla Firefox v29.0.1 (cs)
[ File : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\prefs.js ]
-\\ Google Chrome v34.0.1847.131
[ File : C:\Users\euronics\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1588 octets] - [11/05/2014 12:11:16]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1648 octets] ##########
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 11. 5. 2014
Scan Time: 12:32:13
Logfile: log.txt
Administrator: Yes
Version: 2.00.1.1004
Malware Database: v2014.05.11.03
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled
OS: Windows 8.1
CPU: x64
File System: NTFS
User: euronics
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 273533
Time Elapsed: 13 min, 34 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 1
PUP.Optional.Softonic.A, HKU\S-1-5-21-2195034484-3431626742-3491377598-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SOFTONIC\Universal Downloader, , [d847c48cabd056e0d9f0d7ab30d2916f],
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 1
PUP.Optional.PCPerformer.A, C:\Windows\System32\roboot64.exe, , [cb54b49c7704fd39ea57b4da56ac9967],
Physical Sectors: 0
(No malicious items detected)
(end)
# Updated 05/05/2014 by Xplode
# Operating System : Windows 8.1 (64 bits)
# Username : euronics - NTB
# Running from : C:\Users\euronics\Desktop\adwcleaner.exe
# Option : Scan
***** [ Services ] *****
***** [ Files / Folders ] *****
File Found : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\user.js
File Found : C:\WINDOWS\System32\roboot64.exe
Folder Found : C:\Users\euronics\AppData\Roaming\Systweak
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Found : HKCU\Software\APN PIP
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : HKCU\Software\Softonic
Key Found : [x64] HKCU\Software\APN PIP
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : [x64] HKCU\Software\Softonic
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : HKLM\Software\PIP
Key Found : HKLM\Software\systweak
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17037
-\\ Mozilla Firefox v29.0.1 (cs)
[ File : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\prefs.js ]
-\\ Google Chrome v34.0.1847.131
[ File : C:\Users\euronics\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1588 octets] - [11/05/2014 12:11:16]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1648 octets] ##########
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 11. 5. 2014
Scan Time: 12:32:13
Logfile: log.txt
Administrator: Yes
Version: 2.00.1.1004
Malware Database: v2014.05.11.03
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled
OS: Windows 8.1
CPU: x64
File System: NTFS
User: euronics
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 273533
Time Elapsed: 13 min, 34 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 1
PUP.Optional.Softonic.A, HKU\S-1-5-21-2195034484-3431626742-3491377598-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SOFTONIC\Universal Downloader, , [d847c48cabd056e0d9f0d7ab30d2916f],
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 1
PUP.Optional.PCPerformer.A, C:\Windows\System32\roboot64.exe, , [cb54b49c7704fd39ea57b4da56ac9967],
Physical Sectors: 0
(No malicious items detected)
(end)
- Orcus
- člen Security týmu
-
Elite Level 10.5
- Příspěvky: 10645
- Registrován: duben 10
- Bydliště: Okolo rostou 3 růže =o)
- Pohlaví:
- Stav:
Offline
Re: kontrola logu
Znovu spusť MbAM a dej Scan
- po proběhnutí programu se ti objeví hláška tak klikni na OK a pak na tlačítko Show Results
- ujistit se že máš zatrhnuté všechny vypsané nálezy a klikni na tlačítko Remove Selected
- když skončí odstraňování tak se ti zobrazí log, tak ho sem dej.
- pak zvol v programu OK a pak program ukonči přes Exit
====================================================
Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce“
Klikni na „ Smazat“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
====================================================
Stáhni si Junkware Removal Tool
na svojí plochu.
Deaktivuj si svůj antivirový program.
Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
====================================================
Stáhni si RogueKiller
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
- po proběhnutí programu se ti objeví hláška tak klikni na OK a pak na tlačítko Show Results
- ujistit se že máš zatrhnuté všechny vypsané nálezy a klikni na tlačítko Remove Selected
- když skončí odstraňování tak se ti zobrazí log, tak ho sem dej.
- pak zvol v programu OK a pak program ukonči přes Exit
====================================================
Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce“
Klikni na „ Smazat“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
====================================================
Stáhni si Junkware Removal Tool
na svojí plochu.
Deaktivuj si svůj antivirový program.
Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
====================================================
Stáhni si RogueKiller
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Láska hřeje, ale uhlí je uhlí.
Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.

Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.
Re: kontrola logu
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 11. 5. 2014
Čas skenování: 19:19:22
Protokol: log1.txt
Správce: Ano
Verze: 2.00.1.1004
Databáze malwaru: v2014.05.11.07
Databáze rootkitů: v2014.03.27.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Chameleon: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: euronics
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 274011
Uplynulý čas: 12 min, 56 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Shuriken: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(No malicious items detected)
Moduly: 0
(No malicious items detected)
Klíče registru: 0
(No malicious items detected)
Hodnoty registru: 0
(No malicious items detected)
Data registru: 0
(No malicious items detected)
Složky: 0
(No malicious items detected)
Soubory: 0
(No malicious items detected)
Fyzické sektory: 0
(No malicious items detected)
(end)
# AdwCleaner v3.207 - Report created 11/05/2014 at 18:34:29
# Updated 05/05/2014 by Xplode
# Operating System : Windows 8.1 (64 bits)
# Username : euronics - NTB
# Running from : C:\Users\euronics\Desktop\adwcleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\Users\euronics\AppData\Roaming\Systweak
File Deleted : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\user.js
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\systweak
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17037
-\\ Mozilla Firefox v29.0.1 (cs)
[ File : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\prefs.js ]
-\\ Google Chrome v34.0.1847.131
[ File : C:\Users\euronics\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1744 octets] - [11/05/2014 12:11:16]
AdwCleaner[R1].txt - [1757 octets] - [11/05/2014 18:33:22]
AdwCleaner[S0].txt - [1496 octets] - [11/05/2014 18:34:29]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1556 octets] ##########
www.malwarebytes.org
Datum skenování: 11. 5. 2014
Čas skenování: 19:19:22
Protokol: log1.txt
Správce: Ano
Verze: 2.00.1.1004
Databáze malwaru: v2014.05.11.07
Databáze rootkitů: v2014.03.27.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Chameleon: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: euronics
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 274011
Uplynulý čas: 12 min, 56 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Shuriken: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(No malicious items detected)
Moduly: 0
(No malicious items detected)
Klíče registru: 0
(No malicious items detected)
Hodnoty registru: 0
(No malicious items detected)
Data registru: 0
(No malicious items detected)
Složky: 0
(No malicious items detected)
Soubory: 0
(No malicious items detected)
Fyzické sektory: 0
(No malicious items detected)
(end)
# AdwCleaner v3.207 - Report created 11/05/2014 at 18:34:29
# Updated 05/05/2014 by Xplode
# Operating System : Windows 8.1 (64 bits)
# Username : euronics - NTB
# Running from : C:\Users\euronics\Desktop\adwcleaner.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\Users\euronics\AppData\Roaming\Systweak
File Deleted : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\user.js
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\systweak
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17037
-\\ Mozilla Firefox v29.0.1 (cs)
[ File : C:\Users\euronics\AppData\Roaming\Mozilla\Firefox\Profiles\74322j3m.default\prefs.js ]
-\\ Google Chrome v34.0.1847.131
[ File : C:\Users\euronics\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R0].txt - [1744 octets] - [11/05/2014 12:11:16]
AdwCleaner[R1].txt - [1757 octets] - [11/05/2014 18:33:22]
AdwCleaner[S0].txt - [1496 octets] - [11/05/2014 18:34:29]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1556 octets] ##########
Re: kontrola logu
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 8.1 x64
Ran by euronics on ne 11. 05. 2014 at 18:43:44,10
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{7C388F24-47CE-4A2F-B582-1F81B76267F7}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{7C388F24-47CE-4A2F-B582-1F81B76267F7}
~~~ Files
~~~ Folders
Successfully deleted: [Empty Folder] C:\Users\euronics\appdata\local\{C939606A-25A7-4C5E-A670-55356D0BFC57}
~~~ FireFox
Emptied folder: C:\Users\euronics\AppData\Roaming\mozilla\firefox\profiles\74322j3m.default\minidumps [45 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on ne 11. 05. 2014 at 18:56:50,51
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : euronics [Práva správce]
Mód : Kontrola -- Datum : 05/11/2014 19:02:40
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B274C)
[Address] EAT @explorer.exe (DllGetClassObject) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B4984)
[Address] EAT @explorer.exe (DwmAttachMilContent) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmDefWindowProc) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2C30)
[Address] EAT @explorer.exe (DwmDetachMilContent) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmEnableBlurBehindWindow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2A70)
[Address] EAT @explorer.exe (DwmEnableComposition) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC60C)
[Address] EAT @explorer.exe (DwmEnableMMCSS) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3788)
[Address] EAT @explorer.exe (DwmExtendFrameIntoClientArea) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2DC0)
[Address] EAT @explorer.exe (DwmFlush) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B26C0)
[Address] EAT @explorer.exe (DwmGetColorizationColor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC118)
[Address] EAT @explorer.exe (DwmGetCompositionTimingInfo) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B1D40)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamClient) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamTransformHint) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmGetTransportAttributes) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC8B0)
[Address] EAT @explorer.exe (DwmGetWindowAttribute) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B1010)
[Address] EAT @explorer.exe (DwmInvalidateIconicBitmaps) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B6308)
[Address] EAT @explorer.exe (DwmIsCompositionEnabled) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B11B0)
[Address] EAT @explorer.exe (DwmModifyPreviousDxFrameDuration) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmQueryThumbnailSourceSize) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B6F34)
[Address] EAT @explorer.exe (DwmRegisterThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B69A8)
[Address] EAT @explorer.exe (DwmRenderGesture) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B7CEC)
[Address] EAT @explorer.exe (DwmSetDxFrameDuration) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmSetIconicLivePreviewBitmap) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD1CC)
[Address] EAT @explorer.exe (DwmSetIconicThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD558)
[Address] EAT @explorer.exe (DwmSetPresentParameters) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmSetWindowAttribute) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B10E8)
[Address] EAT @explorer.exe (DwmShowContact) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3A90)
[Address] EAT @explorer.exe (DwmTetherContact) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BCB1C)
[Address] EAT @explorer.exe (DwmTransitionOwnedWindow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BDBD8)
[Address] EAT @explorer.exe (DwmUnregisterThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B677C)
[Address] EAT @explorer.exe (DwmUpdateThumbnailProperties) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3A10)
[Address] EAT @explorer.exe (DwmpAllocateSecurityDescriptor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2320)
[Address] EAT @explorer.exe (DwmpDxGetWindowSharedSurface) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B5FE0)
[Address] EAT @explorer.exe (DwmpDxUpdateWindowSharedSurface) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B7710)
[Address] EAT @explorer.exe (DwmpDxgiIsThreadDesktopComposited) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3760)
[Address] EAT @explorer.exe (DwmpFreeSecurityDescriptor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B22E4)
[Address] EAT @explorer.exe (DwmpRenderFlick) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BCE70)
[Address] EAT @explorer.exe (AsyncGetClassBits) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F070B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F078D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F078E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F073FC)
[Address] EAT @explorer.exe (CoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E71EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E80810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF53D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E72460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E81490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8D1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB4044)
[Address] EAT @explorer.exe (CopyBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03020)
[Address] EAT @explorer.exe (CopyStgMedium) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E7BA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EC86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E968E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E73660)
[Address] EAT @explorer.exe (CreateURLMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E778D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB40F0)
[Address] EAT @explorer.exe (CreateUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E716F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E71600)
[Address] EAT @explorer.exe (DllGetClassObject) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EBAB3C)
[Address] EAT @explorer.exe (DllInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2458)
[Address] EAT @explorer.exe (DllRegisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2470)
[Address] EAT @explorer.exe (Extract) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F08FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA6B60)
[Address] EAT @explorer.exe (FindMediaType) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E96080)
[Address] EAT @explorer.exe (FindMimeFromData) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F302B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECB8EC)
[Address] EAT @explorer.exe (GetClassURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F092E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8C7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F38B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F29390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EA4)
[Address] EAT @explorer.exe (GetPropertyName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E76D90)
[Address] EAT @explorer.exe (HlinkGoBack) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26E78)
[Address] EAT @explorer.exe (HlinkGoForward) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F275E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F012FC)
[Address] EAT @explorer.exe (IEDllLoader) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF26F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03244)
[Address] EAT @explorer.exe (IEInstallScope) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30668)
[Address] EAT @explorer.exe (IsJITInProgress) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8B328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F2855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28688)
[Address] EAT @explorer.exe (IsStringProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1ED4)
[Address] EAT @explorer.exe (IsValidURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EC92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EFDCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07560)
[Address] EAT @explorer.exe (QueryAssociations) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8E9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F00A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF20C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E77D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF22CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EFDE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30820)
[Address] EAT @explorer.exe (URLDownloadA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F2821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F282E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28408)
[Address] EAT @explorer.exe (URLOpenStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F284D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E83E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F285D0)
[Address] EAT @explorer.exe (ZonesReInit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F29C30)
[Address] EAT @explorer.exe (AccConvertAccessMaskToActrlAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FA0C)
[Address] EAT @explorer.exe (AccConvertAccessToSD) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FB80)
[Address] EAT @explorer.exe (AccConvertAccessToSecurityDescriptor) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FD3C)
[Address] EAT @explorer.exe (AccConvertAclToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FE90)
[Address] EAT @explorer.exe (AccConvertSDToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FF2C)
[Address] EAT @explorer.exe (AccFreeIndexArray) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A60D80)
[Address] EAT @explorer.exe (AccGetAccessForTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A701A8)
[Address] EAT @explorer.exe (AccGetExplicitEntries) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70288)
[Address] EAT @explorer.exe (AccGetInheritanceSource) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A60EA0)
[Address] EAT @explorer.exe (AccLookupAccountName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70348)
[Address] EAT @explorer.exe (AccLookupAccountSid) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70648)
[Address] EAT @explorer.exe (AccLookupAccountTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A709CC)
[Address] EAT @explorer.exe (AccProvCancelOperation) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CAFC)
[Address] EAT @explorer.exe (AccProvGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CB74)
[Address] EAT @explorer.exe (AccProvGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CC1C)
[Address] EAT @explorer.exe (AccProvGetCapabilities) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A58100)
[Address] EAT @explorer.exe (AccProvGetOperationResults) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CDF8)
[Address] EAT @explorer.exe (AccProvGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CF38)
[Address] EAT @explorer.exe (AccProvGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D040)
[Address] EAT @explorer.exe (AccProvHandleGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D1B0)
[Address] EAT @explorer.exe (AccProvHandleGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D298)
[Address] EAT @explorer.exe (AccProvHandleGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D410)
[Address] EAT @explorer.exe (AccProvHandleGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6C4D0)
[Address] EAT @explorer.exe (AccProvHandleIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D48C)
[Address] EAT @explorer.exe (AccProvHandleIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D524)
[Address] EAT @explorer.exe (AccProvHandleRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D660)
[Address] EAT @explorer.exe (AccProvHandleRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D738)
[Address] EAT @explorer.exe (AccProvHandleSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D810)
[Address] EAT @explorer.exe (AccProvIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D910)
[Address] EAT @explorer.exe (AccProvIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DA24)
[Address] EAT @explorer.exe (AccProvRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DE74)
[Address] EAT @explorer.exe (AccProvRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DFB0)
[Address] EAT @explorer.exe (AccProvSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6E0EC)
[Address] EAT @explorer.exe (AccRewriteGetExplicitEntriesFromAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A57BD4)
[Address] EAT @explorer.exe (AccRewriteGetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A61510)
[Address] EAT @explorer.exe (AccRewriteGetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A61680)
[Address] EAT @explorer.exe (AccRewriteSetEntriesInAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53070)
[Address] EAT @explorer.exe (AccRewriteSetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A52270)
[Address] EAT @explorer.exe (AccRewriteSetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53BA0)
[Address] EAT @explorer.exe (AccSetEntriesInAList) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70AD4)
[Address] EAT @explorer.exe (AccTreeResetNamedSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A558A0)
[Address] EAT @explorer.exe (EventGuidToName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A5DE68)
[Address] EAT @explorer.exe (EventNameFree) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A5DEF4)
[Address] EAT @explorer.exe (GetExplicitEntriesFromAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A57BCC)
[Address] EAT @explorer.exe (GetMartaExtensionInterface) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53600)
[Address] EAT @explorer.exe (GetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A52680)
[Address] EAT @explorer.exe (GetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A51390)
[Address] EAT @explorer.exe (SetEntriesInAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53060)
[Address] EAT @explorer.exe (SetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53E64)
[Address] EAT @explorer.exe (SetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A521B0)
[Address] EAT @explorer.exe (DllCanUnloadNow) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\shacct.dll @ 0x996B1010)
[Address] EAT @explorer.exe (DllGetClassObject) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\shacct.dll @ 0x996B1130)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST500LT012-9WS142 +++++
--- User ---
[MBR] 396598fdc3f521c34d442375c8d72daf
[BSP] 42f759d52c474d63ef0c5b7751978874 : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 476940 MB
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[0]_S_05112014_190240.txt >>
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 8.1 x64
Ran by euronics on ne 11. 05. 2014 at 18:43:44,10
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{7C388F24-47CE-4A2F-B582-1F81B76267F7}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{7C388F24-47CE-4A2F-B582-1F81B76267F7}
~~~ Files
~~~ Folders
Successfully deleted: [Empty Folder] C:\Users\euronics\appdata\local\{C939606A-25A7-4C5E-A670-55356D0BFC57}
~~~ FireFox
Emptied folder: C:\Users\euronics\AppData\Roaming\mozilla\firefox\profiles\74322j3m.default\minidumps [45 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on ne 11. 05. 2014 at 18:56:50,51
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : euronics [Práva správce]
Mód : Kontrola -- Datum : 05/11/2014 19:02:40
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B274C)
[Address] EAT @explorer.exe (DllGetClassObject) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B4984)
[Address] EAT @explorer.exe (DwmAttachMilContent) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmDefWindowProc) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2C30)
[Address] EAT @explorer.exe (DwmDetachMilContent) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmEnableBlurBehindWindow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2A70)
[Address] EAT @explorer.exe (DwmEnableComposition) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC60C)
[Address] EAT @explorer.exe (DwmEnableMMCSS) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3788)
[Address] EAT @explorer.exe (DwmExtendFrameIntoClientArea) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2DC0)
[Address] EAT @explorer.exe (DwmFlush) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B26C0)
[Address] EAT @explorer.exe (DwmGetColorizationColor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC118)
[Address] EAT @explorer.exe (DwmGetCompositionTimingInfo) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B1D40)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamClient) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamTransformHint) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B8180)
[Address] EAT @explorer.exe (DwmGetTransportAttributes) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BC8B0)
[Address] EAT @explorer.exe (DwmGetWindowAttribute) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B1010)
[Address] EAT @explorer.exe (DwmInvalidateIconicBitmaps) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B6308)
[Address] EAT @explorer.exe (DwmIsCompositionEnabled) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B11B0)
[Address] EAT @explorer.exe (DwmModifyPreviousDxFrameDuration) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmQueryThumbnailSourceSize) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B6F34)
[Address] EAT @explorer.exe (DwmRegisterThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B69A8)
[Address] EAT @explorer.exe (DwmRenderGesture) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B7CEC)
[Address] EAT @explorer.exe (DwmSetDxFrameDuration) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmSetIconicLivePreviewBitmap) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD1CC)
[Address] EAT @explorer.exe (DwmSetIconicThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD558)
[Address] EAT @explorer.exe (DwmSetPresentParameters) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BD050)
[Address] EAT @explorer.exe (DwmSetWindowAttribute) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B10E8)
[Address] EAT @explorer.exe (DwmShowContact) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3A90)
[Address] EAT @explorer.exe (DwmTetherContact) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BCB1C)
[Address] EAT @explorer.exe (DwmTransitionOwnedWindow) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BDBD8)
[Address] EAT @explorer.exe (DwmUnregisterThumbnail) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B677C)
[Address] EAT @explorer.exe (DwmUpdateThumbnailProperties) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3A10)
[Address] EAT @explorer.exe (DwmpAllocateSecurityDescriptor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B2320)
[Address] EAT @explorer.exe (DwmpDxGetWindowSharedSurface) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B5FE0)
[Address] EAT @explorer.exe (DwmpDxUpdateWindowSharedSurface) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B7710)
[Address] EAT @explorer.exe (DwmpDxgiIsThreadDesktopComposited) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B3760)
[Address] EAT @explorer.exe (DwmpFreeSecurityDescriptor) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9B22E4)
[Address] EAT @explorer.exe (DwmpRenderFlick) : InputSwitch.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0x9C9BCE70)
[Address] EAT @explorer.exe (AsyncGetClassBits) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F070B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F078D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F078E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F073FC)
[Address] EAT @explorer.exe (CoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E71EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E80810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF53D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E72460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E81490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8D1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB4044)
[Address] EAT @explorer.exe (CopyBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03020)
[Address] EAT @explorer.exe (CopyStgMedium) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E7BA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EC86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E968E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E73660)
[Address] EAT @explorer.exe (CreateURLMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E778D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB40F0)
[Address] EAT @explorer.exe (CreateUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E716F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E71600)
[Address] EAT @explorer.exe (DllGetClassObject) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EBAB3C)
[Address] EAT @explorer.exe (DllInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2458)
[Address] EAT @explorer.exe (DllRegisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2470)
[Address] EAT @explorer.exe (Extract) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F08FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA6B60)
[Address] EAT @explorer.exe (FindMediaType) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E96080)
[Address] EAT @explorer.exe (FindMimeFromData) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F302B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECB8EC)
[Address] EAT @explorer.exe (GetClassURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F092E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8C7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F38B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F29390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EA4)
[Address] EAT @explorer.exe (GetPropertyName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E76D90)
[Address] EAT @explorer.exe (HlinkGoBack) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26E78)
[Address] EAT @explorer.exe (HlinkGoForward) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F26FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F275E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F012FC)
[Address] EAT @explorer.exe (IEDllLoader) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF26F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03244)
[Address] EAT @explorer.exe (IEInstallScope) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30668)
[Address] EAT @explorer.exe (IsJITInProgress) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8B328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F2855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28688)
[Address] EAT @explorer.exe (IsStringProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF1ED4)
[Address] EAT @explorer.exe (IsValidURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EC92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EFDCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F07560)
[Address] EAT @explorer.exe (QueryAssociations) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E8E9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F00A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF20C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EA8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E77D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF22CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F03258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EFDE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EB3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F30820)
[Address] EAT @explorer.exe (URLDownloadA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F27F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF5D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F2821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F282E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F28408)
[Address] EAT @explorer.exe (URLOpenStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F284D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97ECC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EF2804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E83E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97EAD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97E9A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F285D0)
[Address] EAT @explorer.exe (ZonesReInit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0x97F29C30)
[Address] EAT @explorer.exe (AccConvertAccessMaskToActrlAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FA0C)
[Address] EAT @explorer.exe (AccConvertAccessToSD) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FB80)
[Address] EAT @explorer.exe (AccConvertAccessToSecurityDescriptor) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FD3C)
[Address] EAT @explorer.exe (AccConvertAclToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FE90)
[Address] EAT @explorer.exe (AccConvertSDToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6FF2C)
[Address] EAT @explorer.exe (AccFreeIndexArray) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A60D80)
[Address] EAT @explorer.exe (AccGetAccessForTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A701A8)
[Address] EAT @explorer.exe (AccGetExplicitEntries) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70288)
[Address] EAT @explorer.exe (AccGetInheritanceSource) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A60EA0)
[Address] EAT @explorer.exe (AccLookupAccountName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70348)
[Address] EAT @explorer.exe (AccLookupAccountSid) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70648)
[Address] EAT @explorer.exe (AccLookupAccountTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A709CC)
[Address] EAT @explorer.exe (AccProvCancelOperation) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CAFC)
[Address] EAT @explorer.exe (AccProvGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CB74)
[Address] EAT @explorer.exe (AccProvGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CC1C)
[Address] EAT @explorer.exe (AccProvGetCapabilities) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A58100)
[Address] EAT @explorer.exe (AccProvGetOperationResults) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CDF8)
[Address] EAT @explorer.exe (AccProvGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6CF38)
[Address] EAT @explorer.exe (AccProvGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D040)
[Address] EAT @explorer.exe (AccProvHandleGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D1B0)
[Address] EAT @explorer.exe (AccProvHandleGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D298)
[Address] EAT @explorer.exe (AccProvHandleGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D410)
[Address] EAT @explorer.exe (AccProvHandleGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6C4D0)
[Address] EAT @explorer.exe (AccProvHandleIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D48C)
[Address] EAT @explorer.exe (AccProvHandleIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D524)
[Address] EAT @explorer.exe (AccProvHandleRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D660)
[Address] EAT @explorer.exe (AccProvHandleRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D738)
[Address] EAT @explorer.exe (AccProvHandleSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D810)
[Address] EAT @explorer.exe (AccProvIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6D910)
[Address] EAT @explorer.exe (AccProvIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DA24)
[Address] EAT @explorer.exe (AccProvRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DE74)
[Address] EAT @explorer.exe (AccProvRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6DFB0)
[Address] EAT @explorer.exe (AccProvSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A6E0EC)
[Address] EAT @explorer.exe (AccRewriteGetExplicitEntriesFromAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A57BD4)
[Address] EAT @explorer.exe (AccRewriteGetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A61510)
[Address] EAT @explorer.exe (AccRewriteGetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A61680)
[Address] EAT @explorer.exe (AccRewriteSetEntriesInAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53070)
[Address] EAT @explorer.exe (AccRewriteSetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A52270)
[Address] EAT @explorer.exe (AccRewriteSetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53BA0)
[Address] EAT @explorer.exe (AccSetEntriesInAList) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A70AD4)
[Address] EAT @explorer.exe (AccTreeResetNamedSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A558A0)
[Address] EAT @explorer.exe (EventGuidToName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A5DE68)
[Address] EAT @explorer.exe (EventNameFree) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A5DEF4)
[Address] EAT @explorer.exe (GetExplicitEntriesFromAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A57BCC)
[Address] EAT @explorer.exe (GetMartaExtensionInterface) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53600)
[Address] EAT @explorer.exe (GetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A52680)
[Address] EAT @explorer.exe (GetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A51390)
[Address] EAT @explorer.exe (SetEntriesInAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53060)
[Address] EAT @explorer.exe (SetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A53E64)
[Address] EAT @explorer.exe (SetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0x98A521B0)
[Address] EAT @explorer.exe (DllCanUnloadNow) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\shacct.dll @ 0x996B1010)
[Address] EAT @explorer.exe (DllGetClassObject) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\shacct.dll @ 0x996B1130)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST500LT012-9WS142 +++++
--- User ---
[MBR] 396598fdc3f521c34d442375c8d72daf
[BSP] 42f759d52c474d63ef0c5b7751978874 : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 476940 MB
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[0]_S_05112014_190240.txt >>
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43298
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: kontrola logu
Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Stáhni si TDSSKiller
Na svojí plochu.Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller. 2.8.16.0_(datum)_log.txt , vlož sem prosím celý obsah logu.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Stáhni si TDSSKiller
Na svojí plochu.Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller. 2.8.16.0_(datum)_log.txt , vlož sem prosím celý obsah logu.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Re: kontrola logu
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : euronics [Práva správce]
Mód : Odebrat -- Datum : 05/12/2014 22:35:01
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574274C)
[Address] EAT @explorer.exe (DllGetClassObject) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5744984)
[Address] EAT @explorer.exe (DwmAttachMilContent) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmDefWindowProc) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742C30)
[Address] EAT @explorer.exe (DwmDetachMilContent) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmEnableBlurBehindWindow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742A70)
[Address] EAT @explorer.exe (DwmEnableComposition) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C60C)
[Address] EAT @explorer.exe (DwmEnableMMCSS) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743788)
[Address] EAT @explorer.exe (DwmExtendFrameIntoClientArea) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742DC0)
[Address] EAT @explorer.exe (DwmFlush) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57426C0)
[Address] EAT @explorer.exe (DwmGetColorizationColor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C118)
[Address] EAT @explorer.exe (DwmGetCompositionTimingInfo) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5741D40)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamClient) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamTransformHint) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmGetTransportAttributes) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C8B0)
[Address] EAT @explorer.exe (DwmGetWindowAttribute) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5741010)
[Address] EAT @explorer.exe (DwmInvalidateIconicBitmaps) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5746308)
[Address] EAT @explorer.exe (DwmIsCompositionEnabled) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57411B0)
[Address] EAT @explorer.exe (DwmModifyPreviousDxFrameDuration) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmQueryThumbnailSourceSize) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5746F34)
[Address] EAT @explorer.exe (DwmRegisterThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57469A8)
[Address] EAT @explorer.exe (DwmRenderGesture) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5747CEC)
[Address] EAT @explorer.exe (DwmSetDxFrameDuration) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmSetIconicLivePreviewBitmap) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D1CC)
[Address] EAT @explorer.exe (DwmSetIconicThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D558)
[Address] EAT @explorer.exe (DwmSetPresentParameters) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmSetWindowAttribute) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57410E8)
[Address] EAT @explorer.exe (DwmShowContact) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743A90)
[Address] EAT @explorer.exe (DwmTetherContact) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574CB1C)
[Address] EAT @explorer.exe (DwmTransitionOwnedWindow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574DBD8)
[Address] EAT @explorer.exe (DwmUnregisterThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574677C)
[Address] EAT @explorer.exe (DwmUpdateThumbnailProperties) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743A10)
[Address] EAT @explorer.exe (DwmpAllocateSecurityDescriptor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742320)
[Address] EAT @explorer.exe (DwmpDxGetWindowSharedSurface) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5745FE0)
[Address] EAT @explorer.exe (DwmpDxUpdateWindowSharedSurface) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5747710)
[Address] EAT @explorer.exe (DwmpDxgiIsThreadDesktopComposited) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743760)
[Address] EAT @explorer.exe (DwmpFreeSecurityDescriptor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57422E4)
[Address] EAT @explorer.exe (DwmpRenderFlick) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574CE70)
[Address] EAT @explorer.exe (AsyncGetClassBits) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D070B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D078D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D078E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D073FC)
[Address] EAT @explorer.exe (CoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C71EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C80810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF53D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C72460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C81490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8D1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB4044)
[Address] EAT @explorer.exe (CopyBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03020)
[Address] EAT @explorer.exe (CopyStgMedium) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C7BA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CC86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C968E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C73660)
[Address] EAT @explorer.exe (CreateURLMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C778D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB40F0)
[Address] EAT @explorer.exe (CreateUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C716F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C71600)
[Address] EAT @explorer.exe (DllGetClassObject) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CBAB3C)
[Address] EAT @explorer.exe (DllInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2458)
[Address] EAT @explorer.exe (DllRegisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2470)
[Address] EAT @explorer.exe (Extract) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D08FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA6B60)
[Address] EAT @explorer.exe (FindMediaType) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C96080)
[Address] EAT @explorer.exe (FindMimeFromData) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D302B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCB8EC)
[Address] EAT @explorer.exe (GetClassURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D092E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8C7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D38B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D29390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EA4)
[Address] EAT @explorer.exe (GetPropertyName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C76D90)
[Address] EAT @explorer.exe (HlinkGoBack) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26E78)
[Address] EAT @explorer.exe (HlinkGoForward) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D275E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D012FC)
[Address] EAT @explorer.exe (IEDllLoader) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF26F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03244)
[Address] EAT @explorer.exe (IEInstallScope) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30668)
[Address] EAT @explorer.exe (IsJITInProgress) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8B328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D2855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28688)
[Address] EAT @explorer.exe (IsStringProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1ED4)
[Address] EAT @explorer.exe (IsValidURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CC92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CFDCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07560)
[Address] EAT @explorer.exe (QueryAssociations) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8E9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D00A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF20C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C77D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF22CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CFDE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30820)
[Address] EAT @explorer.exe (URLDownloadA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D2821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D282E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28408)
[Address] EAT @explorer.exe (URLOpenStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D284D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C83E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D285D0)
[Address] EAT @explorer.exe (ZonesReInit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D29C30)
[Address] EAT @explorer.exe (AccConvertAccessMaskToActrlAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FA0C)
[Address] EAT @explorer.exe (AccConvertAccessToSD) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FB80)
[Address] EAT @explorer.exe (AccConvertAccessToSecurityDescriptor) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FD3C)
[Address] EAT @explorer.exe (AccConvertAclToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FE90)
[Address] EAT @explorer.exe (AccConvertSDToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FF2C)
[Address] EAT @explorer.exe (AccFreeIndexArray) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1860D80)
[Address] EAT @explorer.exe (AccGetAccessForTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18701A8)
[Address] EAT @explorer.exe (AccGetExplicitEntries) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870288)
[Address] EAT @explorer.exe (AccGetInheritanceSource) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1860EA0)
[Address] EAT @explorer.exe (AccLookupAccountName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870348)
[Address] EAT @explorer.exe (AccLookupAccountSid) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870648)
[Address] EAT @explorer.exe (AccLookupAccountTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18709CC)
[Address] EAT @explorer.exe (AccProvCancelOperation) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CAFC)
[Address] EAT @explorer.exe (AccProvGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CB74)
[Address] EAT @explorer.exe (AccProvGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CC1C)
[Address] EAT @explorer.exe (AccProvGetCapabilities) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1858100)
[Address] EAT @explorer.exe (AccProvGetOperationResults) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CDF8)
[Address] EAT @explorer.exe (AccProvGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CF38)
[Address] EAT @explorer.exe (AccProvGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D040)
[Address] EAT @explorer.exe (AccProvHandleGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D1B0)
[Address] EAT @explorer.exe (AccProvHandleGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D298)
[Address] EAT @explorer.exe (AccProvHandleGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D410)
[Address] EAT @explorer.exe (AccProvHandleGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186C4D0)
[Address] EAT @explorer.exe (AccProvHandleIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D48C)
[Address] EAT @explorer.exe (AccProvHandleIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D524)
[Address] EAT @explorer.exe (AccProvHandleRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D660)
[Address] EAT @explorer.exe (AccProvHandleRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D738)
[Address] EAT @explorer.exe (AccProvHandleSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D810)
[Address] EAT @explorer.exe (AccProvIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D910)
[Address] EAT @explorer.exe (AccProvIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DA24)
[Address] EAT @explorer.exe (AccProvRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DE74)
[Address] EAT @explorer.exe (AccProvRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DFB0)
[Address] EAT @explorer.exe (AccProvSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186E0EC)
[Address] EAT @explorer.exe (AccRewriteGetExplicitEntriesFromAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1857BD4)
[Address] EAT @explorer.exe (AccRewriteGetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1861510)
[Address] EAT @explorer.exe (AccRewriteGetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1861680)
[Address] EAT @explorer.exe (AccRewriteSetEntriesInAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853070)
[Address] EAT @explorer.exe (AccRewriteSetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1852270)
[Address] EAT @explorer.exe (AccRewriteSetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853BA0)
[Address] EAT @explorer.exe (AccSetEntriesInAList) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870AD4)
[Address] EAT @explorer.exe (AccTreeResetNamedSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18558A0)
[Address] EAT @explorer.exe (EventGuidToName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD185DE68)
[Address] EAT @explorer.exe (EventNameFree) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD185DEF4)
[Address] EAT @explorer.exe (GetExplicitEntriesFromAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1857BCC)
[Address] EAT @explorer.exe (GetMartaExtensionInterface) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853600)
[Address] EAT @explorer.exe (GetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1852680)
[Address] EAT @explorer.exe (GetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1851390)
[Address] EAT @explorer.exe (SetEntriesInAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853060)
[Address] EAT @explorer.exe (SetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853E64)
[Address] EAT @explorer.exe (SetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18521B0)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD431010)
[Address] EAT @explorer.exe (DllGetClassObject) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD431E60)
[Address] EAT @explorer.exe (DllRegisterServer) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD4730B0)
[Address] EAT @explorer.exe (DllUnregisterServer) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD473114)
[Address] EAT @explorer.exe (BeginFileMapEnumeration) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD10459E8)
[Address] EAT @explorer.exe (CloseFileMapEnumeration) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045A50)
[Address] EAT @explorer.exe (GetNextFileMapContent) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045A9C)
[Address] EAT @explorer.exe (SRSetRestorePointA) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045C10)
[Address] EAT @explorer.exe (SRSetRestorePointW) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045CD0)
[Address] EAT @explorer.exe (SfcClose) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1042784)
[Address] EAT @explorer.exe (SfcConnectToServer) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcFileException) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcGetNextProtectedFile) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045B58)
[Address] EAT @explorer.exe (SfcInitProt) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfcInitiateScan) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcInstallProtectedFiles) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcIsFileProtected) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD10414C0)
[Address] EAT @explorer.exe (SfcIsKeyProtected) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043830)
[Address] EAT @explorer.exe (SfcTerminateWatcherThread) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1042784)
[Address] EAT @explorer.exe (SfpDeleteCatalog) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfpInstallCatalog) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfpVerifyFile) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D90)
[Address] EAT @explorer.exe (CscNetApiGetInterface) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB21530)
[Address] EAT @explorer.exe (CscSearchApiGetInterface) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB23CB8)
[Address] EAT @explorer.exe (OfflineFilesEnable) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB26FA0)
[Address] EAT @explorer.exe (OfflineFilesGetShareCachingMode) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB27434)
[Address] EAT @explorer.exe (OfflineFilesQueryStatus) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB22F50)
[Address] EAT @explorer.exe (OfflineFilesQueryStatusEx) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB22D50)
[Address] EAT @explorer.exe (OfflineFilesStart) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB274F0)
[Address] EAT @explorer.exe (AppCacheCheckManifest) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F5828)
[Address] EAT @explorer.exe (AppCacheCloseHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F17E0)
[Address] EAT @explorer.exe (AppCacheDeleteGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501320)
[Address] EAT @explorer.exe (AppCacheDeleteIEGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501378)
[Address] EAT @explorer.exe (AppCacheDuplicateHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F1950)
[Address] EAT @explorer.exe (AppCacheFinalize) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15013D0)
[Address] EAT @explorer.exe (AppCacheFreeDownloadList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501428)
[Address] EAT @explorer.exe (AppCacheFreeGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14497C0)
[Address] EAT @explorer.exe (AppCacheFreeIESpace) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7548)
[Address] EAT @explorer.exe (AppCacheFreeSpace) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501510)
[Address] EAT @explorer.exe (AppCacheGetDownloadList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501568)
[Address] EAT @explorer.exe (AppCacheGetFallbackUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD145BB94)
[Address] EAT @explorer.exe (AppCacheGetGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144979C)
[Address] EAT @explorer.exe (AppCacheGetIEGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15015C0)
[Address] EAT @explorer.exe (AppCacheGetInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501618)
[Address] EAT @explorer.exe (AppCacheGetManifestUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F40B0)
[Address] EAT @explorer.exe (AppCacheLookup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1416FF8)
[Address] EAT @explorer.exe (CommitUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DB2C0)
[Address] EAT @explorer.exe (CommitUrlCacheEntryBinaryBlob) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140C888)
[Address] EAT @explorer.exe (CommitUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E4C0)
[Address] EAT @explorer.exe (CreateMD5SSOHash) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D8690)
[Address] EAT @explorer.exe (CreateUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C322C)
[Address] EAT @explorer.exe (CreateUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C3388)
[Address] EAT @explorer.exe (CreateUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DB450)
[Address] EAT @explorer.exe (CreateUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1449E7C)
[Address] EAT @explorer.exe (CreateUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1449E58)
[Address] EAT @explorer.exe (CreateUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150252C)
[Address] EAT @explorer.exe (DeleteIE3Cache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1506A34)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7A00)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F83B0)
[Address] EAT @explorer.exe (DeleteUrlCacheEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D5494)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D5494)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7B70)
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : euronics [Práva správce]
Mód : Odebrat -- Datum : 05/12/2014 22:35:01
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574274C)
[Address] EAT @explorer.exe (DllGetClassObject) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5744984)
[Address] EAT @explorer.exe (DwmAttachMilContent) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmDefWindowProc) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742C30)
[Address] EAT @explorer.exe (DwmDetachMilContent) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmEnableBlurBehindWindow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742A70)
[Address] EAT @explorer.exe (DwmEnableComposition) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C60C)
[Address] EAT @explorer.exe (DwmEnableMMCSS) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743788)
[Address] EAT @explorer.exe (DwmExtendFrameIntoClientArea) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742DC0)
[Address] EAT @explorer.exe (DwmFlush) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57426C0)
[Address] EAT @explorer.exe (DwmGetColorizationColor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C118)
[Address] EAT @explorer.exe (DwmGetCompositionTimingInfo) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5741D40)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamClient) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmGetGraphicsStreamTransformHint) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5748180)
[Address] EAT @explorer.exe (DwmGetTransportAttributes) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574C8B0)
[Address] EAT @explorer.exe (DwmGetWindowAttribute) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5741010)
[Address] EAT @explorer.exe (DwmInvalidateIconicBitmaps) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5746308)
[Address] EAT @explorer.exe (DwmIsCompositionEnabled) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57411B0)
[Address] EAT @explorer.exe (DwmModifyPreviousDxFrameDuration) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmQueryThumbnailSourceSize) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5746F34)
[Address] EAT @explorer.exe (DwmRegisterThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57469A8)
[Address] EAT @explorer.exe (DwmRenderGesture) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5747CEC)
[Address] EAT @explorer.exe (DwmSetDxFrameDuration) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmSetIconicLivePreviewBitmap) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D1CC)
[Address] EAT @explorer.exe (DwmSetIconicThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D558)
[Address] EAT @explorer.exe (DwmSetPresentParameters) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574D050)
[Address] EAT @explorer.exe (DwmSetWindowAttribute) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57410E8)
[Address] EAT @explorer.exe (DwmShowContact) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743A90)
[Address] EAT @explorer.exe (DwmTetherContact) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574CB1C)
[Address] EAT @explorer.exe (DwmTransitionOwnedWindow) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574DBD8)
[Address] EAT @explorer.exe (DwmUnregisterThumbnail) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574677C)
[Address] EAT @explorer.exe (DwmUpdateThumbnailProperties) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743A10)
[Address] EAT @explorer.exe (DwmpAllocateSecurityDescriptor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5742320)
[Address] EAT @explorer.exe (DwmpDxGetWindowSharedSurface) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5745FE0)
[Address] EAT @explorer.exe (DwmpDxUpdateWindowSharedSurface) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5747710)
[Address] EAT @explorer.exe (DwmpDxgiIsThreadDesktopComposited) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD5743760)
[Address] EAT @explorer.exe (DwmpFreeSecurityDescriptor) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD57422E4)
[Address] EAT @explorer.exe (DwmpRenderFlick) : DUI70.dll -> HOOKED (C:\WINDOWS\SYSTEM32\dwmapi.dll @ 0xD574CE70)
[Address] EAT @explorer.exe (AsyncGetClassBits) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D070B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D078D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D078E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D073FC)
[Address] EAT @explorer.exe (CoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C71EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C80810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF53D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C72460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C81490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8D1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB4044)
[Address] EAT @explorer.exe (CopyBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03020)
[Address] EAT @explorer.exe (CopyStgMedium) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C7BA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CC86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C968E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C73660)
[Address] EAT @explorer.exe (CreateURLMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C778D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB40F0)
[Address] EAT @explorer.exe (CreateUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C716F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C71600)
[Address] EAT @explorer.exe (DllGetClassObject) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CBAB3C)
[Address] EAT @explorer.exe (DllInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2458)
[Address] EAT @explorer.exe (DllRegisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2470)
[Address] EAT @explorer.exe (Extract) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D08FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA6B60)
[Address] EAT @explorer.exe (FindMediaType) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C96080)
[Address] EAT @explorer.exe (FindMimeFromData) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D302B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCB8EC)
[Address] EAT @explorer.exe (GetClassURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D092E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8C7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D38B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D29390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EA4)
[Address] EAT @explorer.exe (GetPropertyName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C76D90)
[Address] EAT @explorer.exe (HlinkGoBack) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26E78)
[Address] EAT @explorer.exe (HlinkGoForward) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D26FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D275E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D012FC)
[Address] EAT @explorer.exe (IEDllLoader) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF26F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03244)
[Address] EAT @explorer.exe (IEInstallScope) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30668)
[Address] EAT @explorer.exe (IsJITInProgress) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8B328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D2855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28688)
[Address] EAT @explorer.exe (IsStringProperty) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF1ED4)
[Address] EAT @explorer.exe (IsValidURL) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CC92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CFDCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D07560)
[Address] EAT @explorer.exe (QueryAssociations) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C8E9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D00A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF20C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CA8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C77D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF22CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D03258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CFDE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CB3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D30820)
[Address] EAT @explorer.exe (URLDownloadA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D27F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF5D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D2821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D282E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D28408)
[Address] EAT @explorer.exe (URLOpenStreamW) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D284D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CCC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CF2804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C83E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0CAD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0C9A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D285D0)
[Address] EAT @explorer.exe (ZonesReInit) : MrmCoreR.dll -> HOOKED (C:\WINDOWS\system32\urlmon.dll @ 0xD0D29C30)
[Address] EAT @explorer.exe (AccConvertAccessMaskToActrlAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FA0C)
[Address] EAT @explorer.exe (AccConvertAccessToSD) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FB80)
[Address] EAT @explorer.exe (AccConvertAccessToSecurityDescriptor) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FD3C)
[Address] EAT @explorer.exe (AccConvertAclToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FE90)
[Address] EAT @explorer.exe (AccConvertSDToAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186FF2C)
[Address] EAT @explorer.exe (AccFreeIndexArray) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1860D80)
[Address] EAT @explorer.exe (AccGetAccessForTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18701A8)
[Address] EAT @explorer.exe (AccGetExplicitEntries) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870288)
[Address] EAT @explorer.exe (AccGetInheritanceSource) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1860EA0)
[Address] EAT @explorer.exe (AccLookupAccountName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870348)
[Address] EAT @explorer.exe (AccLookupAccountSid) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870648)
[Address] EAT @explorer.exe (AccLookupAccountTrustee) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18709CC)
[Address] EAT @explorer.exe (AccProvCancelOperation) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CAFC)
[Address] EAT @explorer.exe (AccProvGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CB74)
[Address] EAT @explorer.exe (AccProvGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CC1C)
[Address] EAT @explorer.exe (AccProvGetCapabilities) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1858100)
[Address] EAT @explorer.exe (AccProvGetOperationResults) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CDF8)
[Address] EAT @explorer.exe (AccProvGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186CF38)
[Address] EAT @explorer.exe (AccProvGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D040)
[Address] EAT @explorer.exe (AccProvHandleGetAccessInfoPerObjectType) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D1B0)
[Address] EAT @explorer.exe (AccProvHandleGetAllRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D298)
[Address] EAT @explorer.exe (AccProvHandleGetTrusteesAccess) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D410)
[Address] EAT @explorer.exe (AccProvHandleGrantAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186C4D0)
[Address] EAT @explorer.exe (AccProvHandleIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D48C)
[Address] EAT @explorer.exe (AccProvHandleIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D524)
[Address] EAT @explorer.exe (AccProvHandleRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D660)
[Address] EAT @explorer.exe (AccProvHandleRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D738)
[Address] EAT @explorer.exe (AccProvHandleSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D810)
[Address] EAT @explorer.exe (AccProvIsAccessAudited) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186D910)
[Address] EAT @explorer.exe (AccProvIsObjectAccessible) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DA24)
[Address] EAT @explorer.exe (AccProvRevokeAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DE74)
[Address] EAT @explorer.exe (AccProvRevokeAuditRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186DFB0)
[Address] EAT @explorer.exe (AccProvSetAccessRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD186E0EC)
[Address] EAT @explorer.exe (AccRewriteGetExplicitEntriesFromAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1857BD4)
[Address] EAT @explorer.exe (AccRewriteGetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1861510)
[Address] EAT @explorer.exe (AccRewriteGetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1861680)
[Address] EAT @explorer.exe (AccRewriteSetEntriesInAcl) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853070)
[Address] EAT @explorer.exe (AccRewriteSetHandleRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1852270)
[Address] EAT @explorer.exe (AccRewriteSetNamedRights) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853BA0)
[Address] EAT @explorer.exe (AccSetEntriesInAList) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1870AD4)
[Address] EAT @explorer.exe (AccTreeResetNamedSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18558A0)
[Address] EAT @explorer.exe (EventGuidToName) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD185DE68)
[Address] EAT @explorer.exe (EventNameFree) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD185DEF4)
[Address] EAT @explorer.exe (GetExplicitEntriesFromAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1857BCC)
[Address] EAT @explorer.exe (GetMartaExtensionInterface) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853600)
[Address] EAT @explorer.exe (GetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1852680)
[Address] EAT @explorer.exe (GetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1851390)
[Address] EAT @explorer.exe (SetEntriesInAclW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853060)
[Address] EAT @explorer.exe (SetNamedSecurityInfoW) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD1853E64)
[Address] EAT @explorer.exe (SetSecurityInfo) : NInput.dll -> HOOKED (C:\WINDOWS\SYSTEM32\ntmarta.dll @ 0xD18521B0)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD431010)
[Address] EAT @explorer.exe (DllGetClassObject) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD431E60)
[Address] EAT @explorer.exe (DllRegisterServer) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD4730B0)
[Address] EAT @explorer.exe (DllUnregisterServer) : MsftEdit.dll -> HOOKED (C:\WINDOWS\system32\PhotoMetadataHandler.dll @ 0xCD473114)
[Address] EAT @explorer.exe (BeginFileMapEnumeration) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD10459E8)
[Address] EAT @explorer.exe (CloseFileMapEnumeration) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045A50)
[Address] EAT @explorer.exe (GetNextFileMapContent) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045A9C)
[Address] EAT @explorer.exe (SRSetRestorePointA) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045C10)
[Address] EAT @explorer.exe (SRSetRestorePointW) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045CD0)
[Address] EAT @explorer.exe (SfcClose) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1042784)
[Address] EAT @explorer.exe (SfcConnectToServer) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcFileException) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcGetNextProtectedFile) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045B58)
[Address] EAT @explorer.exe (SfcInitProt) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfcInitiateScan) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcInstallProtectedFiles) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043820)
[Address] EAT @explorer.exe (SfcIsFileProtected) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD10414C0)
[Address] EAT @explorer.exe (SfcIsKeyProtected) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1043830)
[Address] EAT @explorer.exe (SfcTerminateWatcherThread) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1042784)
[Address] EAT @explorer.exe (SfpDeleteCatalog) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfpInstallCatalog) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D84)
[Address] EAT @explorer.exe (SfpVerifyFile) : wercplsupport.dll -> HOOKED (C:\WINDOWS\System32\sfc_os.dll @ 0xD1045D90)
[Address] EAT @explorer.exe (CscNetApiGetInterface) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB21530)
[Address] EAT @explorer.exe (CscSearchApiGetInterface) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB23CB8)
[Address] EAT @explorer.exe (OfflineFilesEnable) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB26FA0)
[Address] EAT @explorer.exe (OfflineFilesGetShareCachingMode) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB27434)
[Address] EAT @explorer.exe (OfflineFilesQueryStatus) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB22F50)
[Address] EAT @explorer.exe (OfflineFilesQueryStatusEx) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB22D50)
[Address] EAT @explorer.exe (OfflineFilesStart) : SYNCENG.dll -> HOOKED (C:\WINDOWS\System32\CSCAPI.dll @ 0xCEB274F0)
[Address] EAT @explorer.exe (AppCacheCheckManifest) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F5828)
[Address] EAT @explorer.exe (AppCacheCloseHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F17E0)
[Address] EAT @explorer.exe (AppCacheDeleteGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501320)
[Address] EAT @explorer.exe (AppCacheDeleteIEGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501378)
[Address] EAT @explorer.exe (AppCacheDuplicateHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F1950)
[Address] EAT @explorer.exe (AppCacheFinalize) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15013D0)
[Address] EAT @explorer.exe (AppCacheFreeDownloadList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501428)
[Address] EAT @explorer.exe (AppCacheFreeGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14497C0)
[Address] EAT @explorer.exe (AppCacheFreeIESpace) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7548)
[Address] EAT @explorer.exe (AppCacheFreeSpace) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501510)
[Address] EAT @explorer.exe (AppCacheGetDownloadList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501568)
[Address] EAT @explorer.exe (AppCacheGetFallbackUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD145BB94)
[Address] EAT @explorer.exe (AppCacheGetGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144979C)
[Address] EAT @explorer.exe (AppCacheGetIEGroupList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15015C0)
[Address] EAT @explorer.exe (AppCacheGetInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1501618)
[Address] EAT @explorer.exe (AppCacheGetManifestUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F40B0)
[Address] EAT @explorer.exe (AppCacheLookup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1416FF8)
[Address] EAT @explorer.exe (CommitUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DB2C0)
[Address] EAT @explorer.exe (CommitUrlCacheEntryBinaryBlob) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140C888)
[Address] EAT @explorer.exe (CommitUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E4C0)
[Address] EAT @explorer.exe (CreateMD5SSOHash) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D8690)
[Address] EAT @explorer.exe (CreateUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C322C)
[Address] EAT @explorer.exe (CreateUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C3388)
[Address] EAT @explorer.exe (CreateUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DB450)
[Address] EAT @explorer.exe (CreateUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1449E7C)
[Address] EAT @explorer.exe (CreateUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1449E58)
[Address] EAT @explorer.exe (CreateUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150252C)
[Address] EAT @explorer.exe (DeleteIE3Cache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1506A34)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7A00)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13F83B0)
[Address] EAT @explorer.exe (DeleteUrlCacheEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D5494)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D5494)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C7B70)
Re: kontrola logu
[Address] EAT @explorer.exe (DeleteUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150262C)
[Address] EAT @explorer.exe (DeleteWpadCacheForNetworks) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14BF270)
[Address] EAT @explorer.exe (DetectAutoProxyUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14BF76C)
[Address] EAT @explorer.exe (DispatchAPICall) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1391B28)
[Address] EAT @explorer.exe (DllCanUnloadNow) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1409CC0)
[Address] EAT @explorer.exe (DllGetClassObject) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1405990)
[Address] EAT @explorer.exe (DllInstall) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149A544)
[Address] EAT @explorer.exe (DllRegisterServer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A22D0)
[Address] EAT @explorer.exe (DllUnregisterServer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A2310)
[Address] EAT @explorer.exe (FindCloseUrlCache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139A0C0)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E16C)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2CB4)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139BA6C)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1407DA8)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C97E0)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1407570)
[Address] EAT @explorer.exe (FindFirstUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502730)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E044)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2F48)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139BED0)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502878)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502A48)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C9400)
[Address] EAT @explorer.exe (FindNextUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502C18)
[Address] EAT @explorer.exe (ForceNexusLookup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D889C)
[Address] EAT @explorer.exe (ForceNexusLookupExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D88F0)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502D34)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C66F0)
[Address] EAT @explorer.exe (FtpCommandA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD388)
[Address] EAT @explorer.exe (FtpCommandW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B0D4C)
[Address] EAT @explorer.exe (FtpCreateDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD46C)
[Address] EAT @explorer.exe (FtpCreateDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B0EE8)
[Address] EAT @explorer.exe (FtpDeleteFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD50C)
[Address] EAT @explorer.exe (FtpDeleteFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1050)
[Address] EAT @explorer.exe (FtpFindFirstFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD5AC)
[Address] EAT @explorer.exe (FtpFindFirstFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B11B8)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD818)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1390)
[Address] EAT @explorer.exe (FtpGetFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD8D8)
[Address] EAT @explorer.exe (FtpGetFileEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1518)
[Address] EAT @explorer.exe (FtpGetFileSize) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADAFC)
[Address] EAT @explorer.exe (FtpGetFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B16AC)
[Address] EAT @explorer.exe (FtpOpenFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADD70)
[Address] EAT @explorer.exe (FtpOpenFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B17B0)
[Address] EAT @explorer.exe (FtpPutFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADE50)
[Address] EAT @explorer.exe (FtpPutFileEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1840)
[Address] EAT @explorer.exe (FtpPutFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B19A4)
[Address] EAT @explorer.exe (FtpRemoveDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE1D0)
[Address] EAT @explorer.exe (FtpRemoveDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1A78)
[Address] EAT @explorer.exe (FtpRenameFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE270)
[Address] EAT @explorer.exe (FtpRenameFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1BD4)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE324)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1DF4)
[Address] EAT @explorer.exe (GetProxyDllInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1497C00)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502F54)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C62C8)
[Address] EAT @explorer.exe (GetUrlCacheEntryBinaryBlob) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139ACF0)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15031F0)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15033A8)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140F540)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1397824)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15035F0)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503858)
[Address] EAT @explorer.exe (GetUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13ABDE0)
[Address] EAT @explorer.exe (GopherCreateLocatorA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherCreateLocatorW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherFindFirstFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherFindFirstFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetLocatorTypeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetLocatorTypeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherOpenFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherOpenFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (HttpAddRequestHeadersA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A4140)
[Address] EAT @explorer.exe (HttpAddRequestHeadersW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B7A30)
[Address] EAT @explorer.exe (HttpCheckDavCompliance) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C45C8)
[Address] EAT @explorer.exe (HttpCloseDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14130E0)
[Address] EAT @explorer.exe (HttpDuplicateDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1413240)
[Address] EAT @explorer.exe (HttpEndRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8A68)
[Address] EAT @explorer.exe (HttpEndRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4C64)
[Address] EAT @explorer.exe (HttpGetServerCredentials) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14DCBCC)
[Address] EAT @explorer.exe (HttpGetTunnelSocket) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7058)
[Address] EAT @explorer.exe (HttpOpenDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14163C0)
[Address] EAT @explorer.exe (HttpOpenRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C52C0)
[Address] EAT @explorer.exe (HttpOpenRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A2EE0)
[Address] EAT @explorer.exe (HttpPushClose) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7D94)
[Address] EAT @explorer.exe (HttpPushEnable) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7E44)
[Address] EAT @explorer.exe (HttpPushWait) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7E9C)
[Address] EAT @explorer.exe (HttpQueryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A8B60)
[Address] EAT @explorer.exe (HttpQueryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13AA090)
[Address] EAT @explorer.exe (HttpSendRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14440D0)
[Address] EAT @explorer.exe (HttpSendRequestExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4D64)
[Address] EAT @explorer.exe (HttpSendRequestExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8880)
[Address] EAT @explorer.exe (HttpSendRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B7634)
[Address] EAT @explorer.exe (HttpWebSocketClose) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5350)
[Address] EAT @explorer.exe (HttpWebSocketCompleteUpgrade) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D58DC)
[Address] EAT @explorer.exe (HttpWebSocketQueryCloseStatus) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5498)
[Address] EAT @explorer.exe (HttpWebSocketReceive) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5D7C)
[Address] EAT @explorer.exe (HttpWebSocketSend) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D62C0)
[Address] EAT @explorer.exe (HttpWebSocketShutdown) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D6580)
[Address] EAT @explorer.exe (IncrementUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D74F4)
[Address] EAT @explorer.exe (InternetAlgIdToStringA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1ABC)
[Address] EAT @explorer.exe (InternetAlgIdToStringW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1CA0)
[Address] EAT @explorer.exe (InternetAttemptConnect) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149BF9C)
[Address] EAT @explorer.exe (InternetAutodial) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1148)
[Address] EAT @explorer.exe (InternetAutodialCallback) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149844C)
[Address] EAT @explorer.exe (InternetAutodialHangup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A11E0)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C004)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1447A50)
[Address] EAT @explorer.exe (InternetCheckConnectionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C110)
[Address] EAT @explorer.exe (InternetCheckConnectionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D40C)
[Address] EAT @explorer.exe (InternetClearAllPerSiteCookieDecisions) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5D68)
[Address] EAT @explorer.exe (InternetCloseHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A71F4)
[Address] EAT @explorer.exe (InternetCombineUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C5B8)
[Address] EAT @explorer.exe (InternetCombineUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FC930)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossing) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2A6C)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2A6C)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1441BD0)
[Address] EAT @explorer.exe (InternetConnectA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C6D0)
[Address] EAT @explorer.exe (InternetConnectW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A65EC)
[Address] EAT @explorer.exe (InternetCrackUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D30E4)
[Address] EAT @explorer.exe (InternetCrackUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1419760)
[Address] EAT @explorer.exe (InternetCreateUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C800)
[Address] EAT @explorer.exe (InternetCreateUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FBEC8)
[Address] EAT @explorer.exe (InternetDial) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1270)
[Address] EAT @explorer.exe (InternetDialA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1270)
[Address] EAT @explorer.exe (InternetDialW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A131C)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5D74)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5DE0)
[Address] EAT @explorer.exe (InternetErrorDlg) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2B24)
[Address] EAT @explorer.exe (InternetFindNextFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B06A8)
[Address] EAT @explorer.exe (InternetFindNextFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B29E8)
[Address] EAT @explorer.exe (InternetFortezzaCommand) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7EF4)
[Address] EAT @explorer.exe (InternetFreeCookies) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6AC8)
[Address] EAT @explorer.exe (InternetFreeProxyInfoList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144762C)
[Address] EAT @explorer.exe (InternetGetCertByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (InternetGetCertByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (InternetGetConnectedState) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140EE28)
[Address] EAT @explorer.exe (InternetGetConnectedStateEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14482A0)
[Address] EAT @explorer.exe (InternetGetConnectedStateExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14482A0)
[Address] EAT @explorer.exe (InternetGetConnectedStateExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13EAD90)
[Address] EAT @explorer.exe (InternetGetCookieA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C70B0)
[Address] EAT @explorer.exe (InternetGetCookieEx2) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6A98)
[Address] EAT @explorer.exe (InternetGetCookieExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C70E0)
[Address] EAT @explorer.exe (InternetGetCookieExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6B34)
[Address] EAT @explorer.exe (InternetGetCookieW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C73E4)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C898)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D500)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5EC4)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5F14)
[Address] EAT @explorer.exe (InternetGetProxyForUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1447374)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CA38)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CA38)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D6BC)
[Address] EAT @explorer.exe (InternetGoOnline) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A13D0)
[Address] EAT @explorer.exe (InternetGoOnlineA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A13D0)
[Address] EAT @explorer.exe (InternetGoOnlineW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1468)
[Address] EAT @explorer.exe (InternetHangUp) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1500)
[Address] EAT @explorer.exe (InternetInitializeAutoProxyDll) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FC574)
[Address] EAT @explorer.exe (InternetLockRequestFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14102BC)
[Address] EAT @explorer.exe (InternetOpenA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CD55C)
[Address] EAT @explorer.exe (InternetOpenUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CB50)
[Address] EAT @explorer.exe (InternetOpenUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D7B8)
[Address] EAT @explorer.exe (InternetOpenW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CD3D4)
[Address] EAT @explorer.exe (InternetQueryDataAvailable) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13BAB70)
[Address] EAT @explorer.exe (InternetQueryFortezzaStatus) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7F54)
[Address] EAT @explorer.exe (InternetQueryOptionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A0D50)
[Address] EAT @explorer.exe (InternetQueryOptionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A1220)
[Address] EAT @explorer.exe (InternetReadFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B8430)
[Address] EAT @explorer.exe (InternetReadFileExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DDF90)
[Address] EAT @explorer.exe (InternetReadFileExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DDF00)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1E78)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1FE8)
[Address] EAT @explorer.exe (InternetSetCookieA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C7404)
[Address] EAT @explorer.exe (InternetSetCookieEx2) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C742C)
[Address] EAT @explorer.exe (InternetSetCookieExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C748C)
[Address] EAT @explorer.exe (InternetSetCookieExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D2BB0)
[Address] EAT @explorer.exe (InternetSetCookieW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C7530)
[Address] EAT @explorer.exe (InternetSetDialState) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1580)
[Address] EAT @explorer.exe (InternetSetDialStateA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1580)
[Address] EAT @explorer.exe (InternetSetDialStateW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A15D8)
[Address] EAT @explorer.exe (InternetSetFilePointer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144A07C)
[Address] EAT @explorer.exe (InternetSetOptionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139DF30)
[Address] EAT @explorer.exe (InternetSetOptionExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149DDE0)
[Address] EAT @explorer.exe (InternetSetOptionExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149DED4)
[Address] EAT @explorer.exe (InternetSetOptionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139E3F0)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5FAC)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C6044)
[Address] EAT @explorer.exe (InternetSetStatusCallback) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CE178)
[Address] EAT @explorer.exe (InternetSetStatusCallbackA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CE178)
[Address] EAT @explorer.exe (InternetSetStatusCallbackW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DEF08)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CBE4)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CBE4)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D970)
[Address] EAT @explorer.exe (InternetTimeFromSystemTime) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14118FC)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14118FC)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144AD7C)
[Address] EAT @explorer.exe (InternetTimeToSystemTime) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1444760)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1444760)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144468C)
[Address] EAT @explorer.exe (InternetUnlockRequestFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140FFF0)
[Address] EAT @explorer.exe (InternetWriteFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8B08)
[Address] EAT @explorer.exe (InternetWriteFileExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (InternetWriteFileExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (IsHostInProxyBypassList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13EBC50)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503A8C)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144A290)
[Address] EAT @explorer.exe (LoadUrlCacheContent) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (ParseX509EncodedCertificateForListBoxEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (PrivacyGetZonePreferenceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D46B8)
[Address] EAT @explorer.exe (PrivacySetZonePreferenceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4318)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DCBBC)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStreamEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503BDC)
[Address] EAT @explorer.exe (RegisterUrlCacheNotification) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1409ED8)
[Address] EAT @explorer.exe (ResumeSuspendedDownload) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A0670)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503CEC)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503EC8)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15040A0)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14480B8)
[Address] EAT @explorer.exe (RunOnceUrlCache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15042A4)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15043D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15044D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15044D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D1278)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DC1EC)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15046A4)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504860)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504A50)
[Address] EAT @explorer.exe (SetUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504C10)
[Address] EAT @explorer.exe (ShowCertificate) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (ShowClientAuthCerts) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (ShowSecurityInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2178)
[Address] EAT @explorer.exe (ShowX509EncodedCertificate) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2310)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504D30)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504D30)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504E68)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1412364)
[Address] EAT @explorer.exe (UpdateUrlCacheContentPath) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504FA8)
[Address] EAT @explorer.exe (UrlCacheCheckEntriesExist) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15050C8)
[Address] EAT @explorer.exe (UrlCacheCloseEntryHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505120)
[Address] EAT @explorer.exe (UrlCacheContainerSetEntryMaximumAge) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150516C)
[Address] EAT @explorer.exe (UrlCacheCreateContainer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2630)
[Address] EAT @explorer.exe (UrlCacheFindFirstEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C77A0)
[Address] EAT @explorer.exe (UrlCacheFindNextEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144BA04)
[Address] EAT @explorer.exe (UrlCacheFreeEntryInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14189A8)
[Address] EAT @explorer.exe (UrlCacheGetContentPaths) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15051C4)
[Address] EAT @explorer.exe (UrlCacheGetEntryInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139A5B0)
[Address] EAT @explorer.exe (UrlCacheGetGlobalLimit) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150521C)
[Address] EAT @explorer.exe (UrlCacheReadEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505274)
[Address] EAT @explorer.exe (UrlCacheReloadSettings) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15052D4)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150532C)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505384)
[Address] EAT @explorer.exe (UrlCacheSetGlobalLimit) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15053E4)
[Address] EAT @explorer.exe (UrlCacheUpdateEntryExtraData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1418FF4)
[Address] EAT @explorer.exe (UrlZonesDetach) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14DD000)
[Address] EAT @firefox.exe (DllMain) : Secur32.dll -> HOOKED (C:\WINDOWS\SysWOW64\napinsp.dll @ 0x73321B4C)
[Address] EAT @firefox.exe (NSPStartup) : Secur32.dll -> HOOKED (C:\WINDOWS\SysWOW64\napinsp.dll @ 0x73321675)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST500LT012-9WS142 +++++
--- User ---
[MBR] 396598fdc3f521c34d442375c8d72daf
[BSP] 42f759d52c474d63ef0c5b7751978874 : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 476940 MB
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[0]_D_05122014_223501.txt >>
RKreport[0]_S_05112014_190240.txt;RKreport[0]_S_05122014_223450.txt
[Address] EAT @explorer.exe (DeleteWpadCacheForNetworks) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14BF270)
[Address] EAT @explorer.exe (DetectAutoProxyUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14BF76C)
[Address] EAT @explorer.exe (DispatchAPICall) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1391B28)
[Address] EAT @explorer.exe (DllCanUnloadNow) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1409CC0)
[Address] EAT @explorer.exe (DllGetClassObject) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1405990)
[Address] EAT @explorer.exe (DllInstall) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149A544)
[Address] EAT @explorer.exe (DllRegisterServer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A22D0)
[Address] EAT @explorer.exe (DllUnregisterServer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A2310)
[Address] EAT @explorer.exe (FindCloseUrlCache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139A0C0)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E16C)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2CB4)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139BA6C)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1407DA8)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C97E0)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1407570)
[Address] EAT @explorer.exe (FindFirstUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502730)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140E044)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2F48)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139BED0)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502878)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502A48)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C9400)
[Address] EAT @explorer.exe (FindNextUrlCacheGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502C18)
[Address] EAT @explorer.exe (ForceNexusLookup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D889C)
[Address] EAT @explorer.exe (ForceNexusLookupExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D88F0)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502D34)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C66F0)
[Address] EAT @explorer.exe (FtpCommandA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD388)
[Address] EAT @explorer.exe (FtpCommandW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B0D4C)
[Address] EAT @explorer.exe (FtpCreateDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD46C)
[Address] EAT @explorer.exe (FtpCreateDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B0EE8)
[Address] EAT @explorer.exe (FtpDeleteFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD50C)
[Address] EAT @explorer.exe (FtpDeleteFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1050)
[Address] EAT @explorer.exe (FtpFindFirstFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD5AC)
[Address] EAT @explorer.exe (FtpFindFirstFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B11B8)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD818)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1390)
[Address] EAT @explorer.exe (FtpGetFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AD8D8)
[Address] EAT @explorer.exe (FtpGetFileEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1518)
[Address] EAT @explorer.exe (FtpGetFileSize) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADAFC)
[Address] EAT @explorer.exe (FtpGetFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B16AC)
[Address] EAT @explorer.exe (FtpOpenFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADD70)
[Address] EAT @explorer.exe (FtpOpenFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B17B0)
[Address] EAT @explorer.exe (FtpPutFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14ADE50)
[Address] EAT @explorer.exe (FtpPutFileEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1840)
[Address] EAT @explorer.exe (FtpPutFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B19A4)
[Address] EAT @explorer.exe (FtpRemoveDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE1D0)
[Address] EAT @explorer.exe (FtpRemoveDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1A78)
[Address] EAT @explorer.exe (FtpRenameFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE270)
[Address] EAT @explorer.exe (FtpRenameFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1BD4)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14AE324)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B1DF4)
[Address] EAT @explorer.exe (GetProxyDllInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1497C00)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1502F54)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C62C8)
[Address] EAT @explorer.exe (GetUrlCacheEntryBinaryBlob) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139ACF0)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15031F0)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15033A8)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140F540)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1397824)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15035F0)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503858)
[Address] EAT @explorer.exe (GetUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13ABDE0)
[Address] EAT @explorer.exe (GopherCreateLocatorA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherCreateLocatorW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherFindFirstFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherFindFirstFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetLocatorTypeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherGetLocatorTypeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherOpenFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (GopherOpenFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (HttpAddRequestHeadersA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A4140)
[Address] EAT @explorer.exe (HttpAddRequestHeadersW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B7A30)
[Address] EAT @explorer.exe (HttpCheckDavCompliance) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C45C8)
[Address] EAT @explorer.exe (HttpCloseDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14130E0)
[Address] EAT @explorer.exe (HttpDuplicateDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1413240)
[Address] EAT @explorer.exe (HttpEndRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8A68)
[Address] EAT @explorer.exe (HttpEndRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4C64)
[Address] EAT @explorer.exe (HttpGetServerCredentials) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14DCBCC)
[Address] EAT @explorer.exe (HttpGetTunnelSocket) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7058)
[Address] EAT @explorer.exe (HttpOpenDependencyHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14163C0)
[Address] EAT @explorer.exe (HttpOpenRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C52C0)
[Address] EAT @explorer.exe (HttpOpenRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A2EE0)
[Address] EAT @explorer.exe (HttpPushClose) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7D94)
[Address] EAT @explorer.exe (HttpPushEnable) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7E44)
[Address] EAT @explorer.exe (HttpPushWait) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7E9C)
[Address] EAT @explorer.exe (HttpQueryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A8B60)
[Address] EAT @explorer.exe (HttpQueryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13AA090)
[Address] EAT @explorer.exe (HttpSendRequestA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14440D0)
[Address] EAT @explorer.exe (HttpSendRequestExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4D64)
[Address] EAT @explorer.exe (HttpSendRequestExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8880)
[Address] EAT @explorer.exe (HttpSendRequestW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B7634)
[Address] EAT @explorer.exe (HttpWebSocketClose) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5350)
[Address] EAT @explorer.exe (HttpWebSocketCompleteUpgrade) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D58DC)
[Address] EAT @explorer.exe (HttpWebSocketQueryCloseStatus) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5498)
[Address] EAT @explorer.exe (HttpWebSocketReceive) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D5D7C)
[Address] EAT @explorer.exe (HttpWebSocketSend) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D62C0)
[Address] EAT @explorer.exe (HttpWebSocketShutdown) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14D6580)
[Address] EAT @explorer.exe (IncrementUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D74F4)
[Address] EAT @explorer.exe (InternetAlgIdToStringA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1ABC)
[Address] EAT @explorer.exe (InternetAlgIdToStringW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1CA0)
[Address] EAT @explorer.exe (InternetAttemptConnect) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149BF9C)
[Address] EAT @explorer.exe (InternetAutodial) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1148)
[Address] EAT @explorer.exe (InternetAutodialCallback) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149844C)
[Address] EAT @explorer.exe (InternetAutodialHangup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A11E0)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C004)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1447A50)
[Address] EAT @explorer.exe (InternetCheckConnectionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C110)
[Address] EAT @explorer.exe (InternetCheckConnectionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D40C)
[Address] EAT @explorer.exe (InternetClearAllPerSiteCookieDecisions) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5D68)
[Address] EAT @explorer.exe (InternetCloseHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A71F4)
[Address] EAT @explorer.exe (InternetCombineUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C5B8)
[Address] EAT @explorer.exe (InternetCombineUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FC930)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossing) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2A6C)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2A6C)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1441BD0)
[Address] EAT @explorer.exe (InternetConnectA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C6D0)
[Address] EAT @explorer.exe (InternetConnectW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A65EC)
[Address] EAT @explorer.exe (InternetCrackUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D30E4)
[Address] EAT @explorer.exe (InternetCrackUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1419760)
[Address] EAT @explorer.exe (InternetCreateUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C800)
[Address] EAT @explorer.exe (InternetCreateUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FBEC8)
[Address] EAT @explorer.exe (InternetDial) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1270)
[Address] EAT @explorer.exe (InternetDialA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1270)
[Address] EAT @explorer.exe (InternetDialW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A131C)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5D74)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5DE0)
[Address] EAT @explorer.exe (InternetErrorDlg) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2B24)
[Address] EAT @explorer.exe (InternetFindNextFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B06A8)
[Address] EAT @explorer.exe (InternetFindNextFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B29E8)
[Address] EAT @explorer.exe (InternetFortezzaCommand) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7EF4)
[Address] EAT @explorer.exe (InternetFreeCookies) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6AC8)
[Address] EAT @explorer.exe (InternetFreeProxyInfoList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144762C)
[Address] EAT @explorer.exe (InternetGetCertByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (InternetGetCertByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (InternetGetConnectedState) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140EE28)
[Address] EAT @explorer.exe (InternetGetConnectedStateEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14482A0)
[Address] EAT @explorer.exe (InternetGetConnectedStateExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14482A0)
[Address] EAT @explorer.exe (InternetGetConnectedStateExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13EAD90)
[Address] EAT @explorer.exe (InternetGetCookieA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C70B0)
[Address] EAT @explorer.exe (InternetGetCookieEx2) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6A98)
[Address] EAT @explorer.exe (InternetGetCookieExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C70E0)
[Address] EAT @explorer.exe (InternetGetCookieExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D6B34)
[Address] EAT @explorer.exe (InternetGetCookieW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C73E4)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149C898)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D500)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5EC4)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5F14)
[Address] EAT @explorer.exe (InternetGetProxyForUrl) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1447374)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CA38)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CA38)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D6BC)
[Address] EAT @explorer.exe (InternetGoOnline) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A13D0)
[Address] EAT @explorer.exe (InternetGoOnlineA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A13D0)
[Address] EAT @explorer.exe (InternetGoOnlineW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1468)
[Address] EAT @explorer.exe (InternetHangUp) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1500)
[Address] EAT @explorer.exe (InternetInitializeAutoProxyDll) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13FC574)
[Address] EAT @explorer.exe (InternetLockRequestFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14102BC)
[Address] EAT @explorer.exe (InternetOpenA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CD55C)
[Address] EAT @explorer.exe (InternetOpenUrlA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CB50)
[Address] EAT @explorer.exe (InternetOpenUrlW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D7B8)
[Address] EAT @explorer.exe (InternetOpenW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CD3D4)
[Address] EAT @explorer.exe (InternetQueryDataAvailable) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13BAB70)
[Address] EAT @explorer.exe (InternetQueryFortezzaStatus) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A7F54)
[Address] EAT @explorer.exe (InternetQueryOptionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A0D50)
[Address] EAT @explorer.exe (InternetQueryOptionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13A1220)
[Address] EAT @explorer.exe (InternetReadFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13B8430)
[Address] EAT @explorer.exe (InternetReadFileExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DDF90)
[Address] EAT @explorer.exe (InternetReadFileExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DDF00)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1E78)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E1FE8)
[Address] EAT @explorer.exe (InternetSetCookieA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C7404)
[Address] EAT @explorer.exe (InternetSetCookieEx2) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C742C)
[Address] EAT @explorer.exe (InternetSetCookieExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C748C)
[Address] EAT @explorer.exe (InternetSetCookieExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D2BB0)
[Address] EAT @explorer.exe (InternetSetCookieW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C7530)
[Address] EAT @explorer.exe (InternetSetDialState) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1580)
[Address] EAT @explorer.exe (InternetSetDialStateA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A1580)
[Address] EAT @explorer.exe (InternetSetDialStateW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A15D8)
[Address] EAT @explorer.exe (InternetSetFilePointer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144A07C)
[Address] EAT @explorer.exe (InternetSetOptionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139DF30)
[Address] EAT @explorer.exe (InternetSetOptionExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149DDE0)
[Address] EAT @explorer.exe (InternetSetOptionExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149DED4)
[Address] EAT @explorer.exe (InternetSetOptionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139E3F0)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C5FAC)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C6044)
[Address] EAT @explorer.exe (InternetSetStatusCallback) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CE178)
[Address] EAT @explorer.exe (InternetSetStatusCallbackA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13CE178)
[Address] EAT @explorer.exe (InternetSetStatusCallbackW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DEF08)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURL) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CBE4)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149CBE4)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD149D970)
[Address] EAT @explorer.exe (InternetTimeFromSystemTime) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14118FC)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14118FC)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144AD7C)
[Address] EAT @explorer.exe (InternetTimeToSystemTime) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1444760)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1444760)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144468C)
[Address] EAT @explorer.exe (InternetUnlockRequestFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD140FFF0)
[Address] EAT @explorer.exe (InternetWriteFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D8B08)
[Address] EAT @explorer.exe (InternetWriteFileExA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (InternetWriteFileExW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (IsHostInProxyBypassList) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13EBC50)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503A8C)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144A290)
[Address] EAT @explorer.exe (LoadUrlCacheContent) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14B9C6C)
[Address] EAT @explorer.exe (ParseX509EncodedCertificateForListBoxEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (PrivacyGetZonePreferenceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D46B8)
[Address] EAT @explorer.exe (PrivacySetZonePreferenceW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14C4318)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DCBBC)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStreamEx) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503BDC)
[Address] EAT @explorer.exe (RegisterUrlCacheNotification) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1409ED8)
[Address] EAT @explorer.exe (ResumeSuspendedDownload) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14A0670)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503CEC)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1503EC8)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15040A0)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14480B8)
[Address] EAT @explorer.exe (RunOnceUrlCache) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1394D80)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15042A4)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15043D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroup) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15044D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15044D8)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13D1278)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13DC1EC)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15046A4)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504860)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504A50)
[Address] EAT @explorer.exe (SetUrlCacheHeaderData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504C10)
[Address] EAT @explorer.exe (ShowCertificate) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (ShowClientAuthCerts) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2158)
[Address] EAT @explorer.exe (ShowSecurityInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2178)
[Address] EAT @explorer.exe (ShowX509EncodedCertificate) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14E2310)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504D30)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileA) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504D30)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileW) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504E68)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1412364)
[Address] EAT @explorer.exe (UpdateUrlCacheContentPath) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1504FA8)
[Address] EAT @explorer.exe (UrlCacheCheckEntriesExist) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15050C8)
[Address] EAT @explorer.exe (UrlCacheCloseEntryHandle) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505120)
[Address] EAT @explorer.exe (UrlCacheContainerSetEntryMaximumAge) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150516C)
[Address] EAT @explorer.exe (UrlCacheCreateContainer) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C2630)
[Address] EAT @explorer.exe (UrlCacheFindFirstEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD13C77A0)
[Address] EAT @explorer.exe (UrlCacheFindNextEntry) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD144BA04)
[Address] EAT @explorer.exe (UrlCacheFreeEntryInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14189A8)
[Address] EAT @explorer.exe (UrlCacheGetContentPaths) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15051C4)
[Address] EAT @explorer.exe (UrlCacheGetEntryInfo) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD139A5B0)
[Address] EAT @explorer.exe (UrlCacheGetGlobalLimit) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150521C)
[Address] EAT @explorer.exe (UrlCacheReadEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505274)
[Address] EAT @explorer.exe (UrlCacheReloadSettings) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15052D4)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryFile) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD150532C)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryStream) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1505384)
[Address] EAT @explorer.exe (UrlCacheSetGlobalLimit) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD15053E4)
[Address] EAT @explorer.exe (UrlCacheUpdateEntryExtraData) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD1418FF4)
[Address] EAT @explorer.exe (UrlZonesDetach) : sfc.dll -> HOOKED (C:\WINDOWS\system32\WININET.dll @ 0xD14DD000)
[Address] EAT @firefox.exe (DllMain) : Secur32.dll -> HOOKED (C:\WINDOWS\SysWOW64\napinsp.dll @ 0x73321B4C)
[Address] EAT @firefox.exe (NSPStartup) : Secur32.dll -> HOOKED (C:\WINDOWS\SysWOW64\napinsp.dll @ 0x73321675)
¤¤¤ Externí včelstvo: ¤¤¤
¤¤¤ Nákaza : ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST500LT012-9WS142 +++++
--- User ---
[MBR] 396598fdc3f521c34d442375c8d72daf
[BSP] 42f759d52c474d63ef0c5b7751978874 : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 476940 MB
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[0]_D_05122014_223501.txt >>
RKreport[0]_S_05112014_190240.txt;RKreport[0]_S_05122014_223450.txt
Re: kontrola logu
22:43:04.0554 1772 TDSS rootkit removing tool 2.8.16.0 Feb 11 2013 18:50:42
22:43:04.0554 1772 UEFI system
22:43:06.0231 1772 ============================================================
22:43:06.0231 1772 Current date / time: 2014/05/12 22:43:06.0231
22:43:06.0231 1772 SystemInfo:
22:43:06.0231 1772
22:43:06.0231 1772 OS Version: 6.2.9200 ServicePack: 0.0
22:43:06.0231 1772 Product type: Workstation
22:43:06.0231 1772 ComputerName: NTB
22:43:06.0231 1772 UserName: euronics
22:43:06.0231 1772 Windows directory: C:\WINDOWS
22:43:06.0231 1772 System windows directory: C:\WINDOWS
22:43:06.0231 1772 Running under WOW64
22:43:06.0231 1772 Processor architecture: Intel x64
22:43:06.0231 1772 Number of processors: 2
22:43:06.0231 1772 Page size: 0x1000
22:43:06.0231 1772 Boot type: Normal boot
22:43:06.0231 1772 ============================================================
22:43:07.0216 1772 Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
22:43:07.0231 1772 ============================================================
22:43:07.0231 1772 \Device\Harddisk0\DR0:
22:43:07.0231 1772 GPT partitions:
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition1: GPT, TypeGUID: {DE94BBA4-06D1-4D40-A16A-BFD50179D6AC}, UniqueGUID: {0D1B5B09-FDA2-476A-BD40-6E4B27495ACA}, Name: Basic data partition, StartLBA 0x800, BlocksNum 0xC8000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition2: GPT, TypeGUID: {C12A7328-F81F-11D2-BA4B-00A0C93EC93B}, UniqueGUID: {484AEA20-B63E-4CD1-93C2-DA6A8067BCB9}, Name: EFI system partition, StartLBA 0xC8800, BlocksNum 0x82000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition3: GPT, TypeGUID: {E3C9E316-0B5C-4DB8-817D-F92DF00215AE}, UniqueGUID: {4B3E730B-2C74-4324-B6B3-BA48892FA157}, Name: Microsoft reserved partition, StartLBA 0x14A800, BlocksNum 0x40000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition4: GPT, TypeGUID: {EBD0A0A2-B9E5-4433-87C0-68B6B72699C7}, UniqueGUID: {01D6C223-C8A8-4D15-B9AC-7CD1752CFFD6}, Name: Basic data partition, StartLBA 0x18A800, BlocksNum 0x3845B800
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition5: GPT, TypeGUID: {DE94BBA4-06D1-4D40-A16A-BFD50179D6AC}, UniqueGUID: {9AA8EA8C-B6B3-4068-A136-0EE83547F79B}, Name: , StartLBA 0x385E6000, BlocksNum 0xAF000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition6: GPT, TypeGUID: {EBD0A0A2-B9E5-4433-87C0-68B6B72699C7}, UniqueGUID: {9DBAC6BB-5AFD-40BD-B20A-9A9D5F167104}, Name: Basic data partition, StartLBA 0x38695000, BlocksNum 0x1CF1000
22:43:07.0231 1772 MBR partitions:
22:43:07.0231 1772 ============================================================
22:43:07.0278 1772 C: <-> \Device\Harddisk0\DR0\Partition4
22:43:07.0513 1772 D: <-> \Device\Harddisk0\DR0\Partition6
22:43:07.0513 1772 ============================================================
22:43:07.0513 1772 Initialize success
22:43:07.0513 1772 ============================================================
22:43:09.0778 3440 ============================================================
22:43:09.0778 3440 Scan started
22:43:09.0778 3440 Mode: Manual;
22:43:09.0778 3440 ============================================================
22:43:12.0810 3440 ================ Scan system memory ========================
22:43:12.0810 3440 System memory - ok
22:43:12.0810 3440 ================ Scan services =============================
22:43:13.0733 3440 [ E1832BD9FD7E0FC2DC9FA5935DE3E8C1 ] 1394ohci C:\WINDOWS\System32\drivers\1394ohci.sys
22:43:13.0733 3440 1394ohci - ok
22:43:13.0764 3440 [ AD508A1A46EC21B740AB31C28EFDFDB1 ] 3ware C:\WINDOWS\system32\drivers\3ware.sys
22:43:13.0764 3440 3ware - ok
22:43:13.0920 3440 [ 9539F7917B4B6D92C90F0FAA6B86C605 ] ACPI C:\WINDOWS\system32\drivers\ACPI.sys
22:43:13.0920 3440 ACPI - ok
22:43:13.0967 3440 [ AC8279D229398BCF05C3154ADCA86813 ] acpiex C:\WINDOWS\system32\Drivers\acpiex.sys
22:43:13.0967 3440 acpiex - ok
22:43:13.0983 3440 [ A8970D9BF23CD309E0403978A1B58F3F ] acpipagr C:\WINDOWS\System32\drivers\acpipagr.sys
22:43:13.0983 3440 acpipagr - ok
22:43:14.0030 3440 [ 111A89C99C5B4F1A7BCE5F643DD86F65 ] AcpiPmi C:\WINDOWS\System32\drivers\acpipmi.sys
22:43:14.0030 3440 AcpiPmi - ok
22:43:14.0045 3440 [ 5758387D68A20AE7D3245011B07E36E7 ] acpitime C:\WINDOWS\System32\drivers\acpitime.sys
22:43:14.0045 3440 acpitime - ok
22:43:14.0217 3440 [ B362181ED3771DC03B4141927C80F801 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
22:43:14.0217 3440 AdobeARMservice - ok
22:43:14.0717 3440 [ 7C7E868E1D8096ED08D80FF7712BB9D8 ] AdobeFlashPlayerUpdateSvc C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
22:43:14.0717 3440 AdobeFlashPlayerUpdateSvc - ok
22:43:14.0827 3440 [ 7C1FDF1B48298CBA7CE4BDD4978951AD ] ADP80XX C:\WINDOWS\system32\drivers\ADP80XX.SYS
22:43:14.0842 3440 ADP80XX - ok
22:43:14.0920 3440 [ 0F17D49BE041B7EFF1D33BF1414E7AC6 ] AeLookupSvc C:\WINDOWS\System32\aelupsvc.dll
22:43:14.0920 3440 AeLookupSvc - ok
22:43:15.0045 3440 [ D1E343BC00136CE03C4D403194D06A80 ] AERTFilters C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
22:43:15.0045 3440 AERTFilters - ok
22:43:15.0155 3440 [ 239268BAB58EAE9A3FF4E08334C00451 ] AFD C:\WINDOWS\system32\drivers\afd.sys
22:43:15.0155 3440 AFD - ok
22:43:15.0202 3440 [ 7DFAEBA9AD62D20102B576D5CAC45EC8 ] agp440 C:\WINDOWS\system32\drivers\agp440.sys
22:43:15.0202 3440 agp440 - ok
22:43:15.0249 3440 [ 8E8E34B7BA059050EED827410D0697A2 ] ahcache C:\WINDOWS\system32\DRIVERS\ahcache.sys
22:43:15.0249 3440 ahcache - ok
22:43:15.0311 3440 [ A91D8E1E433EFB32551BCE69037E1CE7 ] ALG C:\WINDOWS\System32\alg.exe
22:43:15.0311 3440 ALG - ok
22:43:15.0342 3440 [ 7589DE749DB6F71A68489DCE04158729 ] AmdK8 C:\WINDOWS\System32\drivers\amdk8.sys
22:43:15.0342 3440 AmdK8 - ok
22:43:15.0374 3440 [ B46D2D89AFF8A9490FA8C98C7A5616E3 ] AmdPPM C:\WINDOWS\System32\drivers\amdppm.sys
22:43:15.0374 3440 AmdPPM - ok
22:43:15.0436 3440 [ D2BF2F94A47D332814910FD47C6BBCD2 ] amdsata C:\WINDOWS\system32\drivers\amdsata.sys
22:43:15.0436 3440 amdsata - ok
22:43:15.0467 3440 [ A8E04943C7BBA7219AA50400272C3C6E ] amdsbs C:\WINDOWS\system32\drivers\amdsbs.sys
22:43:15.0467 3440 amdsbs - ok
22:43:15.0499 3440 [ CEA5F4F27CFC08E3A44D576811B35F50 ] amdxata C:\WINDOWS\system32\drivers\amdxata.sys
22:43:15.0499 3440 amdxata - ok
22:43:15.0592 3440 [ 9DCB42905F1EBF9CEC57EE5DF0BDA965 ] AppHostSvc C:\WINDOWS\system32\inetsrv\apphostsvc.dll
22:43:15.0592 3440 AppHostSvc - ok
22:43:15.0624 3440 [ 04951A9A937CBE28A2D3FEEA360B6D1F ] AppID C:\WINDOWS\system32\drivers\appid.sys
22:43:15.0624 3440 AppID - ok
22:43:15.0670 3440 [ C0DC3F58214A227980AEB091CFD2F973 ] AppIDSvc C:\WINDOWS\System32\appidsvc.dll
22:43:15.0670 3440 AppIDSvc - ok
22:43:15.0717 3440 [ 8D6F535461F6CFF75A8ADDF83024C904 ] Appinfo C:\WINDOWS\System32\appinfo.dll
22:43:15.0717 3440 Appinfo - ok
22:43:15.0827 3440 [ CB12C47647D8BDAFAA94C0856B14128B ] AppReadiness C:\WINDOWS\system32\AppReadiness.dll
22:43:15.0858 3440 AppReadiness - ok
22:43:16.0014 3440 [ F7529BD3FFAC9C33D15F6DE3B7353B03 ] AppXSvc C:\WINDOWS\system32\appxdeploymentserver.dll
22:43:16.0045 3440 AppXSvc - ok
22:43:16.0077 3440 [ 65045784366F7EC5FB4E71BCF923187B ] arcsas C:\WINDOWS\system32\drivers\arcsas.sys
22:43:16.0077 3440 arcsas - ok
22:43:16.0327 3440 [ AA2E8C6B8D7EA7BAF04C988801927F48 ] aspnet_state C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
22:43:16.0327 3440 aspnet_state - ok
22:43:16.0358 3440 [ 340B0467E98A8C92697D73034DB4BCB7 ] aswHwid C:\WINDOWS\system32\drivers\aswHwid.sys
22:43:16.0358 3440 aswHwid - ok
22:43:16.0389 3440 [ ED5B09937D559FFA53FC988D20031E98 ] aswMonFlt C:\WINDOWS\system32\drivers\aswMonFlt.sys
22:43:16.0389 3440 aswMonFlt - ok
22:43:16.0420 3440 [ 33C77DCB0AEC76E26BD6352A1A5281BB ] aswRdr C:\WINDOWS\system32\drivers\aswRdr2.sys
22:43:16.0420 3440 aswRdr - ok
22:43:16.0436 3440 [ BF5B9E9E97CED45208E498D9FA73688F ] aswRvrt C:\WINDOWS\system32\drivers\aswRvrt.sys
22:43:16.0436 3440 aswRvrt - ok
22:43:16.0577 3440 [ 1C159A357210CAB8974D5FBA068DC38F ] aswSnx C:\WINDOWS\system32\drivers\aswSnx.sys
22:43:16.0577 3440 aswSnx - ok
22:43:16.0639 3440 [ 5545FB5B49268C903F311849DB1942ED ] aswSP C:\WINDOWS\system32\drivers\aswSP.sys
22:43:16.0639 3440 aswSP - ok
22:43:16.0702 3440 [ 708689376A3FD6C6897C69D272E19F4B ] aswStm C:\WINDOWS\system32\drivers\aswStm.sys
22:43:16.0702 3440 aswStm - ok
22:43:16.0733 3440 [ 47CBD3F64E412FFAFD93404580A3C7B9 ] aswVmm C:\WINDOWS\system32\drivers\aswVmm.sys
22:43:16.0733 3440 aswVmm - ok
22:43:16.0795 3440 [ 3DB7721F06BC2FEDB25029EA23AB27DA ] AsyncMac C:\WINDOWS\system32\DRIVERS\asyncmac.sys
22:43:16.0795 3440 AsyncMac - ok
22:43:16.0827 3440 [ 74B14192CF79A72F7536B27CB8814FBD ] atapi C:\WINDOWS\system32\drivers\atapi.sys
22:43:16.0827 3440 atapi - ok
22:43:16.0874 3440 [ F88EF61BCD43ADDF2C9555430C16CD96 ] atksgt C:\WINDOWS\system32\DRIVERS\atksgt.sys
22:43:16.0874 3440 atksgt - ok
22:43:16.0936 3440 [ F83D49F4B10E813A1F9AC8B92F16592D ] AudioEndpointBuilder C:\WINDOWS\System32\AudioEndpointBuilder.dll
22:43:16.0936 3440 AudioEndpointBuilder - ok
22:43:17.0046 3440 [ 9A71BD2E4B8EB550D0022AFDF8616014 ] Audiosrv C:\WINDOWS\System32\Audiosrv.dll
22:43:17.0092 3440 Audiosrv - ok
22:43:17.0202 3440 [ 37D17AE2936867F88EB3C4CBCBC6B8A1 ] avast! Antivirus C:\Program Files\AVAST Software\Avast\AvastSvc.exe
22:43:17.0202 3440 avast! Antivirus - ok
22:43:17.0249 3440 [ 96E8CAF20FC4B6C31CAD7816A801EB78 ] AxInstSV C:\WINDOWS\System32\AxInstSV.dll
22:43:17.0249 3440 AxInstSV - ok
22:43:17.0358 3440 [ A4A73F631FE2AA2826FBE4A399B04DEF ] b06bdrv C:\WINDOWS\system32\drivers\bxvbda.sys
22:43:17.0358 3440 b06bdrv - ok
22:43:17.0421 3440 [ 8CC7F7E4AFCBA605921B137ED7992C68 ] BasicDisplay C:\WINDOWS\System32\drivers\BasicDisplay.sys
22:43:17.0421 3440 BasicDisplay - ok
22:43:17.0499 3440 [ 38A82F4EE8C416A6744B6D30381ED768 ] BasicRender C:\WINDOWS\System32\drivers\BasicRender.sys
22:43:17.0499 3440 BasicRender - ok
22:43:17.0514 3440 [ C1ABB0F7E3BEA48A0417BDF6FF14AB21 ] bcmfn2 C:\WINDOWS\System32\drivers\bcmfn2.sys
22:43:17.0530 3440 bcmfn2 - ok
22:43:17.0608 3440 [ 5BD3A2351BEFCAC8757626271F8EFA89 ] BDESVC C:\WINDOWS\System32\bdesvc.dll
22:43:17.0624 3440 BDESVC - ok
22:43:17.0671 3440 [ EC19013E4CF87609534165DF897274D6 ] Beep C:\WINDOWS\system32\drivers\Beep.sys
22:43:17.0671 3440 Beep - ok
22:43:17.0811 3440 [ BBE15881FE11BE37112F8320C41DAFB9 ] BFE C:\WINDOWS\System32\bfe.dll
22:43:17.0842 3440 BFE - ok
22:43:18.0046 3440 [ 15225081966C785A9192782401643FD4 ] BITS C:\WINDOWS\System32\qmgr.dll
22:43:18.0077 3440 BITS - ok
22:43:18.0186 3440 [ 00EAE93627CCB2BC07795A3087916A5D ] BlueSoleilCS C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BlueSoleilCS.exe
22:43:18.0202 3440 BlueSoleilCS - ok
22:43:18.0233 3440 [ EBBCD5DFBB1DE70E8F4AF8FA59E401FD ] Bonjour Service C:\Program Files\Bonjour\mDNSResponder.exe
22:43:18.0249 3440 Bonjour Service - ok
22:43:18.0264 3440 [ 6B4FFFDDC618FCF64473CAA86E305697 ] bowser C:\WINDOWS\system32\DRIVERS\bowser.sys
22:43:18.0264 3440 bowser - ok
22:43:18.0311 3440 [ F2559A492AF8D653D1F47ADABA4C3E97 ] BrokerInfrastructure C:\WINDOWS\System32\bisrv.dll
22:43:18.0311 3440 BrokerInfrastructure - ok
22:43:18.0358 3440 [ D528D6A92D187777691993DD757AF19A ] Browser C:\WINDOWS\System32\browser.dll
22:43:18.0374 3440 Browser - ok
22:43:18.0374 3440 [ 3D8A3CC74E86F8D61D418D74A0194E5F ] BsHelpCS C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BsHelpCS.exe
22:43:18.0374 3440 BsHelpCS - ok
22:43:18.0405 3440 [ 34AAF6FD68B8403E76F0D08A8C1C1DA3 ] BtAudioBusSrv C:\WINDOWS\System32\Drivers\BtAudioBus.sys
22:43:18.0421 3440 BtAudioBusSrv - ok
22:43:18.0452 3440 [ A8F23D453A424FF4DE04989C4727ECC7 ] BthAvrcpTg C:\WINDOWS\System32\drivers\BthAvrcpTg.sys
22:43:18.0452 3440 BthAvrcpTg - ok
22:43:18.0467 3440 [ 131F1C8573E7BFB41C54FBF5309CCD94 ] BthEnum C:\WINDOWS\System32\drivers\BthEnum.sys
22:43:18.0467 3440 BthEnum - ok
22:43:18.0483 3440 [ 746B9F94214915AECDE4B7FEA5FF9664 ] BthHFEnum C:\WINDOWS\System32\drivers\bthhfenum.sys
22:43:18.0483 3440 BthHFEnum - ok
22:43:18.0499 3440 [ 71FE2A48E4C93DDB9798C024880B6C07 ] bthhfhid C:\WINDOWS\System32\drivers\BthHFHid.sys
22:43:18.0499 3440 bthhfhid - ok
22:43:18.0546 3440 [ 9C09D5F1257F1748A4EAB0E8584FAF61 ] BthL2caScoIfSrv C:\WINDOWS\System32\Drivers\BtL2caScoIf.sys
22:43:18.0546 3440 BthL2caScoIfSrv - ok
22:43:18.0592 3440 [ D30C67473A2E229662D21F27EAA9AAA5 ] BthLEEnum C:\WINDOWS\System32\drivers\BthLEEnum.sys
22:43:18.0592 3440 BthLEEnum - ok
22:43:18.0639 3440 [ 66B791F6B11DC4303DD18A224A501542 ] BTHMODEM C:\WINDOWS\System32\drivers\bthmodem.sys
22:43:18.0639 3440 BTHMODEM - ok
22:43:18.0655 3440 [ 3AFE71D80EDF5D4DE0C5731352905669 ] BthPan C:\WINDOWS\system32\DRIVERS\bthpan.sys
22:43:18.0655 3440 BthPan - ok
22:43:18.0702 3440 [ AB8CD3914AD779C15B27DDD9F53F7434 ] BTHPORT C:\WINDOWS\System32\Drivers\BTHport.sys
22:43:18.0717 3440 BTHPORT - ok
22:43:18.0764 3440 [ E5E48FEED73D463175EAB1542495191C ] bthserv C:\WINDOWS\system32\bthserv.dll
22:43:18.0764 3440 bthserv - ok
22:43:18.0780 3440 [ 23E75BED9076F856B36F5F934BBD5795 ] BTHUSB C:\WINDOWS\System32\Drivers\BTHUSB.sys
22:43:18.0780 3440 BTHUSB - ok
22:43:18.0827 3440 [ 84E24744627E1547B02699D1DAE4BF0E ] btUrbFilterDrv C:\WINDOWS\System32\Drivers\IvtUrbBtFlt.sys
22:43:18.0827 3440 btUrbFilterDrv - ok
22:43:18.0842 3440 [ 2FA6510E33F7DEFEC03658B74101A9B9 ] cdfs C:\WINDOWS\system32\DRIVERS\cdfs.sys
22:43:18.0842 3440 cdfs - ok
22:43:18.0889 3440 [ C6796EA22B513E3457514D92DCDB1A3D ] cdrom C:\WINDOWS\System32\drivers\cdrom.sys
22:43:18.0889 3440 cdrom - ok
22:43:18.0905 3440 [ AB285CE3431FF3D2ACE669245874C1C7 ] CertPropSvc C:\WINDOWS\System32\certprop.dll
22:43:18.0905 3440 CertPropSvc - ok
22:43:18.0952 3440 [ BE9936EDD3267FAAFF94A7835867F00B ] circlass C:\WINDOWS\System32\drivers\circlass.sys
22:43:18.0952 3440 circlass - ok
22:43:18.0983 3440 [ 179A41249055D5F039F1B6703F3B6D2B ] CLFS C:\WINDOWS\system32\drivers\CLFS.sys
22:43:18.0983 3440 CLFS - ok
22:43:19.0046 3440 [ 075CCE75090786F124573A788C8656E6 ] CLVirtualDrive C:\WINDOWS\system32\DRIVERS\CLVirtualDrive.sys
22:43:19.0046 3440 CLVirtualDrive - ok
22:43:19.0061 3440 [ EF6EF85DADC3184A10D8F2F7159973CB ] CmBatt C:\WINDOWS\System32\drivers\CmBatt.sys
22:43:19.0061 3440 CmBatt - ok
22:43:19.0077 3440 [ 4627C1FBF2802425A408A2D2AF28CF85 ] CNG C:\WINDOWS\system32\Drivers\cng.sys
22:43:19.0077 3440 CNG - ok
22:43:19.0108 3440 [ 03AAED827C36F35D70900558B8274905 ] CompositeBus C:\WINDOWS\System32\drivers\CompositeBus.sys
22:43:19.0108 3440 CompositeBus - ok
22:43:19.0108 3440 COMSysApp - ok
22:43:19.0155 3440 [ A1FF7DFBFBE164CF92603C651D304DD2 ] condrv C:\WINDOWS\system32\drivers\condrv.sys
22:43:19.0155 3440 condrv - ok
22:43:19.0233 3440 [ 08F934092E0429BADF88E9F91DB0F61E ] cphs C:\WINDOWS\SysWow64\IntelCpHeciSvc.exe
22:43:19.0249 3440 cphs - ok
22:43:19.0296 3440 [ 0EFE4B5884A8032617826A4D76F80969 ] CryptSvc C:\WINDOWS\system32\cryptsvc.dll
22:43:19.0296 3440 CryptSvc - ok
22:43:19.0296 3440 [ 315BA4BC19316D72B2E037534E048B93 ] dam C:\WINDOWS\system32\drivers\dam.sys
22:43:19.0311 3440 dam - ok
22:43:19.0358 3440 [ 81979817943D830BF24571B7C1B28A1A ] DcomLaunch C:\WINDOWS\system32\rpcss.dll
22:43:19.0374 3440 DcomLaunch - ok
22:43:19.0421 3440 [ 78089FCDE082FD4FA471C30A7C2DC736 ] defragsvc C:\WINDOWS\System32\defragsvc.dll
22:43:19.0421 3440 defragsvc - ok
22:43:19.0452 3440 [ 8F387C2C99EE09C6E2AC316205F86A17 ] DeviceAssociationService C:\WINDOWS\system32\das.dll
22:43:19.0452 3440 DeviceAssociationService - ok
22:43:19.0483 3440 [ BC6849C62DB407573C6AD8CB1A4D2628 ] DeviceInstall C:\WINDOWS\system32\umpnpmgr.dll
22:43:19.0499 3440 DeviceInstall - ok
22:43:19.0514 3440 [ A03F362C5557E238CBFA914689C77248 ] Dfsc C:\WINDOWS\system32\Drivers\dfsc.sys
22:43:19.0514 3440 Dfsc - ok
22:43:19.0561 3440 [ 8B107F55FD61654A6C9F1B819AEC5FC4 ] Dhcp C:\WINDOWS\system32\dhcpcore.dll
22:43:19.0561 3440 Dhcp - ok
22:43:19.0608 3440 [ 4D40C9B33F738797CF50E77CB7C53E85 ] disk C:\WINDOWS\system32\drivers\disk.sys
22:43:19.0608 3440 disk - ok
22:43:19.0639 3440 [ EB70A894708D1BC176AFD690FF06085F ] dmvsc C:\WINDOWS\System32\drivers\dmvsc.sys
22:43:19.0639 3440 dmvsc - ok
22:43:19.0655 3440 [ FE7656474448BE6A6C68E5C9BEB7CA94 ] Dnscache C:\WINDOWS\System32\dnsrslvr.dll
22:43:19.0655 3440 Dnscache - ok
22:43:19.0686 3440 [ 50288EA079BB520C2B8C8A154202D518 ] dot3svc C:\WINDOWS\System32\dot3svc.dll
22:43:19.0686 3440 dot3svc - ok
22:43:19.0702 3440 [ 281BEE07BA97E3E98D12A822D923D0D8 ] DPS C:\WINDOWS\system32\dps.dll
22:43:19.0702 3440 DPS - ok
22:43:19.0733 3440 [ DDC11A202207C0400CBE07315B8FDE5E ] drmkaud C:\WINDOWS\system32\drivers\drmkaud.sys
22:43:19.0733 3440 drmkaud - ok
22:43:19.0764 3440 [ 5B074F14F5DD6418F46EE4CA2DEB7EA8 ] DsmSvc C:\WINDOWS\System32\DeviceSetupManager.dll
22:43:19.0780 3440 DsmSvc - ok
22:43:19.0811 3440 [ C7D252742946DD395670649742FBD73D ] DXGKrnl C:\WINDOWS\System32\drivers\dxgkrnl.sys
22:43:19.0827 3440 DXGKrnl - ok
22:43:19.0874 3440 [ 6073537F250B45E1CB2A02E97F0FE1B2 ] Eaphost C:\WINDOWS\System32\eapsvc.dll
22:43:19.0889 3440 Eaphost - ok
22:43:19.0983 3440 [ 114BCFDF367FF37C3F1B0A96AF542E4D ] ebdrv C:\WINDOWS\system32\drivers\evbda.sys
22:43:19.0999 3440 ebdrv - ok
22:43:20.0061 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] EFS C:\WINDOWS\System32\lsass.exe
22:43:20.0061 3440 EFS - ok
22:43:20.0077 3440 [ 43531A5993380CC5113242C29D265FD9 ] EhStorClass C:\WINDOWS\system32\drivers\EhStorClass.sys
22:43:20.0077 3440 EhStorClass - ok
22:43:20.0093 3440 [ 6F8E738A9505A388B1157FDDE7B3101B ] EhStorTcgDrv C:\WINDOWS\system32\drivers\EhStorTcgDrv.sys
22:43:20.0093 3440 EhStorTcgDrv - ok
22:43:20.0124 3440 [ A05FC7ECA0966EBB70E4D17B855A853B ] ElbyCDIO C:\WINDOWS\system32\Drivers\ElbyCDIO.sys
22:43:20.0124 3440 ElbyCDIO - ok
22:43:20.0139 3440 [ DFFFAE1442BA4076E18EED5E406FA0D3 ] ErrDev C:\WINDOWS\System32\drivers\errdev.sys
22:43:20.0155 3440 ErrDev - ok
22:43:20.0202 3440 [ 030CE75B7D8F75FAA7BA1EC6FD0EB5A3 ] EventSystem C:\WINDOWS\system32\es.dll
22:43:20.0202 3440 EventSystem - ok
22:43:20.0233 3440 [ 7729D294A555C7AEB281ED8E4D0E01E4 ] exfat C:\WINDOWS\system32\drivers\exfat.sys
22:43:20.0233 3440 exfat - ok
22:43:20.0249 3440 [ 7C4E0D5900B2A1D11EDD626D6DDB937B ] fastfat C:\WINDOWS\system32\drivers\fastfat.sys
22:43:20.0264 3440 fastfat - ok
22:43:20.0296 3440 [ 2BC8532ABF2B3756B78FA1DA54147DDE ] Fax C:\WINDOWS\system32\fxssvc.exe
22:43:20.0311 3440 Fax - ok
22:43:20.0311 3440 [ 5D8402613E778B3BD45E687A8372710B ] fdc C:\WINDOWS\System32\drivers\fdc.sys
22:43:20.0327 3440 fdc - ok
22:43:20.0343 3440 [ DC1A78BCCCB7EE53D6FD3BD615A8E222 ] fdPHost C:\WINDOWS\system32\fdPHost.dll
22:43:20.0343 3440 fdPHost - ok
22:43:20.0358 3440 [ E5AD448F2DC84B1CF387FA7F2A3D1936 ] FDResPub C:\WINDOWS\system32\fdrespub.dll
22:43:20.0358 3440 FDResPub - ok
22:43:20.0374 3440 [ 0046E0BD031213D37123876B0D0FA61C ] fhsvc C:\WINDOWS\system32\fhsvc.dll
22:43:20.0374 3440 fhsvc - ok
22:43:20.0421 3440 [ BCFD8B149B3ADF92D0DB1E909CAF0265 ] FileInfo C:\WINDOWS\system32\drivers\fileinfo.sys
22:43:20.0421 3440 FileInfo - ok
22:43:20.0436 3440 [ A1A66C4FDAFD6B0289523232AFB7D8AF ] Filetrace C:\WINDOWS\system32\drivers\filetrace.sys
22:43:20.0436 3440 Filetrace - ok
22:43:20.0452 3440 [ BE743083CF7063C486A4398E3AEFE59A ] flpydisk C:\WINDOWS\System32\drivers\flpydisk.sys
22:43:20.0452 3440 flpydisk - ok
22:43:20.0483 3440 [ 46D1DF775FFF14585218BBE16E5B2C9A ] FltMgr C:\WINDOWS\system32\drivers\fltmgr.sys
22:43:20.0483 3440 FltMgr - ok
22:43:20.0530 3440 [ 183CA7699474FDE235853967D1DA4D9B ] FontCache C:\WINDOWS\system32\FntCache.dll
22:43:20.0561 3440 FontCache - ok
22:43:20.0686 3440 [ 1C52387BF5A127F5F3BFB31288F30D93 ] FontCache3.0.0.0 C:\WINDOWS\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
22:43:20.0686 3440 FontCache3.0.0.0 - ok
22:43:20.0733 3440 [ 35005534E600E993A90B036E4E599F2B ] FsDepends C:\WINDOWS\system32\drivers\FsDepends.sys
22:43:20.0733 3440 FsDepends - ok
22:43:20.0749 3440 [ 09F460AFEDCA03F3BF6E07D1CCC9AC42 ] Fs_Rec C:\WINDOWS\system32\drivers\Fs_Rec.sys
22:43:20.0749 3440 Fs_Rec - ok
22:43:20.0796 3440 [ B2BD017231836DA9F63F41E3A075D73E ] fvevol C:\WINDOWS\system32\DRIVERS\fvevol.sys
22:43:20.0796 3440 fvevol - ok
22:43:20.0811 3440 [ 9591D0B9351ED489EAFD9D1CE52A8015 ] FxPPM C:\WINDOWS\System32\drivers\fxppm.sys
22:43:20.0811 3440 FxPPM - ok
22:43:20.0827 3440 [ FC3EF65EE20D39F8749C2218DBA681CA ] gagp30kx C:\WINDOWS\system32\drivers\gagp30kx.sys
22:43:20.0827 3440 gagp30kx - ok
22:43:20.0874 3440 [ 0BF5CAD281E25F1418E5B8875DC5ADD1 ] gencounter C:\WINDOWS\System32\drivers\vmgencounter.sys
22:43:20.0874 3440 gencounter - ok
22:43:20.0905 3440 [ EF3AE7773394DF49CE74AF78A1C8D23D ] GPIOClx0101 C:\WINDOWS\system32\Drivers\msgpioclx.sys
22:43:20.0905 3440 GPIOClx0101 - ok
22:43:20.0952 3440 [ 58C11DCCC6241CC13861A559E31A69F0 ] gpsvc C:\WINDOWS\System32\gpsvc.dll
22:43:20.0999 3440 gpsvc - ok
22:43:21.0093 3440 [ 506708142BC63DABA64F2D3AD1DCD5BF ] gupdate C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
22:43:21.0093 3440 gupdate - ok
22:43:21.0108 3440 [ 506708142BC63DABA64F2D3AD1DCD5BF ] gupdatem C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
22:43:21.0108 3440 gupdatem - ok
22:43:21.0124 3440 [ 03909BDBFF0DCACCABF2B2D4ADEE44DC ] HDAudBus C:\WINDOWS\System32\drivers\HDAudBus.sys
22:43:21.0124 3440 HDAudBus - ok
22:43:21.0171 3440 [ 10A70BC1871CD955D85CD88372724906 ] HidBatt C:\WINDOWS\System32\drivers\HidBatt.sys
22:43:21.0171 3440 HidBatt - ok
22:43:21.0218 3440 [ 1EA1B4FABB8CC348E73CA90DBA22E104 ] HidBth C:\WINDOWS\System32\drivers\hidbth.sys
22:43:21.0218 3440 HidBth - ok
22:43:21.0233 3440 [ C241A8BAFBBFC90176EA0F5240EACC17 ] hidi2c C:\WINDOWS\System32\drivers\hidi2c.sys
22:43:21.0233 3440 hidi2c - ok
22:43:21.0249 3440 [ 9BDDEE26255421017E161CCB9D5EDA95 ] HidIr C:\WINDOWS\System32\drivers\hidir.sys
22:43:21.0249 3440 HidIr - ok
22:43:21.0280 3440 [ 449A20A674AA3FAA7F0DD4E33EE2DC20 ] hidserv C:\WINDOWS\system32\hidserv.dll
22:43:21.0280 3440 hidserv - ok
22:43:21.0311 3440 [ 8DB8EAB9D0C6A5DF0BDCADEA239220B4 ] HidUsb C:\WINDOWS\System32\drivers\hidusb.sys
22:43:21.0311 3440 HidUsb - ok
22:43:21.0343 3440 [ 7BF3ADCBD021D4F4A84CF40EB49C71B5 ] hkmsvc C:\WINDOWS\system32\kmsvc.dll
22:43:21.0358 3440 hkmsvc - ok
22:43:21.0374 3440 [ 6CD9C3819BE8C0A3DACC82AE5D3C4F18 ] HomeGroupListener C:\WINDOWS\system32\ListSvc.dll
22:43:21.0374 3440 HomeGroupListener - ok
22:43:21.0421 3440 [ 1A4DA1D6287B99033D144B436C23B656 ] HomeGroupProvider C:\WINDOWS\system32\provsvc.dll
22:43:21.0421 3440 HomeGroupProvider - ok
22:43:21.0483 3440 [ 2A8B93A01621E100A578E83C768AFA2C ] HP Support Assistant Service C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe
22:43:21.0483 3440 HP Support Assistant Service - ok
22:43:21.0530 3440 [ D2946D9F020AE76E9CEF9B4A6DF838C0 ] hpqwmiex C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
22:43:21.0546 3440 hpqwmiex - ok
22:43:21.0577 3440 [ A6AACEA4C785789BDA5912AD1FEDA80D ] HpSAMD C:\WINDOWS\system32\drivers\HpSAMD.sys
22:43:21.0577 3440 HpSAMD - ok
22:43:21.0827 3440 [ 3C5B2067338E4EFDADE94E4A72728F23 ] HPWMISVC C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
22:43:21.0827 3440 HPWMISVC - ok
22:43:21.0874 3440 [ 9DDCA7F18983C5410DEFF79F819DF93C ] HTTP C:\WINDOWS\system32\drivers\HTTP.sys
22:43:21.0889 3440 HTTP - ok
22:43:21.0921 3440 [ 90656C0B3864804B090434EFC582404F ] hwpolicy C:\WINDOWS\system32\drivers\hwpolicy.sys
22:43:21.0921 3440 hwpolicy - ok
22:43:21.0936 3440 [ 6D6F9E3BF0484967E52F7E846BFF1CA1 ] hyperkbd C:\WINDOWS\System32\drivers\hyperkbd.sys
22:43:21.0936 3440 hyperkbd - ok
22:43:21.0952 3440 [ 907C870F8C31F8DDD6F090857B46AB25 ] HyperVideo C:\WINDOWS\system32\DRIVERS\HyperVideo.sys
22:43:21.0952 3440 HyperVideo - ok
22:43:21.0968 3440 [ 84CFC5EFA97D0C965EDE1D56F116A541 ] i8042prt C:\WINDOWS\System32\drivers\i8042prt.sys
22:43:21.0968 3440 i8042prt - ok
22:43:21.0983 3440 [ 5D90E32E36CE5D4C535D17CE08AEAF05 ] iaLPSSi_GPIO C:\WINDOWS\System32\drivers\iaLPSSi_GPIO.sys
22:43:21.0983 3440 iaLPSSi_GPIO - ok
22:43:21.0999 3440 [ DD05E7E80F52ADE9AEB292819920F32C ] iaLPSSi_I2C C:\WINDOWS\System32\drivers\iaLPSSi_I2C.sys
22:43:21.0999 3440 iaLPSSi_I2C - ok
22:43:22.0046 3440 [ 6C91E425ACE29594BD574DE38AC9B76D ] iaStorA C:\WINDOWS\system32\drivers\iaStorA.sys
22:43:22.0046 3440 iaStorA - ok
22:43:22.0077 3440 [ 08BFE413B0B4AA8DFA4B5684CE06D3DC ] iaStorAV C:\WINDOWS\system32\drivers\iaStorAV.sys
22:43:22.0093 3440 iaStorAV - ok
22:43:22.0155 3440 [ 0AB254994A460550258446950BB58311 ] IAStorDataMgrSvc C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
22:43:22.0155 3440 IAStorDataMgrSvc - ok
22:43:22.0186 3440 [ A2200C3033FA4EF249FC096A7A7D02A2 ] iaStorV C:\WINDOWS\system32\drivers\iaStorV.sys
22:43:22.0186 3440 iaStorV - ok
22:43:22.0218 3440 [ 83FF82FE209E7997067B375DAD6CF23D ] ICCS C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
22:43:22.0218 3440 ICCS - ok
22:43:22.0280 3440 [ ABEFA4BD23329FD9BD47496BF2E58774 ] IconMan_R C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe
22:43:22.0311 3440 IconMan_R - ok
22:43:22.0311 3440 IEEtwCollectorService - ok
22:43:22.0421 3440 [ 8C44E6B688790E2AD3846C97661C54F1 ] igfx C:\WINDOWS\system32\DRIVERS\igdkmd64.sys
22:43:22.0452 3440 igfx - ok
22:43:22.0515 3440 [ CFE7F0267B0C3077042FF291949B5546 ] IKEEXT C:\WINDOWS\System32\ikeext.dll
22:43:22.0561 3440 IKEEXT - ok
22:43:22.0655 3440 [ 50D261E6921C29C516FDCB68A262829B ] IntcAzAudAddService C:\WINDOWS\system32\drivers\RTKVHD64.sys
22:43:22.0686 3440 IntcAzAudAddService - ok
22:43:22.0733 3440 [ F5495B38BFB9149925F54F65AB40EFBF ] IntcDAud C:\WINDOWS\system32\DRIVERS\IntcDAud.sys
22:43:22.0733 3440 IntcDAud - ok
22:43:22.0827 3440 [ C99F8E90DE4B8F0C7FE15BB1CBCD29DC ] Intel(R) Capability Licensing Service Interface C:\Program Files\Intel\iCLS Client\HeciServer.exe
22:43:22.0827 3440 Intel(R) Capability Licensing Service Interface - ok
22:43:22.0843 3440 [ 4E448FCFFD00E8D657CD9E48D3E47157 ] intelide C:\WINDOWS\system32\drivers\intelide.sys
22:43:22.0843 3440 intelide - ok
22:43:22.0874 3440 [ 139CFCDCD36B1B1782FD8C0014AC9B0E ] intelpep C:\WINDOWS\system32\drivers\intelpep.sys
22:43:22.0874 3440 intelpep - ok
22:43:22.0921 3440 [ 47E74A8E53C7C24DCE38311E1451C1D9 ] intelppm C:\WINDOWS\System32\drivers\intelppm.sys
22:43:22.0921 3440 intelppm - ok
22:43:22.0936 3440 [ 9DB76D7F9E4E53EFE5DD8C53DE837514 ] IpFilterDriver C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
22:43:22.0936 3440 IpFilterDriver - ok
22:43:22.0968 3440 [ DFC4050D58565ADBEE793A8D4AEBDAE6 ] iphlpsvc C:\WINDOWS\System32\iphlpsvc.dll
22:43:22.0983 3440 iphlpsvc - ok
22:43:22.0999 3440 [ FD9C9E9E3F0ED51502C7E8C066BE26B9 ] IPMIDRV C:\WINDOWS\System32\drivers\IPMIDrv.sys
22:43:23.0015 3440 IPMIDRV - ok
22:43:23.0030 3440 [ B7342B3C58E91107F6E946A93D9D4EFD ] IPNAT C:\WINDOWS\system32\drivers\ipnat.sys
22:43:23.0030 3440 IPNAT - ok
22:43:23.0061 3440 [ AE44C526AB5F8A487D941CEB57B10C97 ] IRENUM C:\WINDOWS\system32\drivers\irenum.sys
22:43:23.0061 3440 IRENUM - ok
22:43:23.0093 3440 [ 8AFEEA3955AA43616A60F133B1D25F21 ] isapnp C:\WINDOWS\system32\drivers\isapnp.sys
22:43:23.0093 3440 isapnp - ok
22:43:23.0140 3440 [ 034D4BD9DC67C64F3A4C8A049B5173BF ] iScsiPrt C:\WINDOWS\System32\drivers\msiscsi.sys
22:43:23.0140 3440 iScsiPrt - ok
22:43:23.0202 3440 [ 3C4002D339491AF73D663FFC7F6E5ECB ] jhi_service C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
22:43:23.0202 3440 jhi_service - ok
22:43:23.0249 3440 [ 8BE92376799B6B44D543E8D07CDCF885 ] kbdclass C:\WINDOWS\System32\drivers\kbdclass.sys
22:43:23.0249 3440 kbdclass - ok
22:43:23.0265 3440 [ FB6E47E569D4872ABEB506BE03A45FBA ] kbdhid C:\WINDOWS\System32\drivers\kbdhid.sys
22:43:23.0265 3440 kbdhid - ok
22:43:23.0280 3440 [ 813871C7D402A05F2E3A7075F9584A05 ] kdnic C:\WINDOWS\system32\DRIVERS\kdnic.sys
22:43:23.0280 3440 kdnic - ok
22:43:23.0296 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] KeyIso C:\WINDOWS\system32\lsass.exe
22:43:23.0311 3440 KeyIso - ok
22:43:23.0343 3440 [ ADDECBCC777665BD113BED437E602AB0 ] KSecDD C:\WINDOWS\system32\Drivers\ksecdd.sys
22:43:23.0343 3440 KSecDD - ok
22:43:23.0374 3440 [ F88CC88F4A6D8476F1664E805CA18CC2 ] KSecPkg C:\WINDOWS\system32\Drivers\ksecpkg.sys
22:43:23.0374 3440 KSecPkg - ok
22:43:23.0390 3440 [ 11AFB527AA370B1DAFD5C36F35F6D45F ] ksthunk C:\WINDOWS\system32\drivers\ksthunk.sys
22:43:23.0390 3440 ksthunk - ok
22:43:23.0436 3440 [ 32B1A8351160F307A8C66BCB0F94A9C2 ] KtmRm C:\WINDOWS\system32\msdtckrm.dll
22:43:23.0436 3440 KtmRm - ok
22:43:04.0554 1772 UEFI system
22:43:06.0231 1772 ============================================================
22:43:06.0231 1772 Current date / time: 2014/05/12 22:43:06.0231
22:43:06.0231 1772 SystemInfo:
22:43:06.0231 1772
22:43:06.0231 1772 OS Version: 6.2.9200 ServicePack: 0.0
22:43:06.0231 1772 Product type: Workstation
22:43:06.0231 1772 ComputerName: NTB
22:43:06.0231 1772 UserName: euronics
22:43:06.0231 1772 Windows directory: C:\WINDOWS
22:43:06.0231 1772 System windows directory: C:\WINDOWS
22:43:06.0231 1772 Running under WOW64
22:43:06.0231 1772 Processor architecture: Intel x64
22:43:06.0231 1772 Number of processors: 2
22:43:06.0231 1772 Page size: 0x1000
22:43:06.0231 1772 Boot type: Normal boot
22:43:06.0231 1772 ============================================================
22:43:07.0216 1772 Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
22:43:07.0231 1772 ============================================================
22:43:07.0231 1772 \Device\Harddisk0\DR0:
22:43:07.0231 1772 GPT partitions:
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition1: GPT, TypeGUID: {DE94BBA4-06D1-4D40-A16A-BFD50179D6AC}, UniqueGUID: {0D1B5B09-FDA2-476A-BD40-6E4B27495ACA}, Name: Basic data partition, StartLBA 0x800, BlocksNum 0xC8000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition2: GPT, TypeGUID: {C12A7328-F81F-11D2-BA4B-00A0C93EC93B}, UniqueGUID: {484AEA20-B63E-4CD1-93C2-DA6A8067BCB9}, Name: EFI system partition, StartLBA 0xC8800, BlocksNum 0x82000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition3: GPT, TypeGUID: {E3C9E316-0B5C-4DB8-817D-F92DF00215AE}, UniqueGUID: {4B3E730B-2C74-4324-B6B3-BA48892FA157}, Name: Microsoft reserved partition, StartLBA 0x14A800, BlocksNum 0x40000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition4: GPT, TypeGUID: {EBD0A0A2-B9E5-4433-87C0-68B6B72699C7}, UniqueGUID: {01D6C223-C8A8-4D15-B9AC-7CD1752CFFD6}, Name: Basic data partition, StartLBA 0x18A800, BlocksNum 0x3845B800
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition5: GPT, TypeGUID: {DE94BBA4-06D1-4D40-A16A-BFD50179D6AC}, UniqueGUID: {9AA8EA8C-B6B3-4068-A136-0EE83547F79B}, Name: , StartLBA 0x385E6000, BlocksNum 0xAF000
22:43:07.0231 1772 \Device\Harddisk0\DR0\Partition6: GPT, TypeGUID: {EBD0A0A2-B9E5-4433-87C0-68B6B72699C7}, UniqueGUID: {9DBAC6BB-5AFD-40BD-B20A-9A9D5F167104}, Name: Basic data partition, StartLBA 0x38695000, BlocksNum 0x1CF1000
22:43:07.0231 1772 MBR partitions:
22:43:07.0231 1772 ============================================================
22:43:07.0278 1772 C: <-> \Device\Harddisk0\DR0\Partition4
22:43:07.0513 1772 D: <-> \Device\Harddisk0\DR0\Partition6
22:43:07.0513 1772 ============================================================
22:43:07.0513 1772 Initialize success
22:43:07.0513 1772 ============================================================
22:43:09.0778 3440 ============================================================
22:43:09.0778 3440 Scan started
22:43:09.0778 3440 Mode: Manual;
22:43:09.0778 3440 ============================================================
22:43:12.0810 3440 ================ Scan system memory ========================
22:43:12.0810 3440 System memory - ok
22:43:12.0810 3440 ================ Scan services =============================
22:43:13.0733 3440 [ E1832BD9FD7E0FC2DC9FA5935DE3E8C1 ] 1394ohci C:\WINDOWS\System32\drivers\1394ohci.sys
22:43:13.0733 3440 1394ohci - ok
22:43:13.0764 3440 [ AD508A1A46EC21B740AB31C28EFDFDB1 ] 3ware C:\WINDOWS\system32\drivers\3ware.sys
22:43:13.0764 3440 3ware - ok
22:43:13.0920 3440 [ 9539F7917B4B6D92C90F0FAA6B86C605 ] ACPI C:\WINDOWS\system32\drivers\ACPI.sys
22:43:13.0920 3440 ACPI - ok
22:43:13.0967 3440 [ AC8279D229398BCF05C3154ADCA86813 ] acpiex C:\WINDOWS\system32\Drivers\acpiex.sys
22:43:13.0967 3440 acpiex - ok
22:43:13.0983 3440 [ A8970D9BF23CD309E0403978A1B58F3F ] acpipagr C:\WINDOWS\System32\drivers\acpipagr.sys
22:43:13.0983 3440 acpipagr - ok
22:43:14.0030 3440 [ 111A89C99C5B4F1A7BCE5F643DD86F65 ] AcpiPmi C:\WINDOWS\System32\drivers\acpipmi.sys
22:43:14.0030 3440 AcpiPmi - ok
22:43:14.0045 3440 [ 5758387D68A20AE7D3245011B07E36E7 ] acpitime C:\WINDOWS\System32\drivers\acpitime.sys
22:43:14.0045 3440 acpitime - ok
22:43:14.0217 3440 [ B362181ED3771DC03B4141927C80F801 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
22:43:14.0217 3440 AdobeARMservice - ok
22:43:14.0717 3440 [ 7C7E868E1D8096ED08D80FF7712BB9D8 ] AdobeFlashPlayerUpdateSvc C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
22:43:14.0717 3440 AdobeFlashPlayerUpdateSvc - ok
22:43:14.0827 3440 [ 7C1FDF1B48298CBA7CE4BDD4978951AD ] ADP80XX C:\WINDOWS\system32\drivers\ADP80XX.SYS
22:43:14.0842 3440 ADP80XX - ok
22:43:14.0920 3440 [ 0F17D49BE041B7EFF1D33BF1414E7AC6 ] AeLookupSvc C:\WINDOWS\System32\aelupsvc.dll
22:43:14.0920 3440 AeLookupSvc - ok
22:43:15.0045 3440 [ D1E343BC00136CE03C4D403194D06A80 ] AERTFilters C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
22:43:15.0045 3440 AERTFilters - ok
22:43:15.0155 3440 [ 239268BAB58EAE9A3FF4E08334C00451 ] AFD C:\WINDOWS\system32\drivers\afd.sys
22:43:15.0155 3440 AFD - ok
22:43:15.0202 3440 [ 7DFAEBA9AD62D20102B576D5CAC45EC8 ] agp440 C:\WINDOWS\system32\drivers\agp440.sys
22:43:15.0202 3440 agp440 - ok
22:43:15.0249 3440 [ 8E8E34B7BA059050EED827410D0697A2 ] ahcache C:\WINDOWS\system32\DRIVERS\ahcache.sys
22:43:15.0249 3440 ahcache - ok
22:43:15.0311 3440 [ A91D8E1E433EFB32551BCE69037E1CE7 ] ALG C:\WINDOWS\System32\alg.exe
22:43:15.0311 3440 ALG - ok
22:43:15.0342 3440 [ 7589DE749DB6F71A68489DCE04158729 ] AmdK8 C:\WINDOWS\System32\drivers\amdk8.sys
22:43:15.0342 3440 AmdK8 - ok
22:43:15.0374 3440 [ B46D2D89AFF8A9490FA8C98C7A5616E3 ] AmdPPM C:\WINDOWS\System32\drivers\amdppm.sys
22:43:15.0374 3440 AmdPPM - ok
22:43:15.0436 3440 [ D2BF2F94A47D332814910FD47C6BBCD2 ] amdsata C:\WINDOWS\system32\drivers\amdsata.sys
22:43:15.0436 3440 amdsata - ok
22:43:15.0467 3440 [ A8E04943C7BBA7219AA50400272C3C6E ] amdsbs C:\WINDOWS\system32\drivers\amdsbs.sys
22:43:15.0467 3440 amdsbs - ok
22:43:15.0499 3440 [ CEA5F4F27CFC08E3A44D576811B35F50 ] amdxata C:\WINDOWS\system32\drivers\amdxata.sys
22:43:15.0499 3440 amdxata - ok
22:43:15.0592 3440 [ 9DCB42905F1EBF9CEC57EE5DF0BDA965 ] AppHostSvc C:\WINDOWS\system32\inetsrv\apphostsvc.dll
22:43:15.0592 3440 AppHostSvc - ok
22:43:15.0624 3440 [ 04951A9A937CBE28A2D3FEEA360B6D1F ] AppID C:\WINDOWS\system32\drivers\appid.sys
22:43:15.0624 3440 AppID - ok
22:43:15.0670 3440 [ C0DC3F58214A227980AEB091CFD2F973 ] AppIDSvc C:\WINDOWS\System32\appidsvc.dll
22:43:15.0670 3440 AppIDSvc - ok
22:43:15.0717 3440 [ 8D6F535461F6CFF75A8ADDF83024C904 ] Appinfo C:\WINDOWS\System32\appinfo.dll
22:43:15.0717 3440 Appinfo - ok
22:43:15.0827 3440 [ CB12C47647D8BDAFAA94C0856B14128B ] AppReadiness C:\WINDOWS\system32\AppReadiness.dll
22:43:15.0858 3440 AppReadiness - ok
22:43:16.0014 3440 [ F7529BD3FFAC9C33D15F6DE3B7353B03 ] AppXSvc C:\WINDOWS\system32\appxdeploymentserver.dll
22:43:16.0045 3440 AppXSvc - ok
22:43:16.0077 3440 [ 65045784366F7EC5FB4E71BCF923187B ] arcsas C:\WINDOWS\system32\drivers\arcsas.sys
22:43:16.0077 3440 arcsas - ok
22:43:16.0327 3440 [ AA2E8C6B8D7EA7BAF04C988801927F48 ] aspnet_state C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
22:43:16.0327 3440 aspnet_state - ok
22:43:16.0358 3440 [ 340B0467E98A8C92697D73034DB4BCB7 ] aswHwid C:\WINDOWS\system32\drivers\aswHwid.sys
22:43:16.0358 3440 aswHwid - ok
22:43:16.0389 3440 [ ED5B09937D559FFA53FC988D20031E98 ] aswMonFlt C:\WINDOWS\system32\drivers\aswMonFlt.sys
22:43:16.0389 3440 aswMonFlt - ok
22:43:16.0420 3440 [ 33C77DCB0AEC76E26BD6352A1A5281BB ] aswRdr C:\WINDOWS\system32\drivers\aswRdr2.sys
22:43:16.0420 3440 aswRdr - ok
22:43:16.0436 3440 [ BF5B9E9E97CED45208E498D9FA73688F ] aswRvrt C:\WINDOWS\system32\drivers\aswRvrt.sys
22:43:16.0436 3440 aswRvrt - ok
22:43:16.0577 3440 [ 1C159A357210CAB8974D5FBA068DC38F ] aswSnx C:\WINDOWS\system32\drivers\aswSnx.sys
22:43:16.0577 3440 aswSnx - ok
22:43:16.0639 3440 [ 5545FB5B49268C903F311849DB1942ED ] aswSP C:\WINDOWS\system32\drivers\aswSP.sys
22:43:16.0639 3440 aswSP - ok
22:43:16.0702 3440 [ 708689376A3FD6C6897C69D272E19F4B ] aswStm C:\WINDOWS\system32\drivers\aswStm.sys
22:43:16.0702 3440 aswStm - ok
22:43:16.0733 3440 [ 47CBD3F64E412FFAFD93404580A3C7B9 ] aswVmm C:\WINDOWS\system32\drivers\aswVmm.sys
22:43:16.0733 3440 aswVmm - ok
22:43:16.0795 3440 [ 3DB7721F06BC2FEDB25029EA23AB27DA ] AsyncMac C:\WINDOWS\system32\DRIVERS\asyncmac.sys
22:43:16.0795 3440 AsyncMac - ok
22:43:16.0827 3440 [ 74B14192CF79A72F7536B27CB8814FBD ] atapi C:\WINDOWS\system32\drivers\atapi.sys
22:43:16.0827 3440 atapi - ok
22:43:16.0874 3440 [ F88EF61BCD43ADDF2C9555430C16CD96 ] atksgt C:\WINDOWS\system32\DRIVERS\atksgt.sys
22:43:16.0874 3440 atksgt - ok
22:43:16.0936 3440 [ F83D49F4B10E813A1F9AC8B92F16592D ] AudioEndpointBuilder C:\WINDOWS\System32\AudioEndpointBuilder.dll
22:43:16.0936 3440 AudioEndpointBuilder - ok
22:43:17.0046 3440 [ 9A71BD2E4B8EB550D0022AFDF8616014 ] Audiosrv C:\WINDOWS\System32\Audiosrv.dll
22:43:17.0092 3440 Audiosrv - ok
22:43:17.0202 3440 [ 37D17AE2936867F88EB3C4CBCBC6B8A1 ] avast! Antivirus C:\Program Files\AVAST Software\Avast\AvastSvc.exe
22:43:17.0202 3440 avast! Antivirus - ok
22:43:17.0249 3440 [ 96E8CAF20FC4B6C31CAD7816A801EB78 ] AxInstSV C:\WINDOWS\System32\AxInstSV.dll
22:43:17.0249 3440 AxInstSV - ok
22:43:17.0358 3440 [ A4A73F631FE2AA2826FBE4A399B04DEF ] b06bdrv C:\WINDOWS\system32\drivers\bxvbda.sys
22:43:17.0358 3440 b06bdrv - ok
22:43:17.0421 3440 [ 8CC7F7E4AFCBA605921B137ED7992C68 ] BasicDisplay C:\WINDOWS\System32\drivers\BasicDisplay.sys
22:43:17.0421 3440 BasicDisplay - ok
22:43:17.0499 3440 [ 38A82F4EE8C416A6744B6D30381ED768 ] BasicRender C:\WINDOWS\System32\drivers\BasicRender.sys
22:43:17.0499 3440 BasicRender - ok
22:43:17.0514 3440 [ C1ABB0F7E3BEA48A0417BDF6FF14AB21 ] bcmfn2 C:\WINDOWS\System32\drivers\bcmfn2.sys
22:43:17.0530 3440 bcmfn2 - ok
22:43:17.0608 3440 [ 5BD3A2351BEFCAC8757626271F8EFA89 ] BDESVC C:\WINDOWS\System32\bdesvc.dll
22:43:17.0624 3440 BDESVC - ok
22:43:17.0671 3440 [ EC19013E4CF87609534165DF897274D6 ] Beep C:\WINDOWS\system32\drivers\Beep.sys
22:43:17.0671 3440 Beep - ok
22:43:17.0811 3440 [ BBE15881FE11BE37112F8320C41DAFB9 ] BFE C:\WINDOWS\System32\bfe.dll
22:43:17.0842 3440 BFE - ok
22:43:18.0046 3440 [ 15225081966C785A9192782401643FD4 ] BITS C:\WINDOWS\System32\qmgr.dll
22:43:18.0077 3440 BITS - ok
22:43:18.0186 3440 [ 00EAE93627CCB2BC07795A3087916A5D ] BlueSoleilCS C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BlueSoleilCS.exe
22:43:18.0202 3440 BlueSoleilCS - ok
22:43:18.0233 3440 [ EBBCD5DFBB1DE70E8F4AF8FA59E401FD ] Bonjour Service C:\Program Files\Bonjour\mDNSResponder.exe
22:43:18.0249 3440 Bonjour Service - ok
22:43:18.0264 3440 [ 6B4FFFDDC618FCF64473CAA86E305697 ] bowser C:\WINDOWS\system32\DRIVERS\bowser.sys
22:43:18.0264 3440 bowser - ok
22:43:18.0311 3440 [ F2559A492AF8D653D1F47ADABA4C3E97 ] BrokerInfrastructure C:\WINDOWS\System32\bisrv.dll
22:43:18.0311 3440 BrokerInfrastructure - ok
22:43:18.0358 3440 [ D528D6A92D187777691993DD757AF19A ] Browser C:\WINDOWS\System32\browser.dll
22:43:18.0374 3440 Browser - ok
22:43:18.0374 3440 [ 3D8A3CC74E86F8D61D418D74A0194E5F ] BsHelpCS C:\Program Files (x86)\Ralink Corporation\Ralink Bluetooth Stack\BsHelpCS.exe
22:43:18.0374 3440 BsHelpCS - ok
22:43:18.0405 3440 [ 34AAF6FD68B8403E76F0D08A8C1C1DA3 ] BtAudioBusSrv C:\WINDOWS\System32\Drivers\BtAudioBus.sys
22:43:18.0421 3440 BtAudioBusSrv - ok
22:43:18.0452 3440 [ A8F23D453A424FF4DE04989C4727ECC7 ] BthAvrcpTg C:\WINDOWS\System32\drivers\BthAvrcpTg.sys
22:43:18.0452 3440 BthAvrcpTg - ok
22:43:18.0467 3440 [ 131F1C8573E7BFB41C54FBF5309CCD94 ] BthEnum C:\WINDOWS\System32\drivers\BthEnum.sys
22:43:18.0467 3440 BthEnum - ok
22:43:18.0483 3440 [ 746B9F94214915AECDE4B7FEA5FF9664 ] BthHFEnum C:\WINDOWS\System32\drivers\bthhfenum.sys
22:43:18.0483 3440 BthHFEnum - ok
22:43:18.0499 3440 [ 71FE2A48E4C93DDB9798C024880B6C07 ] bthhfhid C:\WINDOWS\System32\drivers\BthHFHid.sys
22:43:18.0499 3440 bthhfhid - ok
22:43:18.0546 3440 [ 9C09D5F1257F1748A4EAB0E8584FAF61 ] BthL2caScoIfSrv C:\WINDOWS\System32\Drivers\BtL2caScoIf.sys
22:43:18.0546 3440 BthL2caScoIfSrv - ok
22:43:18.0592 3440 [ D30C67473A2E229662D21F27EAA9AAA5 ] BthLEEnum C:\WINDOWS\System32\drivers\BthLEEnum.sys
22:43:18.0592 3440 BthLEEnum - ok
22:43:18.0639 3440 [ 66B791F6B11DC4303DD18A224A501542 ] BTHMODEM C:\WINDOWS\System32\drivers\bthmodem.sys
22:43:18.0639 3440 BTHMODEM - ok
22:43:18.0655 3440 [ 3AFE71D80EDF5D4DE0C5731352905669 ] BthPan C:\WINDOWS\system32\DRIVERS\bthpan.sys
22:43:18.0655 3440 BthPan - ok
22:43:18.0702 3440 [ AB8CD3914AD779C15B27DDD9F53F7434 ] BTHPORT C:\WINDOWS\System32\Drivers\BTHport.sys
22:43:18.0717 3440 BTHPORT - ok
22:43:18.0764 3440 [ E5E48FEED73D463175EAB1542495191C ] bthserv C:\WINDOWS\system32\bthserv.dll
22:43:18.0764 3440 bthserv - ok
22:43:18.0780 3440 [ 23E75BED9076F856B36F5F934BBD5795 ] BTHUSB C:\WINDOWS\System32\Drivers\BTHUSB.sys
22:43:18.0780 3440 BTHUSB - ok
22:43:18.0827 3440 [ 84E24744627E1547B02699D1DAE4BF0E ] btUrbFilterDrv C:\WINDOWS\System32\Drivers\IvtUrbBtFlt.sys
22:43:18.0827 3440 btUrbFilterDrv - ok
22:43:18.0842 3440 [ 2FA6510E33F7DEFEC03658B74101A9B9 ] cdfs C:\WINDOWS\system32\DRIVERS\cdfs.sys
22:43:18.0842 3440 cdfs - ok
22:43:18.0889 3440 [ C6796EA22B513E3457514D92DCDB1A3D ] cdrom C:\WINDOWS\System32\drivers\cdrom.sys
22:43:18.0889 3440 cdrom - ok
22:43:18.0905 3440 [ AB285CE3431FF3D2ACE669245874C1C7 ] CertPropSvc C:\WINDOWS\System32\certprop.dll
22:43:18.0905 3440 CertPropSvc - ok
22:43:18.0952 3440 [ BE9936EDD3267FAAFF94A7835867F00B ] circlass C:\WINDOWS\System32\drivers\circlass.sys
22:43:18.0952 3440 circlass - ok
22:43:18.0983 3440 [ 179A41249055D5F039F1B6703F3B6D2B ] CLFS C:\WINDOWS\system32\drivers\CLFS.sys
22:43:18.0983 3440 CLFS - ok
22:43:19.0046 3440 [ 075CCE75090786F124573A788C8656E6 ] CLVirtualDrive C:\WINDOWS\system32\DRIVERS\CLVirtualDrive.sys
22:43:19.0046 3440 CLVirtualDrive - ok
22:43:19.0061 3440 [ EF6EF85DADC3184A10D8F2F7159973CB ] CmBatt C:\WINDOWS\System32\drivers\CmBatt.sys
22:43:19.0061 3440 CmBatt - ok
22:43:19.0077 3440 [ 4627C1FBF2802425A408A2D2AF28CF85 ] CNG C:\WINDOWS\system32\Drivers\cng.sys
22:43:19.0077 3440 CNG - ok
22:43:19.0108 3440 [ 03AAED827C36F35D70900558B8274905 ] CompositeBus C:\WINDOWS\System32\drivers\CompositeBus.sys
22:43:19.0108 3440 CompositeBus - ok
22:43:19.0108 3440 COMSysApp - ok
22:43:19.0155 3440 [ A1FF7DFBFBE164CF92603C651D304DD2 ] condrv C:\WINDOWS\system32\drivers\condrv.sys
22:43:19.0155 3440 condrv - ok
22:43:19.0233 3440 [ 08F934092E0429BADF88E9F91DB0F61E ] cphs C:\WINDOWS\SysWow64\IntelCpHeciSvc.exe
22:43:19.0249 3440 cphs - ok
22:43:19.0296 3440 [ 0EFE4B5884A8032617826A4D76F80969 ] CryptSvc C:\WINDOWS\system32\cryptsvc.dll
22:43:19.0296 3440 CryptSvc - ok
22:43:19.0296 3440 [ 315BA4BC19316D72B2E037534E048B93 ] dam C:\WINDOWS\system32\drivers\dam.sys
22:43:19.0311 3440 dam - ok
22:43:19.0358 3440 [ 81979817943D830BF24571B7C1B28A1A ] DcomLaunch C:\WINDOWS\system32\rpcss.dll
22:43:19.0374 3440 DcomLaunch - ok
22:43:19.0421 3440 [ 78089FCDE082FD4FA471C30A7C2DC736 ] defragsvc C:\WINDOWS\System32\defragsvc.dll
22:43:19.0421 3440 defragsvc - ok
22:43:19.0452 3440 [ 8F387C2C99EE09C6E2AC316205F86A17 ] DeviceAssociationService C:\WINDOWS\system32\das.dll
22:43:19.0452 3440 DeviceAssociationService - ok
22:43:19.0483 3440 [ BC6849C62DB407573C6AD8CB1A4D2628 ] DeviceInstall C:\WINDOWS\system32\umpnpmgr.dll
22:43:19.0499 3440 DeviceInstall - ok
22:43:19.0514 3440 [ A03F362C5557E238CBFA914689C77248 ] Dfsc C:\WINDOWS\system32\Drivers\dfsc.sys
22:43:19.0514 3440 Dfsc - ok
22:43:19.0561 3440 [ 8B107F55FD61654A6C9F1B819AEC5FC4 ] Dhcp C:\WINDOWS\system32\dhcpcore.dll
22:43:19.0561 3440 Dhcp - ok
22:43:19.0608 3440 [ 4D40C9B33F738797CF50E77CB7C53E85 ] disk C:\WINDOWS\system32\drivers\disk.sys
22:43:19.0608 3440 disk - ok
22:43:19.0639 3440 [ EB70A894708D1BC176AFD690FF06085F ] dmvsc C:\WINDOWS\System32\drivers\dmvsc.sys
22:43:19.0639 3440 dmvsc - ok
22:43:19.0655 3440 [ FE7656474448BE6A6C68E5C9BEB7CA94 ] Dnscache C:\WINDOWS\System32\dnsrslvr.dll
22:43:19.0655 3440 Dnscache - ok
22:43:19.0686 3440 [ 50288EA079BB520C2B8C8A154202D518 ] dot3svc C:\WINDOWS\System32\dot3svc.dll
22:43:19.0686 3440 dot3svc - ok
22:43:19.0702 3440 [ 281BEE07BA97E3E98D12A822D923D0D8 ] DPS C:\WINDOWS\system32\dps.dll
22:43:19.0702 3440 DPS - ok
22:43:19.0733 3440 [ DDC11A202207C0400CBE07315B8FDE5E ] drmkaud C:\WINDOWS\system32\drivers\drmkaud.sys
22:43:19.0733 3440 drmkaud - ok
22:43:19.0764 3440 [ 5B074F14F5DD6418F46EE4CA2DEB7EA8 ] DsmSvc C:\WINDOWS\System32\DeviceSetupManager.dll
22:43:19.0780 3440 DsmSvc - ok
22:43:19.0811 3440 [ C7D252742946DD395670649742FBD73D ] DXGKrnl C:\WINDOWS\System32\drivers\dxgkrnl.sys
22:43:19.0827 3440 DXGKrnl - ok
22:43:19.0874 3440 [ 6073537F250B45E1CB2A02E97F0FE1B2 ] Eaphost C:\WINDOWS\System32\eapsvc.dll
22:43:19.0889 3440 Eaphost - ok
22:43:19.0983 3440 [ 114BCFDF367FF37C3F1B0A96AF542E4D ] ebdrv C:\WINDOWS\system32\drivers\evbda.sys
22:43:19.0999 3440 ebdrv - ok
22:43:20.0061 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] EFS C:\WINDOWS\System32\lsass.exe
22:43:20.0061 3440 EFS - ok
22:43:20.0077 3440 [ 43531A5993380CC5113242C29D265FD9 ] EhStorClass C:\WINDOWS\system32\drivers\EhStorClass.sys
22:43:20.0077 3440 EhStorClass - ok
22:43:20.0093 3440 [ 6F8E738A9505A388B1157FDDE7B3101B ] EhStorTcgDrv C:\WINDOWS\system32\drivers\EhStorTcgDrv.sys
22:43:20.0093 3440 EhStorTcgDrv - ok
22:43:20.0124 3440 [ A05FC7ECA0966EBB70E4D17B855A853B ] ElbyCDIO C:\WINDOWS\system32\Drivers\ElbyCDIO.sys
22:43:20.0124 3440 ElbyCDIO - ok
22:43:20.0139 3440 [ DFFFAE1442BA4076E18EED5E406FA0D3 ] ErrDev C:\WINDOWS\System32\drivers\errdev.sys
22:43:20.0155 3440 ErrDev - ok
22:43:20.0202 3440 [ 030CE75B7D8F75FAA7BA1EC6FD0EB5A3 ] EventSystem C:\WINDOWS\system32\es.dll
22:43:20.0202 3440 EventSystem - ok
22:43:20.0233 3440 [ 7729D294A555C7AEB281ED8E4D0E01E4 ] exfat C:\WINDOWS\system32\drivers\exfat.sys
22:43:20.0233 3440 exfat - ok
22:43:20.0249 3440 [ 7C4E0D5900B2A1D11EDD626D6DDB937B ] fastfat C:\WINDOWS\system32\drivers\fastfat.sys
22:43:20.0264 3440 fastfat - ok
22:43:20.0296 3440 [ 2BC8532ABF2B3756B78FA1DA54147DDE ] Fax C:\WINDOWS\system32\fxssvc.exe
22:43:20.0311 3440 Fax - ok
22:43:20.0311 3440 [ 5D8402613E778B3BD45E687A8372710B ] fdc C:\WINDOWS\System32\drivers\fdc.sys
22:43:20.0327 3440 fdc - ok
22:43:20.0343 3440 [ DC1A78BCCCB7EE53D6FD3BD615A8E222 ] fdPHost C:\WINDOWS\system32\fdPHost.dll
22:43:20.0343 3440 fdPHost - ok
22:43:20.0358 3440 [ E5AD448F2DC84B1CF387FA7F2A3D1936 ] FDResPub C:\WINDOWS\system32\fdrespub.dll
22:43:20.0358 3440 FDResPub - ok
22:43:20.0374 3440 [ 0046E0BD031213D37123876B0D0FA61C ] fhsvc C:\WINDOWS\system32\fhsvc.dll
22:43:20.0374 3440 fhsvc - ok
22:43:20.0421 3440 [ BCFD8B149B3ADF92D0DB1E909CAF0265 ] FileInfo C:\WINDOWS\system32\drivers\fileinfo.sys
22:43:20.0421 3440 FileInfo - ok
22:43:20.0436 3440 [ A1A66C4FDAFD6B0289523232AFB7D8AF ] Filetrace C:\WINDOWS\system32\drivers\filetrace.sys
22:43:20.0436 3440 Filetrace - ok
22:43:20.0452 3440 [ BE743083CF7063C486A4398E3AEFE59A ] flpydisk C:\WINDOWS\System32\drivers\flpydisk.sys
22:43:20.0452 3440 flpydisk - ok
22:43:20.0483 3440 [ 46D1DF775FFF14585218BBE16E5B2C9A ] FltMgr C:\WINDOWS\system32\drivers\fltmgr.sys
22:43:20.0483 3440 FltMgr - ok
22:43:20.0530 3440 [ 183CA7699474FDE235853967D1DA4D9B ] FontCache C:\WINDOWS\system32\FntCache.dll
22:43:20.0561 3440 FontCache - ok
22:43:20.0686 3440 [ 1C52387BF5A127F5F3BFB31288F30D93 ] FontCache3.0.0.0 C:\WINDOWS\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
22:43:20.0686 3440 FontCache3.0.0.0 - ok
22:43:20.0733 3440 [ 35005534E600E993A90B036E4E599F2B ] FsDepends C:\WINDOWS\system32\drivers\FsDepends.sys
22:43:20.0733 3440 FsDepends - ok
22:43:20.0749 3440 [ 09F460AFEDCA03F3BF6E07D1CCC9AC42 ] Fs_Rec C:\WINDOWS\system32\drivers\Fs_Rec.sys
22:43:20.0749 3440 Fs_Rec - ok
22:43:20.0796 3440 [ B2BD017231836DA9F63F41E3A075D73E ] fvevol C:\WINDOWS\system32\DRIVERS\fvevol.sys
22:43:20.0796 3440 fvevol - ok
22:43:20.0811 3440 [ 9591D0B9351ED489EAFD9D1CE52A8015 ] FxPPM C:\WINDOWS\System32\drivers\fxppm.sys
22:43:20.0811 3440 FxPPM - ok
22:43:20.0827 3440 [ FC3EF65EE20D39F8749C2218DBA681CA ] gagp30kx C:\WINDOWS\system32\drivers\gagp30kx.sys
22:43:20.0827 3440 gagp30kx - ok
22:43:20.0874 3440 [ 0BF5CAD281E25F1418E5B8875DC5ADD1 ] gencounter C:\WINDOWS\System32\drivers\vmgencounter.sys
22:43:20.0874 3440 gencounter - ok
22:43:20.0905 3440 [ EF3AE7773394DF49CE74AF78A1C8D23D ] GPIOClx0101 C:\WINDOWS\system32\Drivers\msgpioclx.sys
22:43:20.0905 3440 GPIOClx0101 - ok
22:43:20.0952 3440 [ 58C11DCCC6241CC13861A559E31A69F0 ] gpsvc C:\WINDOWS\System32\gpsvc.dll
22:43:20.0999 3440 gpsvc - ok
22:43:21.0093 3440 [ 506708142BC63DABA64F2D3AD1DCD5BF ] gupdate C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
22:43:21.0093 3440 gupdate - ok
22:43:21.0108 3440 [ 506708142BC63DABA64F2D3AD1DCD5BF ] gupdatem C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
22:43:21.0108 3440 gupdatem - ok
22:43:21.0124 3440 [ 03909BDBFF0DCACCABF2B2D4ADEE44DC ] HDAudBus C:\WINDOWS\System32\drivers\HDAudBus.sys
22:43:21.0124 3440 HDAudBus - ok
22:43:21.0171 3440 [ 10A70BC1871CD955D85CD88372724906 ] HidBatt C:\WINDOWS\System32\drivers\HidBatt.sys
22:43:21.0171 3440 HidBatt - ok
22:43:21.0218 3440 [ 1EA1B4FABB8CC348E73CA90DBA22E104 ] HidBth C:\WINDOWS\System32\drivers\hidbth.sys
22:43:21.0218 3440 HidBth - ok
22:43:21.0233 3440 [ C241A8BAFBBFC90176EA0F5240EACC17 ] hidi2c C:\WINDOWS\System32\drivers\hidi2c.sys
22:43:21.0233 3440 hidi2c - ok
22:43:21.0249 3440 [ 9BDDEE26255421017E161CCB9D5EDA95 ] HidIr C:\WINDOWS\System32\drivers\hidir.sys
22:43:21.0249 3440 HidIr - ok
22:43:21.0280 3440 [ 449A20A674AA3FAA7F0DD4E33EE2DC20 ] hidserv C:\WINDOWS\system32\hidserv.dll
22:43:21.0280 3440 hidserv - ok
22:43:21.0311 3440 [ 8DB8EAB9D0C6A5DF0BDCADEA239220B4 ] HidUsb C:\WINDOWS\System32\drivers\hidusb.sys
22:43:21.0311 3440 HidUsb - ok
22:43:21.0343 3440 [ 7BF3ADCBD021D4F4A84CF40EB49C71B5 ] hkmsvc C:\WINDOWS\system32\kmsvc.dll
22:43:21.0358 3440 hkmsvc - ok
22:43:21.0374 3440 [ 6CD9C3819BE8C0A3DACC82AE5D3C4F18 ] HomeGroupListener C:\WINDOWS\system32\ListSvc.dll
22:43:21.0374 3440 HomeGroupListener - ok
22:43:21.0421 3440 [ 1A4DA1D6287B99033D144B436C23B656 ] HomeGroupProvider C:\WINDOWS\system32\provsvc.dll
22:43:21.0421 3440 HomeGroupProvider - ok
22:43:21.0483 3440 [ 2A8B93A01621E100A578E83C768AFA2C ] HP Support Assistant Service C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe
22:43:21.0483 3440 HP Support Assistant Service - ok
22:43:21.0530 3440 [ D2946D9F020AE76E9CEF9B4A6DF838C0 ] hpqwmiex C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
22:43:21.0546 3440 hpqwmiex - ok
22:43:21.0577 3440 [ A6AACEA4C785789BDA5912AD1FEDA80D ] HpSAMD C:\WINDOWS\system32\drivers\HpSAMD.sys
22:43:21.0577 3440 HpSAMD - ok
22:43:21.0827 3440 [ 3C5B2067338E4EFDADE94E4A72728F23 ] HPWMISVC C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
22:43:21.0827 3440 HPWMISVC - ok
22:43:21.0874 3440 [ 9DDCA7F18983C5410DEFF79F819DF93C ] HTTP C:\WINDOWS\system32\drivers\HTTP.sys
22:43:21.0889 3440 HTTP - ok
22:43:21.0921 3440 [ 90656C0B3864804B090434EFC582404F ] hwpolicy C:\WINDOWS\system32\drivers\hwpolicy.sys
22:43:21.0921 3440 hwpolicy - ok
22:43:21.0936 3440 [ 6D6F9E3BF0484967E52F7E846BFF1CA1 ] hyperkbd C:\WINDOWS\System32\drivers\hyperkbd.sys
22:43:21.0936 3440 hyperkbd - ok
22:43:21.0952 3440 [ 907C870F8C31F8DDD6F090857B46AB25 ] HyperVideo C:\WINDOWS\system32\DRIVERS\HyperVideo.sys
22:43:21.0952 3440 HyperVideo - ok
22:43:21.0968 3440 [ 84CFC5EFA97D0C965EDE1D56F116A541 ] i8042prt C:\WINDOWS\System32\drivers\i8042prt.sys
22:43:21.0968 3440 i8042prt - ok
22:43:21.0983 3440 [ 5D90E32E36CE5D4C535D17CE08AEAF05 ] iaLPSSi_GPIO C:\WINDOWS\System32\drivers\iaLPSSi_GPIO.sys
22:43:21.0983 3440 iaLPSSi_GPIO - ok
22:43:21.0999 3440 [ DD05E7E80F52ADE9AEB292819920F32C ] iaLPSSi_I2C C:\WINDOWS\System32\drivers\iaLPSSi_I2C.sys
22:43:21.0999 3440 iaLPSSi_I2C - ok
22:43:22.0046 3440 [ 6C91E425ACE29594BD574DE38AC9B76D ] iaStorA C:\WINDOWS\system32\drivers\iaStorA.sys
22:43:22.0046 3440 iaStorA - ok
22:43:22.0077 3440 [ 08BFE413B0B4AA8DFA4B5684CE06D3DC ] iaStorAV C:\WINDOWS\system32\drivers\iaStorAV.sys
22:43:22.0093 3440 iaStorAV - ok
22:43:22.0155 3440 [ 0AB254994A460550258446950BB58311 ] IAStorDataMgrSvc C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
22:43:22.0155 3440 IAStorDataMgrSvc - ok
22:43:22.0186 3440 [ A2200C3033FA4EF249FC096A7A7D02A2 ] iaStorV C:\WINDOWS\system32\drivers\iaStorV.sys
22:43:22.0186 3440 iaStorV - ok
22:43:22.0218 3440 [ 83FF82FE209E7997067B375DAD6CF23D ] ICCS C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
22:43:22.0218 3440 ICCS - ok
22:43:22.0280 3440 [ ABEFA4BD23329FD9BD47496BF2E58774 ] IconMan_R C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe
22:43:22.0311 3440 IconMan_R - ok
22:43:22.0311 3440 IEEtwCollectorService - ok
22:43:22.0421 3440 [ 8C44E6B688790E2AD3846C97661C54F1 ] igfx C:\WINDOWS\system32\DRIVERS\igdkmd64.sys
22:43:22.0452 3440 igfx - ok
22:43:22.0515 3440 [ CFE7F0267B0C3077042FF291949B5546 ] IKEEXT C:\WINDOWS\System32\ikeext.dll
22:43:22.0561 3440 IKEEXT - ok
22:43:22.0655 3440 [ 50D261E6921C29C516FDCB68A262829B ] IntcAzAudAddService C:\WINDOWS\system32\drivers\RTKVHD64.sys
22:43:22.0686 3440 IntcAzAudAddService - ok
22:43:22.0733 3440 [ F5495B38BFB9149925F54F65AB40EFBF ] IntcDAud C:\WINDOWS\system32\DRIVERS\IntcDAud.sys
22:43:22.0733 3440 IntcDAud - ok
22:43:22.0827 3440 [ C99F8E90DE4B8F0C7FE15BB1CBCD29DC ] Intel(R) Capability Licensing Service Interface C:\Program Files\Intel\iCLS Client\HeciServer.exe
22:43:22.0827 3440 Intel(R) Capability Licensing Service Interface - ok
22:43:22.0843 3440 [ 4E448FCFFD00E8D657CD9E48D3E47157 ] intelide C:\WINDOWS\system32\drivers\intelide.sys
22:43:22.0843 3440 intelide - ok
22:43:22.0874 3440 [ 139CFCDCD36B1B1782FD8C0014AC9B0E ] intelpep C:\WINDOWS\system32\drivers\intelpep.sys
22:43:22.0874 3440 intelpep - ok
22:43:22.0921 3440 [ 47E74A8E53C7C24DCE38311E1451C1D9 ] intelppm C:\WINDOWS\System32\drivers\intelppm.sys
22:43:22.0921 3440 intelppm - ok
22:43:22.0936 3440 [ 9DB76D7F9E4E53EFE5DD8C53DE837514 ] IpFilterDriver C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
22:43:22.0936 3440 IpFilterDriver - ok
22:43:22.0968 3440 [ DFC4050D58565ADBEE793A8D4AEBDAE6 ] iphlpsvc C:\WINDOWS\System32\iphlpsvc.dll
22:43:22.0983 3440 iphlpsvc - ok
22:43:22.0999 3440 [ FD9C9E9E3F0ED51502C7E8C066BE26B9 ] IPMIDRV C:\WINDOWS\System32\drivers\IPMIDrv.sys
22:43:23.0015 3440 IPMIDRV - ok
22:43:23.0030 3440 [ B7342B3C58E91107F6E946A93D9D4EFD ] IPNAT C:\WINDOWS\system32\drivers\ipnat.sys
22:43:23.0030 3440 IPNAT - ok
22:43:23.0061 3440 [ AE44C526AB5F8A487D941CEB57B10C97 ] IRENUM C:\WINDOWS\system32\drivers\irenum.sys
22:43:23.0061 3440 IRENUM - ok
22:43:23.0093 3440 [ 8AFEEA3955AA43616A60F133B1D25F21 ] isapnp C:\WINDOWS\system32\drivers\isapnp.sys
22:43:23.0093 3440 isapnp - ok
22:43:23.0140 3440 [ 034D4BD9DC67C64F3A4C8A049B5173BF ] iScsiPrt C:\WINDOWS\System32\drivers\msiscsi.sys
22:43:23.0140 3440 iScsiPrt - ok
22:43:23.0202 3440 [ 3C4002D339491AF73D663FFC7F6E5ECB ] jhi_service C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
22:43:23.0202 3440 jhi_service - ok
22:43:23.0249 3440 [ 8BE92376799B6B44D543E8D07CDCF885 ] kbdclass C:\WINDOWS\System32\drivers\kbdclass.sys
22:43:23.0249 3440 kbdclass - ok
22:43:23.0265 3440 [ FB6E47E569D4872ABEB506BE03A45FBA ] kbdhid C:\WINDOWS\System32\drivers\kbdhid.sys
22:43:23.0265 3440 kbdhid - ok
22:43:23.0280 3440 [ 813871C7D402A05F2E3A7075F9584A05 ] kdnic C:\WINDOWS\system32\DRIVERS\kdnic.sys
22:43:23.0280 3440 kdnic - ok
22:43:23.0296 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] KeyIso C:\WINDOWS\system32\lsass.exe
22:43:23.0311 3440 KeyIso - ok
22:43:23.0343 3440 [ ADDECBCC777665BD113BED437E602AB0 ] KSecDD C:\WINDOWS\system32\Drivers\ksecdd.sys
22:43:23.0343 3440 KSecDD - ok
22:43:23.0374 3440 [ F88CC88F4A6D8476F1664E805CA18CC2 ] KSecPkg C:\WINDOWS\system32\Drivers\ksecpkg.sys
22:43:23.0374 3440 KSecPkg - ok
22:43:23.0390 3440 [ 11AFB527AA370B1DAFD5C36F35F6D45F ] ksthunk C:\WINDOWS\system32\drivers\ksthunk.sys
22:43:23.0390 3440 ksthunk - ok
22:43:23.0436 3440 [ 32B1A8351160F307A8C66BCB0F94A9C2 ] KtmRm C:\WINDOWS\system32\msdtckrm.dll
22:43:23.0436 3440 KtmRm - ok
Re: kontrola logu
22:43:23.0483 3440 [ 27B58E16CF895AC1F1A97C04814C2239 ] LanmanServer C:\WINDOWS\system32\srvsvc.dll
22:43:23.0499 3440 LanmanServer - ok
22:43:23.0515 3440 [ D0D9C2ECA4D03A8F06DCD91236B90C98 ] LanmanWorkstation C:\WINDOWS\System32\wkssvc.dll
22:43:23.0530 3440 LanmanWorkstation - ok
22:43:23.0561 3440 [ EE289BD147FDFF95EF1B9BD65D3B974A ] lfsvc C:\WINDOWS\System32\GeofenceMonitorService.dll
22:43:23.0577 3440 lfsvc - ok
22:43:23.0608 3440 [ 8E4CA9AFD55EF6B509C80A8715ABF8C6 ] lirsgt C:\WINDOWS\system32\DRIVERS\lirsgt.sys
22:43:23.0608 3440 lirsgt - ok
22:43:23.0624 3440 [ C09010B3680860131631F53E8FE7BAD8 ] lltdio C:\WINDOWS\system32\DRIVERS\lltdio.sys
22:43:23.0624 3440 lltdio - ok
22:43:23.0671 3440 [ 00E070FC0C673311AFD4B068D1242780 ] lltdsvc C:\WINDOWS\System32\lltdsvc.dll
22:43:23.0686 3440 lltdsvc - ok
22:43:23.0718 3440 [ D113FAD71A5E67AA94B32A0F8828D265 ] lmhosts C:\WINDOWS\System32\lmhsvc.dll
22:43:23.0718 3440 lmhosts - ok
22:43:23.0765 3440 [ 4269D44BB47A6DA5D80B11F4C8536458 ] LMS C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
22:43:23.0765 3440 LMS - ok
22:43:23.0796 3440 [ C755AE4635457AA2A11F79C0DF857ABC ] LSI_SAS C:\WINDOWS\system32\drivers\lsi_sas.sys
22:43:23.0796 3440 LSI_SAS - ok
22:43:23.0827 3440 [ ADAC09CBE7A2040B7F68B5E5C9A75141 ] LSI_SAS2 C:\WINDOWS\system32\drivers\lsi_sas2.sys
22:43:23.0843 3440 LSI_SAS2 - ok
22:43:23.0858 3440 [ 04D1274BB9BBCCF12BD12374002AA191 ] LSI_SAS3 C:\WINDOWS\system32\drivers\lsi_sas3.sys
22:43:23.0858 3440 LSI_SAS3 - ok
22:43:23.0874 3440 [ 327469EEF3833D0C584B7E88A76AEC0C ] LSI_SSS C:\WINDOWS\system32\drivers\lsi_sss.sys
22:43:23.0874 3440 LSI_SSS - ok
22:43:23.0921 3440 [ 8EBB271E4588D835784A3FF7E80076A8 ] LSM C:\WINDOWS\System32\lsm.dll
22:43:23.0921 3440 LSM - ok
22:43:23.0968 3440 [ DDEE191AB32DFC22C6465002ECDF5EE4 ] luafv C:\WINDOWS\system32\drivers\luafv.sys
22:43:23.0968 3440 luafv - ok
22:43:23.0983 3440 [ EB5C03A070F30D64A6DF80E53B22F53F ] megasas C:\WINDOWS\system32\drivers\megasas.sys
22:43:23.0983 3440 megasas - ok
22:43:24.0015 3440 [ F6F13533196DE7A582D422B0241E4363 ] megasr C:\WINDOWS\system32\drivers\megasr.sys
22:43:24.0015 3440 megasr - ok
22:43:24.0046 3440 [ 772A1DEEDFDBC244183B5C805D1B7D85 ] MEIx64 C:\WINDOWS\System32\drivers\HECIx64.sys
22:43:24.0046 3440 MEIx64 - ok
22:43:24.0093 3440 [ FD788C2D96EA91469A3C1D13E80D7473 ] MMCSS C:\WINDOWS\system32\mmcss.dll
22:43:24.0093 3440 MMCSS - ok
22:43:24.0124 3440 [ 8B38C44F69259987C95135C9627E2378 ] Modem C:\WINDOWS\system32\drivers\modem.sys
22:43:24.0140 3440 Modem - ok
22:43:24.0155 3440 [ 601589000CC90F0DF8DA2CC254A3CCC9 ] monitor C:\WINDOWS\System32\drivers\monitor.sys
22:43:24.0155 3440 monitor - ok
22:43:24.0171 3440 [ CEAC6D40FE887CE8406C2393CF97DE06 ] mouclass C:\WINDOWS\System32\drivers\mouclass.sys
22:43:24.0171 3440 mouclass - ok
22:43:24.0187 3440 [ 02D98BF804084E9A0D69D1C69B02CCA9 ] mouhid C:\WINDOWS\System32\drivers\mouhid.sys
22:43:24.0187 3440 mouhid - ok
22:43:24.0202 3440 [ 515549560D481138E6E21AF7C6998E56 ] mountmgr C:\WINDOWS\system32\drivers\mountmgr.sys
22:43:24.0202 3440 mountmgr - ok
22:43:24.0265 3440 [ E1B6FCAE82474FC071155263E2841D54 ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
22:43:24.0265 3440 MozillaMaintenance - ok
22:43:24.0280 3440 [ F170510BE94CF45E3C6274578F6204B2 ] mpsdrv C:\WINDOWS\system32\drivers\mpsdrv.sys
22:43:24.0280 3440 mpsdrv - ok
22:43:24.0343 3440 [ D186C5844393252147BE934F3871DB7A ] MpsSvc C:\WINDOWS\system32\mpssvc.dll
22:43:24.0358 3440 MpsSvc - ok
22:43:24.0390 3440 [ 1D55DADC22D21883A2F80297F5A5AE48 ] MRxDAV C:\WINDOWS\system32\drivers\mrxdav.sys
22:43:24.0390 3440 MRxDAV - ok
22:43:24.0405 3440 [ C997E6A37BA8915224B3FB5024A34F69 ] mrxsmb C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
22:43:24.0421 3440 mrxsmb - ok
22:43:24.0437 3440 [ 3E28B99198B514DFEB152EACF913025E ] mrxsmb10 C:\WINDOWS\system32\DRIVERS\mrxsmb10.sys
22:43:24.0437 3440 mrxsmb10 - ok
22:43:24.0483 3440 [ AAF56E4E84D35411B4E446C445732DFE ] mrxsmb20 C:\WINDOWS\system32\DRIVERS\mrxsmb20.sys
22:43:24.0483 3440 mrxsmb20 - ok
22:43:24.0515 3440 [ 4E888019078AC363076A5433E89AA4F8 ] MsBridge C:\WINDOWS\system32\DRIVERS\bridge.sys
22:43:24.0515 3440 MsBridge - ok
22:43:24.0546 3440 [ A082C17D14D0790E27D064EA4B138AE1 ] MSDTC C:\WINDOWS\System32\msdtc.exe
22:43:24.0562 3440 MSDTC - ok
22:43:24.0577 3440 [ D13329FBF8345B28AB30F44CC247DC08 ] Msfs C:\WINDOWS\system32\drivers\Msfs.sys
22:43:24.0577 3440 Msfs - ok
22:43:24.0593 3440 [ C6B474E46F9E543B875981ED3FFE6ADD ] msgpiowin32 C:\WINDOWS\System32\drivers\msgpiowin32.sys
22:43:24.0593 3440 msgpiowin32 - ok
22:43:24.0608 3440 [ 65C92EB9D08DB5C69F28C7FFD4E84E31 ] mshidkmdf C:\WINDOWS\System32\drivers\mshidkmdf.sys
22:43:24.0608 3440 mshidkmdf - ok
22:43:24.0624 3440 [ 52299F086AC2DAFD100DD5DC4A8614BA ] mshidumdf C:\WINDOWS\System32\drivers\mshidumdf.sys
22:43:24.0624 3440 mshidumdf - ok
22:43:24.0655 3440 [ 36D92AF3343C3A3E57FEF11C449AEA4C ] msisadrv C:\WINDOWS\system32\drivers\msisadrv.sys
22:43:24.0655 3440 msisadrv - ok
22:43:24.0702 3440 [ 810F8A0A0680662BB0CE44D0E2CEF90C ] MSiSCSI C:\WINDOWS\system32\iscsiexe.dll
22:43:24.0702 3440 MSiSCSI - ok
22:43:24.0702 3440 msiserver - ok
22:43:24.0733 3440 [ A9BBBD2BAE6142253B9195E949AC2E8D ] MSKSSRV C:\WINDOWS\system32\drivers\MSKSSRV.sys
22:43:24.0733 3440 MSKSSRV - ok
22:43:24.0749 3440 [ 375E44168F2DFB91A68B8A3F619C5A7C ] MsLldp C:\WINDOWS\system32\DRIVERS\mslldp.sys
22:43:24.0749 3440 MsLldp - ok
22:43:24.0765 3440 [ 7B2128EB875DCBC006E6A913211006D6 ] MSPCLOCK C:\WINDOWS\system32\drivers\MSPCLOCK.sys
22:43:24.0780 3440 MSPCLOCK - ok
22:43:24.0780 3440 [ 1E88171579B218115C7A772F8DE04BD8 ] MSPQM C:\WINDOWS\system32\drivers\MSPQM.sys
22:43:24.0780 3440 MSPQM - ok
22:43:24.0796 3440 [ BBE2A455053E63BECBF42C2F9B21FAE0 ] MsRPC C:\WINDOWS\system32\drivers\MsRPC.sys
22:43:24.0812 3440 MsRPC - ok
22:43:24.0827 3440 [ 8D6B7D515C5CBCDB75B928A0B73C3C5E ] mssmbios C:\WINDOWS\System32\drivers\mssmbios.sys
22:43:24.0827 3440 mssmbios - ok
22:43:24.0827 3440 [ 115019AE01E0EB9C048530D2928AB4A2 ] MSTEE C:\WINDOWS\system32\drivers\MSTEE.sys
22:43:24.0843 3440 MSTEE - ok
22:43:24.0843 3440 [ 96D604A35070360F0DD4A7A8AF410B5E ] MTConfig C:\WINDOWS\System32\drivers\MTConfig.sys
22:43:24.0858 3440 MTConfig - ok
22:43:24.0858 3440 [ 619CA29326B82372621DB2C0964D8365 ] Mup C:\WINDOWS\system32\Drivers\mup.sys
22:43:24.0858 3440 Mup - ok
22:43:24.0874 3440 [ B8C35C94DCB2DFEAF03BB42131F2F77F ] mvumis C:\WINDOWS\system32\drivers\mvumis.sys
22:43:24.0874 3440 mvumis - ok
22:43:24.0937 3440 [ 41A45D2A75494EABF2806EA051E00376 ] napagent C:\WINDOWS\system32\qagentRT.dll
22:43:24.0937 3440 napagent - ok
22:43:24.0968 3440 [ 647C7652FA19F98CADF2BFDA2164BFEC ] NativeWifiP C:\WINDOWS\system32\DRIVERS\nwifi.sys
22:43:24.0983 3440 NativeWifiP - ok
22:43:25.0083 3440 [ B498A14133BD09AD0817590ACE4470AD ] NBService C:\Program Files (x86)\Nero\Nero 7\Nero BackItUp\NBService.exe
22:43:25.0098 3440 NBService - ok
22:43:25.0130 3440 [ 71E3C0100AA19D11373CCEB2F51A6008 ] NcaSvc C:\WINDOWS\System32\ncasvc.dll
22:43:25.0145 3440 NcaSvc - ok
22:43:25.0161 3440 [ 51DF09CAB2CAC64FEE3E371D9028ED01 ] NcbService C:\WINDOWS\System32\ncbservice.dll
22:43:25.0161 3440 NcbService - ok
22:43:25.0177 3440 [ 2586C4C167499210DCBF3ECFD8CCE210 ] NcdAutoSetup C:\WINDOWS\System32\NcdAutoSetup.dll
22:43:25.0177 3440 NcdAutoSetup - ok
22:43:25.0239 3440 [ F21B77B4D74092A543807D3CEB711A88 ] NDIS C:\WINDOWS\system32\drivers\ndis.sys
22:43:25.0255 3440 NDIS - ok
22:43:25.0286 3440 [ C6BB12BC35D1637CA17AE16D3A4725EB ] NdisCap C:\WINDOWS\system32\DRIVERS\ndiscap.sys
22:43:25.0286 3440 NdisCap - ok
22:43:25.0302 3440 [ 9F1DA20E943BE7AA4ED5F3E1EBA78B37 ] NdisImPlatform C:\WINDOWS\system32\DRIVERS\NdisImPlatform.sys
22:43:25.0302 3440 NdisImPlatform - ok
22:43:25.0317 3440 [ 9423421E735BD5394351E0C47C76BB92 ] NdisTapi C:\WINDOWS\system32\DRIVERS\ndistapi.sys
22:43:25.0317 3440 NdisTapi - ok
22:43:25.0364 3440 [ B832B35055BA2B7B4181861FF94D8E59 ] Ndisuio C:\WINDOWS\system32\DRIVERS\ndisuio.sys
22:43:25.0364 3440 Ndisuio - ok
22:43:25.0380 3440 [ 1F58E48EF75F34C35D8E93A0DC535CFE ] NdisVirtualBus C:\WINDOWS\System32\drivers\NdisVirtualBus.sys
22:43:25.0380 3440 NdisVirtualBus - ok
22:43:25.0395 3440 [ DEC29080202D4F9F17F55E18BCFCC41A ] NdisWan C:\WINDOWS\system32\DRIVERS\ndiswan.sys
22:43:25.0395 3440 NdisWan - ok
22:43:25.0411 3440 [ DEC29080202D4F9F17F55E18BCFCC41A ] NdisWanLegacy C:\WINDOWS\system32\DRIVERS\ndiswan.sys
22:43:25.0411 3440 NdisWanLegacy - ok
22:43:25.0427 3440 [ A5BD69A8812FA79D1A487691DD3FB244 ] NDProxy C:\WINDOWS\system32\drivers\NDProxy.sys
22:43:25.0427 3440 NDProxy - ok
22:43:25.0442 3440 [ 5A072F0B90C29C5233D78BE33EF5ED78 ] Ndu C:\WINDOWS\system32\drivers\Ndu.sys
22:43:25.0442 3440 Ndu - ok
22:43:25.0458 3440 [ A83D67D347A684F10B7D3019C8A6380C ] NetBIOS C:\WINDOWS\system32\DRIVERS\netbios.sys
22:43:25.0458 3440 NetBIOS - ok
22:43:25.0473 3440 [ 0217532E19A748F0E5D569307363D5FD ] NetBT C:\WINDOWS\system32\DRIVERS\netbt.sys
22:43:25.0473 3440 NetBT - ok
22:43:25.0489 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] Netlogon C:\WINDOWS\system32\lsass.exe
22:43:25.0489 3440 Netlogon - ok
22:43:25.0520 3440 [ B7AD851A21FEBA3BA214972627614207 ] Netman C:\WINDOWS\System32\netman.dll
22:43:25.0536 3440 Netman - ok
22:43:25.0567 3440 [ F0F0A372C2EF6358399C4936F91B6131 ] netprofm C:\WINDOWS\System32\netprofmsvc.dll
22:43:25.0583 3440 netprofm - ok
22:43:25.0645 3440 [ 76E90502D9001077DA92F81126D06C9B ] netr28x C:\WINDOWS\system32\DRIVERS\netr28x.sys
22:43:25.0661 3440 netr28x - ok
22:43:25.0708 3440 [ 1092B3190E69E0C5ECBCE90F171DE047 ] NetTcpPortSharing C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
22:43:25.0723 3440 NetTcpPortSharing - ok
22:43:25.0755 3440 [ 70414DB660BFBB7BD58FCE8EA4364E1B ] netvsc C:\WINDOWS\system32\DRIVERS\netvsc63.sys
22:43:25.0770 3440 netvsc - ok
22:43:25.0786 3440 [ 3A280F3B3C7A46E29C404ACD46ECBF5E ] NlaSvc C:\WINDOWS\System32\nlasvc.dll
22:43:25.0802 3440 NlaSvc - ok
22:43:25.0864 3440 [ A328A46D87BB92CE4D8A4528E9D84787 ] NMIndexingService C:\Program Files (x86)\Common Files\Ahead\Lib\NMIndexingService.exe
22:43:25.0864 3440 NMIndexingService - ok
22:43:25.0880 3440 [ 8F44A2F57C9F1A19AC9C6288C10FB351 ] Npfs C:\WINDOWS\system32\drivers\Npfs.sys
22:43:25.0880 3440 Npfs - ok
22:43:25.0927 3440 [ CBDB4F0871C88DF930FC0E8588CA67FC ] npsvctrig C:\WINDOWS\System32\drivers\npsvctrig.sys
22:43:25.0927 3440 npsvctrig - ok
22:43:25.0942 3440 [ 6E2271ED0C3E95B8E29F3752B91B9E84 ] nsi C:\WINDOWS\system32\nsisvc.dll
22:43:25.0942 3440 nsi - ok
22:43:25.0958 3440 [ E490B459978CB87779E84C761D22B827 ] nsiproxy C:\WINDOWS\system32\drivers\nsiproxy.sys
22:43:25.0958 3440 nsiproxy - ok
22:43:26.0020 3440 [ 1C80517BE6836A812F6A9B99B8321351 ] Ntfs C:\WINDOWS\system32\drivers\Ntfs.sys
22:43:26.0036 3440 Ntfs - ok
22:43:26.0052 3440 [ EF1B290FC9F0E47CC0B537292BEE5904 ] Null C:\WINDOWS\system32\drivers\Null.sys
22:43:26.0052 3440 Null - ok
22:43:26.0067 3440 [ BC6B5942AFF25EBAF62DE43C3807EDF8 ] nvraid C:\WINDOWS\system32\drivers\nvraid.sys
22:43:26.0067 3440 nvraid - ok
22:43:26.0083 3440 [ 1F43ABFFAC3D6CA356851D517392966E ] nvstor C:\WINDOWS\system32\drivers\nvstor.sys
22:43:26.0083 3440 nvstor - ok
22:43:26.0099 3440 [ 6934A936A7369DFE37B7DBA93F5E5E49 ] nv_agp C:\WINDOWS\system32\drivers\nv_agp.sys
22:43:26.0099 3440 nv_agp - ok
22:43:26.0130 3440 [ E287F157F7A0011D93179C64EF8ADCF2 ] p2pimsvc C:\WINDOWS\system32\pnrpsvc.dll
22:43:26.0145 3440 p2pimsvc - ok
22:43:26.0192 3440 [ 2A57A937BC5B1B2D6AFE6A8C5925F50B ] p2psvc C:\WINDOWS\system32\p2psvc.dll
22:43:26.0192 3440 p2psvc - ok
22:43:26.0208 3440 [ 764B1121867B2D9B31C491668AC72B2B ] Parport C:\WINDOWS\System32\drivers\parport.sys
22:43:26.0208 3440 Parport - ok
22:43:26.0239 3440 [ EF0C1749C9A8CEE9A457473D433CC00F ] partmgr C:\WINDOWS\system32\drivers\partmgr.sys
22:43:26.0239 3440 partmgr - ok
22:43:26.0255 3440 [ 9A5309EF92F39346CFD5A4C2C3D1BFAD ] PcaSvc C:\WINDOWS\System32\pcasvc.dll
22:43:26.0270 3440 PcaSvc - ok
22:43:26.0317 3440 [ 275AFE3FA35E8D78BE97695DF49817C6 ] pci C:\WINDOWS\system32\drivers\pci.sys
22:43:26.0317 3440 pci - ok
22:43:26.0349 3440 [ 346E38FCC6859A727DD28AFAD1F0AFF4 ] pciide C:\WINDOWS\system32\drivers\pciide.sys
22:43:26.0349 3440 pciide - ok
22:43:26.0380 3440 [ 4D3BDCC1C7B40C9D7B6AD990E6DEC397 ] pcmcia C:\WINDOWS\system32\drivers\pcmcia.sys
22:43:26.0380 3440 pcmcia - ok
22:43:26.0395 3440 [ BF28771D1436C88BE1D297D3098B0F7D ] pcw C:\WINDOWS\system32\drivers\pcw.sys
22:43:26.0411 3440 pcw - ok
22:43:26.0442 3440 [ B9D968D8E2B0F9C6301CEB39CFC9B9E4 ] pdc C:\WINDOWS\system32\drivers\pdc.sys
22:43:26.0442 3440 pdc - ok
22:43:26.0489 3440 [ 0ECEE590F2E2EF969FB74A6FC583A1E6 ] PEAUTH C:\WINDOWS\system32\drivers\peauth.sys
22:43:26.0505 3440 PEAUTH - ok
22:43:26.0583 3440 [ 8E3C640FFF5A963F570233AE99C0FFF3 ] PerfHost C:\WINDOWS\SysWow64\perfhost.exe
22:43:26.0583 3440 PerfHost - ok
22:43:26.0645 3440 [ 928061178CD9856CA6B67FFFCE6BA766 ] pla C:\WINDOWS\system32\pla.dll
22:43:26.0692 3440 pla - ok
22:43:26.0724 3440 [ BC6849C62DB407573C6AD8CB1A4D2628 ] PlugPlay C:\WINDOWS\system32\umpnpmgr.dll
22:43:26.0724 3440 PlugPlay - ok
22:43:26.0755 3440 [ 045EB4F260606A03BE340D09DEAF3BA4 ] PNRPAutoReg C:\WINDOWS\system32\pnrpauto.dll
22:43:26.0755 3440 PNRPAutoReg - ok
22:43:26.0786 3440 [ E287F157F7A0011D93179C64EF8ADCF2 ] PNRPsvc C:\WINDOWS\system32\pnrpsvc.dll
22:43:26.0786 3440 PNRPsvc - ok
22:43:26.0833 3440 [ C16097D77A232A288D65F299E2E01105 ] PolicyAgent C:\WINDOWS\System32\ipsecsvc.dll
22:43:26.0833 3440 PolicyAgent - ok
22:43:26.0864 3440 [ 00E08B30E7F7C13ECE2CDF4F46A77311 ] Power C:\WINDOWS\system32\umpo.dll
22:43:26.0864 3440 Power - ok
22:43:26.0895 3440 [ E075CC071022BD4E9BE7C024717C0E0A ] PptpMiniport C:\WINDOWS\system32\DRIVERS\raspptp.sys
22:43:26.0911 3440 PptpMiniport - ok
22:43:27.0036 3440 [ B7DB57A000D46D4DE75BC0C563E58072 ] PrintNotify C:\Windows\system32\spool\drivers\x64\3\PrintConfig.dll
22:43:27.0099 3440 PrintNotify - ok
22:43:27.0130 3440 [ ECD373F9571C745894367CC2635EA44F ] Processor C:\WINDOWS\System32\drivers\processr.sys
22:43:27.0130 3440 Processor - ok
22:43:27.0161 3440 [ B2A890D96C05E33FDD2BF3F3D4D0DF92 ] ProfSvc C:\WINDOWS\system32\profsvc.dll
22:43:27.0161 3440 ProfSvc - ok
22:43:27.0208 3440 [ 8528BB05E4D4E25945F78B00B2555FB7 ] Psched C:\WINDOWS\system32\DRIVERS\pacer.sys
22:43:27.0208 3440 Psched - ok
22:43:27.0239 3440 [ AF90BB44C99D6820BE52C9BBAA523283 ] QWAVE C:\WINDOWS\system32\qwave.dll
22:43:27.0239 3440 QWAVE - ok
22:43:27.0255 3440 [ 3FB466684609A4329858CF2EBD62E0FD ] QWAVEdrv C:\WINDOWS\system32\drivers\qwavedrv.sys
22:43:27.0255 3440 QWAVEdrv - ok
22:43:27.0302 3440 [ 2C56F0EE27E4EF70CA4B4983D3638905 ] RasAcd C:\WINDOWS\system32\DRIVERS\rasacd.sys
22:43:27.0302 3440 RasAcd - ok
22:43:27.0317 3440 [ 55FE43112F61836D0581D615C72AA113 ] RasAgileVpn C:\WINDOWS\system32\DRIVERS\AgileVpn.sys
22:43:27.0317 3440 RasAgileVpn - ok
22:43:27.0364 3440 [ 5F061AC45266841A2860C1858ED863B8 ] RasAuto C:\WINDOWS\System32\rasauto.dll
22:43:27.0364 3440 RasAuto - ok
22:43:27.0380 3440 [ BBB6272B7F46C4640A8CDB8A70C3450F ] Rasl2tp C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
22:43:27.0380 3440 Rasl2tp - ok
22:43:27.0427 3440 [ 5C7B86EE33505E36026AFAAB62DA6364 ] RasMan C:\WINDOWS\System32\rasmans.dll
22:43:27.0442 3440 RasMan - ok
22:43:27.0458 3440 [ 5247F308C4103CDC4FE12AE1D235800A ] RasPppoe C:\WINDOWS\system32\DRIVERS\raspppoe.sys
22:43:27.0458 3440 RasPppoe - ok
22:43:27.0474 3440 [ 2B0F1677CDD08967005F34488559BC6F ] RasSstp C:\WINDOWS\system32\DRIVERS\rassstp.sys
22:43:27.0474 3440 RasSstp - ok
22:43:27.0505 3440 [ A1A5E79C0D1352AFDC08328A623DA051 ] rdbss C:\WINDOWS\system32\DRIVERS\rdbss.sys
22:43:27.0520 3440 rdbss - ok
22:43:27.0536 3440 [ 6B21EBF892CD8CACB71669B35AB5DE32 ] rdpbus C:\WINDOWS\System32\drivers\rdpbus.sys
22:43:27.0536 3440 rdpbus - ok
22:43:27.0552 3440 [ 680C1DAE268B6FB67FA21B389A8B79EF ] RDPDR C:\WINDOWS\system32\drivers\rdpdr.sys
22:43:27.0552 3440 RDPDR - ok
22:43:27.0599 3440 [ 858776908AF838E3790F3261B799CDA6 ] RdpVideoMiniport C:\WINDOWS\system32\drivers\rdpvideominiport.sys
22:43:27.0599 3440 RdpVideoMiniport - ok
22:43:27.0630 3440 [ A26AEC49F318FEE141DDDB2C5F99B3E6 ] rdyboost C:\WINDOWS\system32\drivers\rdyboost.sys
22:43:27.0630 3440 rdyboost - ok
22:43:27.0692 3440 [ E515A287C8FAE901EB8FB42F168E14F2 ] ReFS C:\WINDOWS\system32\drivers\ReFS.sys
22:43:27.0692 3440 ReFS - ok
22:43:27.0724 3440 [ BFFB40FBE6D2C3469F8D06EE5E4934AB ] RemoteAccess C:\WINDOWS\System32\mprdim.dll
22:43:27.0739 3440 RemoteAccess - ok
22:43:27.0770 3440 [ 4DCCABE03D06955ED61BABBD8EF9F30F ] RemoteRegistry C:\WINDOWS\system32\regsvc.dll
22:43:27.0770 3440 RemoteRegistry - ok
22:43:27.0802 3440 [ 0527EF6E23B9FAB37DDCBC479C6CFA28 ] RFCOMM C:\WINDOWS\System32\drivers\rfcomm.sys
22:43:27.0802 3440 RFCOMM - ok
22:43:27.0849 3440 [ D894CBD7DA753C881EE8D5E33B583225 ] RpcEptMapper C:\WINDOWS\System32\RpcEpMap.dll
22:43:27.0849 3440 RpcEptMapper - ok
22:43:27.0895 3440 [ 5CAE8F47B31D5CFC322B5B898C19E0FE ] RpcLocator C:\WINDOWS\system32\locator.exe
22:43:27.0895 3440 RpcLocator - ok
22:43:27.0927 3440 [ 81979817943D830BF24571B7C1B28A1A ] RpcSs C:\WINDOWS\system32\rpcss.dll
22:43:27.0942 3440 RpcSs - ok
22:43:27.0989 3440 [ D38250F459BF60D6F4B69B79DCD948CC ] RSP2STOR C:\WINDOWS\system32\DRIVERS\RtsP2Stor.sys
22:43:27.0989 3440 RSP2STOR - ok
22:43:28.0036 3440 [ 2D05A5508F4685412F2B89E8C2189ABC ] rspndr C:\WINDOWS\system32\DRIVERS\rspndr.sys
22:43:28.0036 3440 rspndr - ok
22:43:28.0067 3440 [ 3B7A94926B52D171C5B515EDECC2118E ] rtbth C:\WINDOWS\System32\drivers\rtbth.sys
22:43:28.0083 3440 rtbth - ok
22:43:28.0114 3440 [ 34DA0D14F5C3F1883A331AFB975AB434 ] RTL8168 C:\WINDOWS\system32\DRIVERS\Rt630x64.sys
22:43:28.0114 3440 RTL8168 - ok
22:43:28.0130 3440 [ 1A063730F221B2746FF00457AE17E4F0 ] s3cap C:\WINDOWS\System32\drivers\vms3cap.sys
22:43:28.0130 3440 s3cap - ok
22:43:28.0177 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] SamSs C:\WINDOWS\system32\lsass.exe
22:43:28.0177 3440 SamSs - ok
22:43:28.0224 3440 [ C624A1B32211C3166EDB3F4AB02A30B7 ] sbp2port C:\WINDOWS\system32\drivers\sbp2port.sys
22:43:28.0224 3440 sbp2port - ok
22:43:28.0270 3440 [ 47C497FA4DDEA908633CAA60CEBE6805 ] SCardSvr C:\WINDOWS\System32\SCardSvr.dll
22:43:28.0270 3440 SCardSvr - ok
22:43:28.0302 3440 [ E76C4E98302AE39CC6FA5D20FC8B5438 ] ScDeviceEnum C:\WINDOWS\System32\ScDeviceEnum.dll
22:43:28.0302 3440 ScDeviceEnum - ok
22:43:28.0349 3440 [ ABD0237B15DBD2B4695F4B7D734A58F7 ] scfilter C:\WINDOWS\system32\DRIVERS\scfilter.sys
22:43:28.0349 3440 scfilter - ok
22:43:28.0380 3440 [ A95838FFFAEAA7500263D491575F7E0C ] Schedule C:\WINDOWS\system32\schedsvc.dll
22:43:28.0427 3440 Schedule - ok
22:43:28.0474 3440 [ AB285CE3431FF3D2ACE669245874C1C7 ] SCPolicySvc C:\WINDOWS\System32\certprop.dll
22:43:28.0474 3440 SCPolicySvc - ok
22:43:28.0505 3440 [ FDEC5799BA499D18AFA3A540538866E7 ] sdbus C:\WINDOWS\System32\drivers\sdbus.sys
22:43:28.0505 3440 sdbus - ok
22:43:28.0552 3440 [ 0B1E929D11A8E358106955603FAC65E8 ] sdstor C:\WINDOWS\System32\drivers\sdstor.sys
22:43:28.0552 3440 sdstor - ok
22:43:28.0567 3440 [ 3EA8A16169C26AFBEB544E0E48421186 ] secdrv C:\WINDOWS\system32\drivers\secdrv.sys
22:43:28.0567 3440 secdrv - ok
22:43:28.0614 3440 [ C49009F897BA4F2F4F31043663AA1485 ] seclogon C:\WINDOWS\system32\seclogon.dll
22:43:28.0614 3440 seclogon - ok
22:43:28.0630 3440 [ A88882E64BDC1D8E8D6E727B71CCCC53 ] SENS C:\WINDOWS\System32\sens.dll
22:43:28.0630 3440 SENS - ok
22:43:28.0646 3440 [ E66A7C8CE7ED22DED6DF1CA479FB4790 ] SensrSvc C:\WINDOWS\system32\sensrsvc.dll
22:43:28.0661 3440 SensrSvc - ok
22:43:28.0708 3440 [ DB2FF24CE0BDD15FE75870AFE312BA89 ] SerCx C:\WINDOWS\system32\drivers\SerCx.sys
22:43:28.0708 3440 SerCx - ok
22:43:28.0739 3440 [ 0044B31F93946D5D41982314381FE431 ] SerCx2 C:\WINDOWS\system32\drivers\SerCx2.sys
22:43:28.0739 3440 SerCx2 - ok
22:43:28.0755 3440 [ 3CD600C089C1251BEEB4CD4CD5164F9E ] Serenum C:\WINDOWS\System32\drivers\serenum.sys
22:43:28.0771 3440 Serenum - ok
22:43:28.0771 3440 [ D864381BC9C725FAB01D94C060660166 ] Serial C:\WINDOWS\System32\drivers\serial.sys
22:43:28.0771 3440 Serial - ok
22:43:28.0786 3440 [ 0BD2B65DCE756FDE95A2E5CCCBF7705D ] sermouse C:\WINDOWS\System32\drivers\sermouse.sys
22:43:28.0802 3440 sermouse - ok
22:43:28.0833 3440 [ D5C3776CBD8BC307DCCA3FD4CE667A37 ] SessionEnv C:\WINDOWS\system32\sessenv.dll
22:43:28.0849 3440 SessionEnv - ok
22:43:28.0864 3440 [ 472B7A5AC181C050888DB454663DD764 ] sfloppy C:\WINDOWS\System32\drivers\sfloppy.sys
22:43:28.0864 3440 sfloppy - ok
22:43:28.0911 3440 [ F4414F57DF2CECB8FC969AA43A6B0D50 ] SharedAccess C:\WINDOWS\System32\ipnathlp.dll
22:43:28.0911 3440 SharedAccess - ok
22:43:28.0989 3440 [ 0D190D8B4B20446BE6299AC734DFADF1 ] ShellHWDetection C:\WINDOWS\System32\shsvcs.dll
22:43:28.0989 3440 ShellHWDetection - ok
22:43:29.0005 3440 [ 2F518D13DD6F3053837FE606F1A2EA1F ] SiSRaid2 C:\WINDOWS\system32\drivers\SiSRaid2.sys
22:43:29.0021 3440 SiSRaid2 - ok
22:43:29.0036 3440 [ 1AC9A200A9C49C4508F04AAFFCA34A3F ] SiSRaid4 C:\WINDOWS\system32\drivers\sisraid4.sys
22:43:29.0036 3440 SiSRaid4 - ok
22:43:29.0067 3440 [ AF5CC3F9B88F140D78FC967ABF0F4EC7 ] SmbDrv C:\WINDOWS\System32\drivers\Smb_driver_AMDASF.sys
22:43:29.0067 3440 SmbDrv - ok
22:43:29.0099 3440 [ 410F4660C8472873818A288EBBE1FC8A ] SmbDrvI C:\WINDOWS\system32\DRIVERS\Smb_driver_Intel.sys
22:43:29.0114 3440 SmbDrvI - ok
22:43:29.0161 3440 [ 587ACA15210D1B01FBF272E07A08F91A ] smphost C:\WINDOWS\System32\smphost.dll
22:43:29.0161 3440 smphost - ok
22:43:29.0208 3440 [ 49EEB92DE930B8566EF615D600781DB4 ] SNMPTRAP C:\WINDOWS\System32\snmptrap.exe
22:43:29.0208 3440 SNMPTRAP - ok
22:43:29.0271 3440 [ 87765EF43C33BE342F4ACB0E3FBF89A6 ] spaceport C:\WINDOWS\system32\drivers\spaceport.sys
22:43:29.0271 3440 spaceport - ok
22:43:29.0302 3440 [ F337BE11071818FC3F5DC2940B6BDE34 ] SpbCx C:\WINDOWS\system32\drivers\SpbCx.sys
22:43:29.0302 3440 SpbCx - ok
22:43:29.0333 3440 [ FE0CB40F36D3FCDD3A1B312EF72C38D5 ] Spooler C:\WINDOWS\System32\spoolsv.exe
22:43:29.0333 3440 Spooler - ok
22:43:29.0474 3440 [ C993A0B97BECD3AAF5158E3869878465 ] sppsvc C:\WINDOWS\system32\sppsvc.exe
22:43:29.0521 3440 sppsvc - ok
22:43:29.0552 3440 [ 2B78788A1485F9B99A578A299DF42C02 ] srv C:\WINDOWS\system32\DRIVERS\srv.sys
22:43:29.0567 3440 srv - ok
22:43:29.0599 3440 [ E62EAEF0BAC9DD61BF22D4A7F2F18571 ] srv2 C:\WINDOWS\system32\DRIVERS\srv2.sys
22:43:29.0599 3440 srv2 - ok
22:43:29.0614 3440 [ 466BDC0006103F2547D308DD3CD64398 ] srvnet C:\WINDOWS\system32\DRIVERS\srvnet.sys
22:43:29.0614 3440 srvnet - ok
22:43:29.0646 3440 [ BB9ED3EDD8E85008215A7250D325A72E ] SSDPSRV C:\WINDOWS\System32\ssdpsrv.dll
22:43:29.0661 3440 SSDPSRV - ok
22:43:29.0708 3440 [ 3911418AFDE10EA6823B7799E4815524 ] SstpSvc C:\WINDOWS\system32\sstpsvc.dll
22:43:29.0724 3440 SstpSvc - ok
22:43:29.0755 3440 [ 366DEA74BBA65B362BCCFC6FC2ADFD8B ] stexstor C:\WINDOWS\system32\drivers\stexstor.sys
22:43:29.0755 3440 stexstor - ok
22:43:29.0817 3440 [ D638904FE86A5FE542A1BA13A9D68E5C ] stisvc C:\WINDOWS\System32\wiaservc.dll
22:43:29.0833 3440 stisvc - ok
22:43:29.0849 3440 [ 0ED2E318ABB68C1A35A8B8038BDB4C90 ] storahci C:\WINDOWS\system32\drivers\storahci.sys
22:43:29.0849 3440 storahci - ok
22:43:29.0880 3440 [ 7A08CEE1535F5A448215634C5EA74E50 ] storflt C:\WINDOWS\system32\DRIVERS\vmstorfl.sys
22:43:29.0880 3440 storflt - ok
22:43:29.0896 3440 [ 6B06E2D11E604BE2B1A406C4CB3B90DE ] stornvme C:\WINDOWS\system32\drivers\stornvme.sys
22:43:29.0911 3440 stornvme - ok
22:43:29.0942 3440 [ 3118058E3D07021A55324A943C6D722B ] StorSvc C:\WINDOWS\system32\storsvc.dll
22:43:29.0942 3440 StorSvc - ok
22:43:29.0958 3440 [ 548759755BC73DAD663250239D7E0B9F ] storvsc C:\WINDOWS\system32\drivers\storvsc.sys
22:43:29.0958 3440 storvsc - ok
22:43:30.0005 3440 [ D8E1AE075AB3E8AD56F69C44AA978596 ] svsvc C:\WINDOWS\system32\svsvc.dll
22:43:30.0005 3440 svsvc - ok
22:43:30.0021 3440 [ 84E0F5D41C138C5CC975137A2A98F6D3 ] swenum C:\WINDOWS\System32\drivers\swenum.sys
22:43:30.0021 3440 swenum - ok
22:43:30.0067 3440 [ E3C92D60F6AD7763961D1E7628002844 ] swprv C:\WINDOWS\System32\swprv.dll
22:43:30.0083 3440 swprv - ok
22:43:30.0130 3440 [ 0F34FE968C91D02CE30D76C257F2BDA0 ] SynTP C:\WINDOWS\system32\DRIVERS\SynTP.sys
22:43:30.0130 3440 SynTP - ok
22:43:30.0177 3440 [ 3DA26652B12E9AB43FD04976AC6DFD33 ] SysMain C:\WINDOWS\system32\sysmain.dll
22:43:30.0192 3440 SysMain - ok
22:43:30.0224 3440 [ D65B1C952AEB864C2BAC7A770B17ECCE ] SystemEventsBroker C:\WINDOWS\System32\SystemEventsBrokerServer.dll
22:43:30.0224 3440 SystemEventsBroker - ok
22:43:30.0271 3440 [ BA6DD39266A5E15515C8C14DA2DA3E5C ] TabletInputService C:\WINDOWS\System32\TabSvc.dll
22:43:30.0286 3440 TabletInputService - ok
22:43:30.0302 3440 [ B517410F157693043DACA21B19B258A6 ] TapiSrv C:\WINDOWS\System32\tapisrv.dll
22:43:30.0317 3440 TapiSrv - ok
22:43:30.0380 3440 [ FEEFE783D87C9063CDAC6DBDCF95F533 ] Tcpip C:\WINDOWS\system32\drivers\tcpip.sys
22:43:30.0396 3440 Tcpip - ok
22:43:30.0458 3440 [ FEEFE783D87C9063CDAC6DBDCF95F533 ] TCPIP6 C:\WINDOWS\system32\DRIVERS\tcpip.sys
22:43:30.0474 3440 TCPIP6 - ok
22:43:30.0489 3440 [ 41CF802064F72E55F50CA0A221FD36D4 ] tcpipreg C:\WINDOWS\system32\drivers\tcpipreg.sys
22:43:30.0505 3440 tcpipreg - ok
22:43:30.0536 3440 [ FFF28F9F6823EB1756C60F1649560BBF ] tdx C:\WINDOWS\system32\DRIVERS\tdx.sys
22:43:30.0536 3440 tdx - ok
22:43:30.0583 3440 [ 232D185D2337F141311D0CF1983E1431 ] terminpt C:\WINDOWS\System32\drivers\terminpt.sys
22:43:30.0583 3440 terminpt - ok
22:43:30.0646 3440 [ 2C77831737491F4D684D315B95C62883 ] TermService C:\WINDOWS\System32\termsrv.dll
22:43:30.0661 3440 TermService - ok
22:43:30.0677 3440 [ 05FBE1F7C13E87AF7A414CDF288B1F62 ] Themes C:\WINDOWS\system32\themeservice.dll
22:43:30.0677 3440 Themes - ok
22:43:30.0724 3440 [ FD788C2D96EA91469A3C1D13E80D7473 ] THREADORDER C:\WINDOWS\system32\mmcss.dll
22:43:30.0739 3440 THREADORDER - ok
22:43:30.0739 3440 [ 347A3E49CE18402305B8119A6EC7CFEB ] TimeBroker C:\WINDOWS\System32\TimeBrokerServer.dll
22:43:30.0755 3440 TimeBroker - ok
22:43:30.0771 3440 [ 82F909359600D3603FE852DB7F135626 ] TPM C:\WINDOWS\system32\drivers\tpm.sys
22:43:30.0771 3440 TPM - ok
22:43:30.0786 3440 [ C97E14BB6A196B0554D6EB67D8818175 ] TrkWks C:\WINDOWS\System32\trkwks.dll
22:43:30.0802 3440 TrkWks - ok
22:43:30.0864 3440 [ 887CC44830D3F367CAD17A0CA7CCA5C8 ] TrustedInstaller C:\WINDOWS\servicing\TrustedInstaller.exe
22:43:30.0864 3440 TrustedInstaller - ok
22:43:30.0880 3440 [ BF8F54CA37E9C9D6582C31C5761F8C93 ] TsUsbFlt C:\WINDOWS\system32\drivers\tsusbflt.sys
22:43:30.0896 3440 TsUsbFlt - ok
22:43:30.0927 3440 [ E0088068DCE2EE82897027DDB8E05254 ] TsUsbGD C:\WINDOWS\System32\drivers\TsUsbGD.sys
22:43:30.0927 3440 TsUsbGD - ok
22:43:30.0943 3440 [ C8E0E78B5D284C2FF59BDFFDAF997242 ] tunnel C:\WINDOWS\system32\DRIVERS\tunnel.sys
22:43:30.0943 3440 tunnel - ok
22:43:30.0974 3440 [ F6EEAD052943B5A3104C1405BB856C54 ] uagp35 C:\WINDOWS\system32\drivers\uagp35.sys
22:43:30.0974 3440 uagp35 - ok
22:43:31.0005 3440 [ FE6067B1FD4E63650C667B33D080565B ] UASPStor C:\WINDOWS\System32\drivers\uaspstor.sys
22:43:31.0005 3440 UASPStor - ok
22:43:31.0036 3440 [ B034A41891A36457B994307DFA772293 ] UCX01000 C:\WINDOWS\System32\drivers\ucx01000.sys
22:43:31.0052 3440 UCX01000 - ok
22:43:31.0068 3440 [ 1EC649F112896FAE33250F0B97AC5D0B ] udfs C:\WINDOWS\system32\DRIVERS\udfs.sys
22:43:31.0068 3440 udfs - ok
22:43:31.0083 3440 [ 9578691F297E1B1F519970FE6D47CB21 ] UEFI C:\WINDOWS\System32\drivers\UEFI.sys
22:43:31.0083 3440 UEFI - ok
22:43:31.0130 3440 [ 320878AFECDBBD61BBE98624A6CAAC08 ] UI0Detect C:\WINDOWS\system32\UI0Detect.exe
22:43:31.0130 3440 UI0Detect - ok
22:43:31.0161 3440 [ 5EAB5117DDB24FC4D39E6FFFCF1837B9 ] uliagpkx C:\WINDOWS\system32\drivers\uliagpkx.sys
22:43:31.0161 3440 uliagpkx - ok
22:43:31.0177 3440 [ DA34C39A18E60E7C3FA0630566408034 ] umbus C:\WINDOWS\System32\drivers\umbus.sys
22:43:31.0177 3440 umbus - ok
22:43:31.0255 3440 [ AE8294875E5446E359B1E8035D40C05E ] UmPass C:\WINDOWS\System32\drivers\umpass.sys
22:43:31.0255 3440 UmPass - ok
22:43:31.0302 3440 [ E3DDF7D43E05784FAA5E042605EEE528 ] UmRdpService C:\WINDOWS\System32\umrdp.dll
22:43:31.0318 3440 UmRdpService - ok
22:43:31.0427 3440 [ DBE2E6388379D5CC78099650541E9566 ] UNS C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
22:43:31.0427 3440 UNS - ok
22:43:31.0443 3440 [ 4A2FFDAC45F317E17DF642C7160EB633 ] upnphost C:\WINDOWS\System32\upnphost.dll
22:43:31.0458 3440 upnphost - ok
22:43:31.0489 3440 [ 433ECDE01A52691FA7ACA51C10C09B70 ] usbccgp C:\WINDOWS\System32\drivers\usbccgp.sys
22:43:31.0489 3440 usbccgp - ok
22:43:31.0536 3440 [ B3D6457D841A0CAEF4C52D88621715F2 ] usbcir C:\WINDOWS\System32\drivers\usbcir.sys
22:43:31.0536 3440 usbcir - ok
22:43:31.0583 3440 [ 5477D6E27C7D266EF8C152B9A25ADE5E ] usbehci C:\WINDOWS\System32\drivers\usbehci.sys
22:43:31.0583 3440 usbehci - ok
22:43:31.0599 3440 [ DF56C2C04EFA328D7A66B69007130266 ] usbhub C:\WINDOWS\System32\drivers\usbhub.sys
22:43:31.0614 3440 usbhub - ok
22:43:31.0646 3440 [ CFC52C49BEFE4D70D87FFA900EAB9777 ] USBHUB3 C:\WINDOWS\System32\drivers\UsbHub3.sys
22:43:31.0646 3440 USBHUB3 - ok
22:43:31.0661 3440 [ 3019097FB6C985EF24C058090FF3BDBD ] usbohci C:\WINDOWS\System32\drivers\usbohci.sys
22:43:31.0661 3440 usbohci - ok
22:43:31.0693 3440 [ 4D655E3B684BE9B0F7FFD8A2935C348C ] usbprint C:\WINDOWS\System32\drivers\usbprint.sys
22:43:31.0693 3440 usbprint - ok
22:43:31.0739 3440 [ EA23453240137F6773174E0D93F61A69 ] USBSTOR C:\WINDOWS\System32\drivers\USBSTOR.SYS
22:43:31.0739 3440 USBSTOR - ok
22:43:31.0755 3440 [ BA4FA655E0FC577DB7436FC963932CE4 ] usbuhci C:\WINDOWS\System32\drivers\usbuhci.sys
22:43:31.0755 3440 usbuhci - ok
22:43:31.0771 3440 [ 18F744E8CCEB2670040EBAF7AD77B8C6 ] usbvideo C:\WINDOWS\System32\Drivers\usbvideo.sys
22:43:31.0771 3440 usbvideo - ok
22:43:31.0818 3440 [ 48430B0313FC1CFE3D2400553F1A93CD ] USBXHCI C:\WINDOWS\System32\drivers\USBXHCI.SYS
22:43:31.0818 3440 USBXHCI - ok
22:43:31.0849 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] VaultSvc C:\WINDOWS\system32\lsass.exe
22:43:31.0849 3440 VaultSvc - ok
22:43:31.0880 3440 [ FD911873C0BB6945FA38C16E9A2B58F9 ] VClone C:\WINDOWS\System32\drivers\VClone.sys
22:43:31.0880 3440 VClone - ok
22:43:31.0927 3440 [ FEB26E3B8345A7E8D62F945C4AE86562 ] vdrvroot C:\WINDOWS\system32\drivers\vdrvroot.sys
22:43:31.0927 3440 vdrvroot - ok
22:43:31.0989 3440 [ E3EF58D4123B5AA29C8E19825AF84A5E ] vds C:\WINDOWS\System32\vds.exe
22:43:32.0005 3440 vds - ok
22:43:32.0021 3440 [ A026EDEAA5EECAE0B08E2748B616D4BD ] VerifierExt C:\WINDOWS\system32\drivers\VerifierExt.sys
22:43:32.0021 3440 VerifierExt - ok
22:43:32.0052 3440 [ 52E483A3701A5A61A75A06993720347D ] vhdmp C:\WINDOWS\System32\drivers\vhdmp.sys
22:43:32.0068 3440 vhdmp - ok
22:43:32.0083 3440 [ 06D38968028E9AB19DE9B618C7B6D199 ] viaide C:\WINDOWS\system32\drivers\viaide.sys
22:43:32.0083 3440 viaide - ok
22:43:32.0099 3440 [ C6305BDFC4F7CE51F72BB072C03D4ACE ] vmbus C:\WINDOWS\system32\drivers\vmbus.sys
22:43:32.0099 3440 vmbus - ok
22:43:32.0114 3440 [ DA40BEA0A863CE768C940CA9723BF81F ] VMBusHID C:\WINDOWS\System32\drivers\VMBusHID.sys
22:43:32.0114 3440 VMBusHID - ok
22:43:32.0161 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicguestinterface C:\WINDOWS\System32\ICSvc.dll
22:43:32.0161 3440 vmicguestinterface - ok
22:43:32.0177 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicheartbeat C:\WINDOWS\System32\ICSvc.dll
22:43:32.0177 3440 vmicheartbeat - ok
22:43:32.0193 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmickvpexchange C:\WINDOWS\System32\ICSvc.dll
22:43:32.0208 3440 vmickvpexchange - ok
22:43:32.0208 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicrdv C:\WINDOWS\System32\ICSvc.dll
22:43:32.0224 3440 vmicrdv - ok
22:43:32.0224 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicshutdown C:\WINDOWS\System32\ICSvc.dll
22:43:32.0239 3440 vmicshutdown - ok
22:43:32.0239 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmictimesync C:\WINDOWS\System32\ICSvc.dll
22:43:32.0255 3440 vmictimesync - ok
22:43:32.0255 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicvss C:\WINDOWS\System32\ICSvc.dll
22:43:32.0271 3440 vmicvss - ok
22:43:32.0286 3440 [ 55D7D963DE85162F1C49721E502F9744 ] volmgr C:\WINDOWS\system32\drivers\volmgr.sys
22:43:32.0286 3440 volmgr - ok
22:43:32.0318 3440 [ CCB9E901F7254BF96D28EB1B0E5329B7 ] volmgrx C:\WINDOWS\system32\drivers\volmgrx.sys
22:43:32.0318 3440 volmgrx - ok
22:43:32.0364 3440 [ 3595FBDF25F8BA6256072D103937D7D6 ] volsnap C:\WINDOWS\system32\drivers\volsnap.sys
22:43:32.0364 3440 volsnap - ok
22:43:32.0396 3440 [ 01355C98B5C3ED1EC446743CDA848FCE ] vpci C:\WINDOWS\System32\drivers\vpci.sys
22:43:32.0396 3440 vpci - ok
22:43:32.0411 3440 [ 4539F45F9F4C9757A86A56C949421E07 ] vsmraid C:\WINDOWS\system32\drivers\vsmraid.sys
22:43:32.0411 3440 vsmraid - ok
22:43:32.0474 3440 [ 4957B27219515B93A508B91068B87BF5 ] VSS C:\WINDOWS\system32\vssvc.exe
22:43:32.0489 3440 VSS - ok
22:43:32.0536 3440 [ 0849B7260F26FE05EA56DED0672E2F4B ] VSTXRAID C:\WINDOWS\system32\drivers\vstxraid.sys
22:43:32.0552 3440 VSTXRAID - ok
22:43:32.0568 3440 [ BE970C369E43B509C1EDA2B8FA7CECB0 ] vwifibus C:\WINDOWS\System32\drivers\vwifibus.sys
22:43:32.0568 3440 vwifibus - ok
22:43:32.0583 3440 [ 6B26AD573CCDD5209DF4397438B76354 ] vwififlt C:\WINDOWS\system32\DRIVERS\vwififlt.sys
22:43:32.0583 3440 vwififlt - ok
22:43:32.0599 3440 [ 0B48E0DFB44EE475F4FD8A8EE599AF30 ] vwifimp C:\WINDOWS\system32\DRIVERS\vwifimp.sys
22:43:32.0599 3440 vwifimp - ok
22:43:32.0630 3440 [ 7599E582CA3A6AAA95A18FFE1172D339 ] W32Time C:\WINDOWS\system32\w32time.dll
22:43:32.0646 3440 W32Time - ok
22:43:32.0724 3440 [ 8E553C859C83784DEC08B10AFC3EAC92 ] w3logsvc C:\WINDOWS\system32\inetsrv\w3logsvc.dll
22:43:32.0724 3440 w3logsvc - ok
22:43:32.0739 3440 [ 0910AB9ED404C1434E2D0376C2AD5D8B ] WacomPen C:\WINDOWS\System32\drivers\wacompen.sys
22:43:32.0739 3440 WacomPen - ok
22:43:32.0755 3440 [ AFCD4054D61BD708B82991348ED1C763 ] Wanarp C:\WINDOWS\system32\DRIVERS\wanarp.sys
22:43:32.0755 3440 Wanarp - ok
22:43:32.0755 3440 [ AFCD4054D61BD708B82991348ED1C763 ] Wanarpv6 C:\WINDOWS\system32\DRIVERS\wanarp.sys
22:43:32.0755 3440 Wanarpv6 - ok
22:43:32.0818 3440 [ 9BAE40BD31E3EE0B0C70BEF167E0A2BC ] WAS C:\WINDOWS\system32\inetsrv\iisw3adm.dll
22:43:32.0833 3440 WAS - ok
22:43:32.0896 3440 [ 61692DB39AD3DF2F29392D68EAA7BB93 ] wbengine C:\WINDOWS\system32\wbengine.exe
22:43:32.0911 3440 wbengine - ok
22:43:32.0958 3440 [ 3BC1D1D56637A32CD91C8AE08E2484AA ] WbioSrvc C:\WINDOWS\System32\wbiosrvc.dll
22:43:32.0958 3440 WbioSrvc - ok
22:43:33.0021 3440 [ A07CFC4B593D15B6BF06813C3B5B33BF ] Wcmsvc C:\WINDOWS\System32\wcmsvc.dll
22:43:33.0021 3440 Wcmsvc - ok
22:43:33.0052 3440 [ D2726823DF7E19F213F4805A9D6D145F ] wcncsvc C:\WINDOWS\System32\wcncsvc.dll
22:43:33.0052 3440 wcncsvc - ok
22:43:33.0068 3440 [ 846C02A8B48CBD921A3D6AB521AA0DC4 ] WcsPlugInService C:\WINDOWS\System32\WcsPlugInService.dll
22:43:33.0083 3440 WcsPlugInService - ok
22:43:33.0114 3440 [ 241895E8A9C158DF86E12FDD21033A32 ] WdBoot C:\WINDOWS\system32\drivers\WdBoot.sys
22:43:33.0114 3440 WdBoot - ok
22:43:33.0177 3440 [ CB6C63FF8342B467E2EF76E98D5B934D ] Wdf01000 C:\WINDOWS\system32\drivers\Wdf01000.sys
22:43:33.0177 3440 Wdf01000 - ok
22:43:33.0193 3440 [ C52148456E0F6EAD9E903020A79207FC ] WdFilter C:\WINDOWS\system32\drivers\WdFilter.sys
22:43:33.0193 3440 WdFilter - ok
22:43:33.0208 3440 [ 40C67D1A4891120874767F6E6604D6C5 ] WdiServiceHost C:\WINDOWS\system32\wdi.dll
22:43:33.0224 3440 WdiServiceHost - ok
22:43:33.0224 3440 [ 40C67D1A4891120874767F6E6604D6C5 ] WdiSystemHost C:\WINDOWS\system32\wdi.dll
22:43:33.0239 3440 WdiSystemHost - ok
22:43:33.0255 3440 [ 57F22324FAAF92ADF957B281E88F1743 ] WdNisDrv C:\WINDOWS\system32\Drivers\WdNisDrv.sys
22:43:33.0255 3440 WdNisDrv - ok
22:43:33.0286 3440 WdNisSvc - ok
22:43:33.0302 3440 [ 6588A957873326361AB1CAC4E76F8394 ] WebClient C:\WINDOWS\System32\webclnt.dll
22:43:33.0318 3440 WebClient - ok
22:43:33.0333 3440 [ 3274312F263882B51B964329FAF49734 ] Wecsvc C:\WINDOWS\system32\wecsvc.dll
22:43:33.0349 3440 Wecsvc - ok
22:43:33.0364 3440 [ 7CDD84E0023A0C5C230B06A7965EC65E ] WEPHOSTSVC C:\WINDOWS\system32\wephostsvc.dll
22:43:33.0380 3440 WEPHOSTSVC - ok
22:43:33.0411 3440 [ 959534ACF085C137D2D094384EF89C45 ] wercplsupport C:\WINDOWS\System32\wercplsupport.dll
22:43:33.0411 3440 wercplsupport - ok
22:43:33.0458 3440 [ 82BCCF5FBE47AC9E8CBA2020994DFB3F ] WerSvc C:\WINDOWS\System32\WerSvc.dll
22:43:33.0474 3440 WerSvc - ok
22:43:33.0505 3440 [ BFBE1C5F57FE7A885673A1962D5532B7 ] WFPLWFS C:\WINDOWS\system32\DRIVERS\wfplwfs.sys
22:43:33.0505 3440 WFPLWFS - ok
22:43:33.0521 3440 [ E06AFE2F94BA7CFA2FE4FD2A449E60E2 ] WiaRpc C:\WINDOWS\System32\wiarpc.dll
22:43:33.0521 3440 WiaRpc - ok
22:43:33.0552 3440 [ 867BCC69ED9C31C501465EB0E8BA9DFA ] WIMMount C:\WINDOWS\system32\drivers\wimmount.sys
22:43:33.0552 3440 WIMMount - ok
22:43:33.0552 3440 WinDefend - ok
22:43:33.0599 3440 [ DD079EC8F44DCA3A176B345C6ADEFB66 ] WinHttpAutoProxySvc C:\WINDOWS\system32\winhttp.dll
22:43:33.0615 3440 WinHttpAutoProxySvc - ok
22:43:33.0677 3440 [ 9DB490F3E823C5C3C070644B96CB9D59 ] Winmgmt C:\WINDOWS\system32\wbem\WMIsvc.dll
22:43:33.0677 3440 Winmgmt - ok
22:43:33.0740 3440 [ C8D6344BDE2691A196E61C0D3372EAB7 ] WinRM C:\WINDOWS\system32\WsmSvc.dll
22:43:33.0786 3440 WinRM - ok
22:43:33.0833 3440 [ 4F2A80D65AE6F845776E2F06AE6782ED ] WirelessButtonDriver C:\WINDOWS\System32\drivers\WirelessButtonDriver64.sys
22:43:33.0833 3440 WirelessButtonDriver - ok
22:43:33.0880 3440 [ 5A917027826D759CC3238C7D3CEC3438 ] WlanSvc C:\WINDOWS\System32\wlansvc.dll
22:43:33.0911 3440 WlanSvc - ok
22:43:33.0974 3440 [ 5F56C0DE776C7AE43AF749845BFAA1EF ] wlidsvc C:\WINDOWS\system32\wlidsvc.dll
22:43:34.0005 3440 wlidsvc - ok
22:43:34.0021 3440 [ 2834D9D3B4F554A39C72F00EA3F0E128 ] WmiAcpi C:\WINDOWS\System32\drivers\wmiacpi.sys
22:43:34.0021 3440 WmiAcpi - ok
22:43:34.0068 3440 [ 7AFAC828F52D62F304A911EC32F42EEE ] wmiApSrv C:\WINDOWS\system32\wbem\WmiApSrv.exe
22:43:34.0068 3440 wmiApSrv - ok
22:43:34.0099 3440 WMPNetworkSvc - ok
22:43:34.0115 3440 [ 7FC5667DF73D4B04AA457CC3A4180E09 ] Wof C:\WINDOWS\system32\drivers\Wof.sys
22:43:34.0130 3440 Wof - ok
22:43:34.0193 3440 [ 65C65F3BD784158C456E721DDC9F0EA2 ] workfolderssvc C:\WINDOWS\system32\workfolderssvc.dll
22:43:34.0224 3440 workfolderssvc - ok
22:43:34.0255 3440 [ C1F564F324685C088ECAB1933576CF91 ] wpcfltr C:\WINDOWS\system32\DRIVERS\wpcfltr.sys
22:43:34.0255 3440 wpcfltr - ok
22:43:34.0286 3440 [ 4E6A0F60DA7EF050D3D26417CD4D24E9 ] WPCSvc C:\WINDOWS\System32\wpcsvc.dll
22:43:34.0302 3440 WPCSvc - ok
22:43:34.0318 3440 [ D27491CFCE452C154CECFA155AD0EBC8 ] WPDBusEnum C:\WINDOWS\system32\wpdbusenum.dll
22:43:34.0318 3440 WPDBusEnum - ok
22:43:34.0365 3440 [ 9F2904B55F6CECCD1A8D986B5CE2609A ] WpdUpFltr C:\WINDOWS\system32\drivers\WpdUpFltr.sys
22:43:34.0365 3440 WpdUpFltr - ok
22:43:34.0396 3440 [ AE072B0339D0A18E455DC21666CAD572 ] ws2ifsl C:\WINDOWS\system32\drivers\ws2ifsl.sys
22:43:34.0396 3440 ws2ifsl - ok
22:43:34.0443 3440 [ 515583507D3828E827FF6352C9ACCEFA ] wscsvc C:\WINDOWS\System32\wscsvc.dll
22:43:34.0443 3440 wscsvc - ok
22:43:34.0458 3440 WSearch - ok
22:43:34.0552 3440 [ 95B6670E6933E1DEE19686C55BE709A0 ] WSService C:\WINDOWS\System32\WSService.dll
22:43:34.0615 3440 WSService - ok
22:43:34.0708 3440 [ 779FB2F26E4339A4DD3EEF57E4E593FA ] wuauserv C:\WINDOWS\system32\wuaueng.dll
22:43:34.0771 3440 wuauserv - ok
22:43:34.0802 3440 [ 2FEAE33E9B2B56104596E1BA444405A9 ] WudfPf C:\WINDOWS\system32\drivers\WudfPf.sys
22:43:34.0818 3440 WudfPf - ok
22:43:34.0833 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFRd C:\WINDOWS\System32\drivers\WUDFRd.sys
22:43:34.0833 3440 WUDFRd - ok
22:43:34.0833 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFSensorLP C:\WINDOWS\System32\drivers\WUDFRd.sys
22:43:34.0833 3440 WUDFSensorLP - ok
22:43:34.0880 3440 [ BB73CBC65AABC4EA0A5C6A1474A0A743 ] wudfsvc C:\WINDOWS\System32\WUDFSvc.dll
22:43:34.0880 3440 wudfsvc - ok
22:43:34.0896 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFWpdFs C:\WINDOWS\system32\DRIVERS\WUDFRd.sys
22:43:34.0896 3440 WUDFWpdFs - ok
22:43:34.0927 3440 [ 2FA9794CA36147756F3FDFD6CA29B46F ] WwanSvc C:\WINDOWS\System32\wwansvc.dll
22:43:34.0943 3440 WwanSvc - ok
22:43:34.0958 3440 ================ Scan global ===============================
22:43:35.0005 3440 [ C89780A6F58D113C28A96D85D1261DC5 ] C:\WINDOWS\system32\basesrv.dll
22:43:35.0052 3440 [ 00DD4D2ACC2E72155A8AAA82018BEC0D ] C:\WINDOWS\system32\winsrv.dll
22:43:35.0068 3440 [ 9C1833ABD62876856836C5AE55C7CE86 ] C:\WINDOWS\system32\sxssrv.dll
22:43:35.0115 3440 [ B4B610BBCB002EC478C6FD80CF915697 ] C:\WINDOWS\system32\services.exe
22:43:35.0130 3440 [Global] - ok
22:43:35.0130 3440 ================ Scan MBR ==================================
22:43:35.0146 3440 [ 5FB38429D5D77768867C76DCBDB35194 ] \Device\Harddisk0\DR0
22:43:35.0146 3440 \Device\Harddisk0\DR0 - ok
22:43:35.0146 3440 ================ Scan VBR ==================================
22:43:35.0161 3440 [ DBC12FC8277A390F6D15777AA7EA5BBB ] \Device\Harddisk0\DR0\Partition1
22:43:35.0161 3440 \Device\Harddisk0\DR0\Partition1 - ok
22:43:35.0177 3440 [ 936692671A402884DD84ED806920091E ] \Device\Harddisk0\DR0\Partition2
22:43:35.0177 3440 \Device\Harddisk0\DR0\Partition2 - ok
22:43:35.0177 3440 [ E99BCA8C7A1A998A1112698A92004DCF ] \Device\Harddisk0\DR0\Partition3
22:43:35.0177 3440 \Device\Harddisk0\DR0\Partition3 - ok
22:43:35.0208 3440 [ 2343A610B9A75D74875466C4CB402943 ] \Device\Harddisk0\DR0\Partition4
22:43:35.0208 3440 \Device\Harddisk0\DR0\Partition4 - ok
22:43:35.0240 3440 [ 628C65501E57804F7538316BCC45721F ] \Device\Harddisk0\DR0\Partition5
22:43:35.0240 3440 \Device\Harddisk0\DR0\Partition5 - ok
22:43:35.0302 3440 [ 456606893ECD7B449DD4E1008C648C71 ] \Device\Harddisk0\DR0\Partition6
22:43:35.0302 3440 \Device\Harddisk0\DR0\Partition6 - ok
22:43:35.0302 3440 ============================================================
22:43:35.0302 3440 Scan finished
22:43:35.0302 3440 ============================================================
22:43:35.0318 4340 Detected object count: 0
22:43:35.0318 4340 Actual detected object count: 0
22:45:12.0579 5548 Deinitialize success
22:43:23.0499 3440 LanmanServer - ok
22:43:23.0515 3440 [ D0D9C2ECA4D03A8F06DCD91236B90C98 ] LanmanWorkstation C:\WINDOWS\System32\wkssvc.dll
22:43:23.0530 3440 LanmanWorkstation - ok
22:43:23.0561 3440 [ EE289BD147FDFF95EF1B9BD65D3B974A ] lfsvc C:\WINDOWS\System32\GeofenceMonitorService.dll
22:43:23.0577 3440 lfsvc - ok
22:43:23.0608 3440 [ 8E4CA9AFD55EF6B509C80A8715ABF8C6 ] lirsgt C:\WINDOWS\system32\DRIVERS\lirsgt.sys
22:43:23.0608 3440 lirsgt - ok
22:43:23.0624 3440 [ C09010B3680860131631F53E8FE7BAD8 ] lltdio C:\WINDOWS\system32\DRIVERS\lltdio.sys
22:43:23.0624 3440 lltdio - ok
22:43:23.0671 3440 [ 00E070FC0C673311AFD4B068D1242780 ] lltdsvc C:\WINDOWS\System32\lltdsvc.dll
22:43:23.0686 3440 lltdsvc - ok
22:43:23.0718 3440 [ D113FAD71A5E67AA94B32A0F8828D265 ] lmhosts C:\WINDOWS\System32\lmhsvc.dll
22:43:23.0718 3440 lmhosts - ok
22:43:23.0765 3440 [ 4269D44BB47A6DA5D80B11F4C8536458 ] LMS C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
22:43:23.0765 3440 LMS - ok
22:43:23.0796 3440 [ C755AE4635457AA2A11F79C0DF857ABC ] LSI_SAS C:\WINDOWS\system32\drivers\lsi_sas.sys
22:43:23.0796 3440 LSI_SAS - ok
22:43:23.0827 3440 [ ADAC09CBE7A2040B7F68B5E5C9A75141 ] LSI_SAS2 C:\WINDOWS\system32\drivers\lsi_sas2.sys
22:43:23.0843 3440 LSI_SAS2 - ok
22:43:23.0858 3440 [ 04D1274BB9BBCCF12BD12374002AA191 ] LSI_SAS3 C:\WINDOWS\system32\drivers\lsi_sas3.sys
22:43:23.0858 3440 LSI_SAS3 - ok
22:43:23.0874 3440 [ 327469EEF3833D0C584B7E88A76AEC0C ] LSI_SSS C:\WINDOWS\system32\drivers\lsi_sss.sys
22:43:23.0874 3440 LSI_SSS - ok
22:43:23.0921 3440 [ 8EBB271E4588D835784A3FF7E80076A8 ] LSM C:\WINDOWS\System32\lsm.dll
22:43:23.0921 3440 LSM - ok
22:43:23.0968 3440 [ DDEE191AB32DFC22C6465002ECDF5EE4 ] luafv C:\WINDOWS\system32\drivers\luafv.sys
22:43:23.0968 3440 luafv - ok
22:43:23.0983 3440 [ EB5C03A070F30D64A6DF80E53B22F53F ] megasas C:\WINDOWS\system32\drivers\megasas.sys
22:43:23.0983 3440 megasas - ok
22:43:24.0015 3440 [ F6F13533196DE7A582D422B0241E4363 ] megasr C:\WINDOWS\system32\drivers\megasr.sys
22:43:24.0015 3440 megasr - ok
22:43:24.0046 3440 [ 772A1DEEDFDBC244183B5C805D1B7D85 ] MEIx64 C:\WINDOWS\System32\drivers\HECIx64.sys
22:43:24.0046 3440 MEIx64 - ok
22:43:24.0093 3440 [ FD788C2D96EA91469A3C1D13E80D7473 ] MMCSS C:\WINDOWS\system32\mmcss.dll
22:43:24.0093 3440 MMCSS - ok
22:43:24.0124 3440 [ 8B38C44F69259987C95135C9627E2378 ] Modem C:\WINDOWS\system32\drivers\modem.sys
22:43:24.0140 3440 Modem - ok
22:43:24.0155 3440 [ 601589000CC90F0DF8DA2CC254A3CCC9 ] monitor C:\WINDOWS\System32\drivers\monitor.sys
22:43:24.0155 3440 monitor - ok
22:43:24.0171 3440 [ CEAC6D40FE887CE8406C2393CF97DE06 ] mouclass C:\WINDOWS\System32\drivers\mouclass.sys
22:43:24.0171 3440 mouclass - ok
22:43:24.0187 3440 [ 02D98BF804084E9A0D69D1C69B02CCA9 ] mouhid C:\WINDOWS\System32\drivers\mouhid.sys
22:43:24.0187 3440 mouhid - ok
22:43:24.0202 3440 [ 515549560D481138E6E21AF7C6998E56 ] mountmgr C:\WINDOWS\system32\drivers\mountmgr.sys
22:43:24.0202 3440 mountmgr - ok
22:43:24.0265 3440 [ E1B6FCAE82474FC071155263E2841D54 ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
22:43:24.0265 3440 MozillaMaintenance - ok
22:43:24.0280 3440 [ F170510BE94CF45E3C6274578F6204B2 ] mpsdrv C:\WINDOWS\system32\drivers\mpsdrv.sys
22:43:24.0280 3440 mpsdrv - ok
22:43:24.0343 3440 [ D186C5844393252147BE934F3871DB7A ] MpsSvc C:\WINDOWS\system32\mpssvc.dll
22:43:24.0358 3440 MpsSvc - ok
22:43:24.0390 3440 [ 1D55DADC22D21883A2F80297F5A5AE48 ] MRxDAV C:\WINDOWS\system32\drivers\mrxdav.sys
22:43:24.0390 3440 MRxDAV - ok
22:43:24.0405 3440 [ C997E6A37BA8915224B3FB5024A34F69 ] mrxsmb C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
22:43:24.0421 3440 mrxsmb - ok
22:43:24.0437 3440 [ 3E28B99198B514DFEB152EACF913025E ] mrxsmb10 C:\WINDOWS\system32\DRIVERS\mrxsmb10.sys
22:43:24.0437 3440 mrxsmb10 - ok
22:43:24.0483 3440 [ AAF56E4E84D35411B4E446C445732DFE ] mrxsmb20 C:\WINDOWS\system32\DRIVERS\mrxsmb20.sys
22:43:24.0483 3440 mrxsmb20 - ok
22:43:24.0515 3440 [ 4E888019078AC363076A5433E89AA4F8 ] MsBridge C:\WINDOWS\system32\DRIVERS\bridge.sys
22:43:24.0515 3440 MsBridge - ok
22:43:24.0546 3440 [ A082C17D14D0790E27D064EA4B138AE1 ] MSDTC C:\WINDOWS\System32\msdtc.exe
22:43:24.0562 3440 MSDTC - ok
22:43:24.0577 3440 [ D13329FBF8345B28AB30F44CC247DC08 ] Msfs C:\WINDOWS\system32\drivers\Msfs.sys
22:43:24.0577 3440 Msfs - ok
22:43:24.0593 3440 [ C6B474E46F9E543B875981ED3FFE6ADD ] msgpiowin32 C:\WINDOWS\System32\drivers\msgpiowin32.sys
22:43:24.0593 3440 msgpiowin32 - ok
22:43:24.0608 3440 [ 65C92EB9D08DB5C69F28C7FFD4E84E31 ] mshidkmdf C:\WINDOWS\System32\drivers\mshidkmdf.sys
22:43:24.0608 3440 mshidkmdf - ok
22:43:24.0624 3440 [ 52299F086AC2DAFD100DD5DC4A8614BA ] mshidumdf C:\WINDOWS\System32\drivers\mshidumdf.sys
22:43:24.0624 3440 mshidumdf - ok
22:43:24.0655 3440 [ 36D92AF3343C3A3E57FEF11C449AEA4C ] msisadrv C:\WINDOWS\system32\drivers\msisadrv.sys
22:43:24.0655 3440 msisadrv - ok
22:43:24.0702 3440 [ 810F8A0A0680662BB0CE44D0E2CEF90C ] MSiSCSI C:\WINDOWS\system32\iscsiexe.dll
22:43:24.0702 3440 MSiSCSI - ok
22:43:24.0702 3440 msiserver - ok
22:43:24.0733 3440 [ A9BBBD2BAE6142253B9195E949AC2E8D ] MSKSSRV C:\WINDOWS\system32\drivers\MSKSSRV.sys
22:43:24.0733 3440 MSKSSRV - ok
22:43:24.0749 3440 [ 375E44168F2DFB91A68B8A3F619C5A7C ] MsLldp C:\WINDOWS\system32\DRIVERS\mslldp.sys
22:43:24.0749 3440 MsLldp - ok
22:43:24.0765 3440 [ 7B2128EB875DCBC006E6A913211006D6 ] MSPCLOCK C:\WINDOWS\system32\drivers\MSPCLOCK.sys
22:43:24.0780 3440 MSPCLOCK - ok
22:43:24.0780 3440 [ 1E88171579B218115C7A772F8DE04BD8 ] MSPQM C:\WINDOWS\system32\drivers\MSPQM.sys
22:43:24.0780 3440 MSPQM - ok
22:43:24.0796 3440 [ BBE2A455053E63BECBF42C2F9B21FAE0 ] MsRPC C:\WINDOWS\system32\drivers\MsRPC.sys
22:43:24.0812 3440 MsRPC - ok
22:43:24.0827 3440 [ 8D6B7D515C5CBCDB75B928A0B73C3C5E ] mssmbios C:\WINDOWS\System32\drivers\mssmbios.sys
22:43:24.0827 3440 mssmbios - ok
22:43:24.0827 3440 [ 115019AE01E0EB9C048530D2928AB4A2 ] MSTEE C:\WINDOWS\system32\drivers\MSTEE.sys
22:43:24.0843 3440 MSTEE - ok
22:43:24.0843 3440 [ 96D604A35070360F0DD4A7A8AF410B5E ] MTConfig C:\WINDOWS\System32\drivers\MTConfig.sys
22:43:24.0858 3440 MTConfig - ok
22:43:24.0858 3440 [ 619CA29326B82372621DB2C0964D8365 ] Mup C:\WINDOWS\system32\Drivers\mup.sys
22:43:24.0858 3440 Mup - ok
22:43:24.0874 3440 [ B8C35C94DCB2DFEAF03BB42131F2F77F ] mvumis C:\WINDOWS\system32\drivers\mvumis.sys
22:43:24.0874 3440 mvumis - ok
22:43:24.0937 3440 [ 41A45D2A75494EABF2806EA051E00376 ] napagent C:\WINDOWS\system32\qagentRT.dll
22:43:24.0937 3440 napagent - ok
22:43:24.0968 3440 [ 647C7652FA19F98CADF2BFDA2164BFEC ] NativeWifiP C:\WINDOWS\system32\DRIVERS\nwifi.sys
22:43:24.0983 3440 NativeWifiP - ok
22:43:25.0083 3440 [ B498A14133BD09AD0817590ACE4470AD ] NBService C:\Program Files (x86)\Nero\Nero 7\Nero BackItUp\NBService.exe
22:43:25.0098 3440 NBService - ok
22:43:25.0130 3440 [ 71E3C0100AA19D11373CCEB2F51A6008 ] NcaSvc C:\WINDOWS\System32\ncasvc.dll
22:43:25.0145 3440 NcaSvc - ok
22:43:25.0161 3440 [ 51DF09CAB2CAC64FEE3E371D9028ED01 ] NcbService C:\WINDOWS\System32\ncbservice.dll
22:43:25.0161 3440 NcbService - ok
22:43:25.0177 3440 [ 2586C4C167499210DCBF3ECFD8CCE210 ] NcdAutoSetup C:\WINDOWS\System32\NcdAutoSetup.dll
22:43:25.0177 3440 NcdAutoSetup - ok
22:43:25.0239 3440 [ F21B77B4D74092A543807D3CEB711A88 ] NDIS C:\WINDOWS\system32\drivers\ndis.sys
22:43:25.0255 3440 NDIS - ok
22:43:25.0286 3440 [ C6BB12BC35D1637CA17AE16D3A4725EB ] NdisCap C:\WINDOWS\system32\DRIVERS\ndiscap.sys
22:43:25.0286 3440 NdisCap - ok
22:43:25.0302 3440 [ 9F1DA20E943BE7AA4ED5F3E1EBA78B37 ] NdisImPlatform C:\WINDOWS\system32\DRIVERS\NdisImPlatform.sys
22:43:25.0302 3440 NdisImPlatform - ok
22:43:25.0317 3440 [ 9423421E735BD5394351E0C47C76BB92 ] NdisTapi C:\WINDOWS\system32\DRIVERS\ndistapi.sys
22:43:25.0317 3440 NdisTapi - ok
22:43:25.0364 3440 [ B832B35055BA2B7B4181861FF94D8E59 ] Ndisuio C:\WINDOWS\system32\DRIVERS\ndisuio.sys
22:43:25.0364 3440 Ndisuio - ok
22:43:25.0380 3440 [ 1F58E48EF75F34C35D8E93A0DC535CFE ] NdisVirtualBus C:\WINDOWS\System32\drivers\NdisVirtualBus.sys
22:43:25.0380 3440 NdisVirtualBus - ok
22:43:25.0395 3440 [ DEC29080202D4F9F17F55E18BCFCC41A ] NdisWan C:\WINDOWS\system32\DRIVERS\ndiswan.sys
22:43:25.0395 3440 NdisWan - ok
22:43:25.0411 3440 [ DEC29080202D4F9F17F55E18BCFCC41A ] NdisWanLegacy C:\WINDOWS\system32\DRIVERS\ndiswan.sys
22:43:25.0411 3440 NdisWanLegacy - ok
22:43:25.0427 3440 [ A5BD69A8812FA79D1A487691DD3FB244 ] NDProxy C:\WINDOWS\system32\drivers\NDProxy.sys
22:43:25.0427 3440 NDProxy - ok
22:43:25.0442 3440 [ 5A072F0B90C29C5233D78BE33EF5ED78 ] Ndu C:\WINDOWS\system32\drivers\Ndu.sys
22:43:25.0442 3440 Ndu - ok
22:43:25.0458 3440 [ A83D67D347A684F10B7D3019C8A6380C ] NetBIOS C:\WINDOWS\system32\DRIVERS\netbios.sys
22:43:25.0458 3440 NetBIOS - ok
22:43:25.0473 3440 [ 0217532E19A748F0E5D569307363D5FD ] NetBT C:\WINDOWS\system32\DRIVERS\netbt.sys
22:43:25.0473 3440 NetBT - ok
22:43:25.0489 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] Netlogon C:\WINDOWS\system32\lsass.exe
22:43:25.0489 3440 Netlogon - ok
22:43:25.0520 3440 [ B7AD851A21FEBA3BA214972627614207 ] Netman C:\WINDOWS\System32\netman.dll
22:43:25.0536 3440 Netman - ok
22:43:25.0567 3440 [ F0F0A372C2EF6358399C4936F91B6131 ] netprofm C:\WINDOWS\System32\netprofmsvc.dll
22:43:25.0583 3440 netprofm - ok
22:43:25.0645 3440 [ 76E90502D9001077DA92F81126D06C9B ] netr28x C:\WINDOWS\system32\DRIVERS\netr28x.sys
22:43:25.0661 3440 netr28x - ok
22:43:25.0708 3440 [ 1092B3190E69E0C5ECBCE90F171DE047 ] NetTcpPortSharing C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
22:43:25.0723 3440 NetTcpPortSharing - ok
22:43:25.0755 3440 [ 70414DB660BFBB7BD58FCE8EA4364E1B ] netvsc C:\WINDOWS\system32\DRIVERS\netvsc63.sys
22:43:25.0770 3440 netvsc - ok
22:43:25.0786 3440 [ 3A280F3B3C7A46E29C404ACD46ECBF5E ] NlaSvc C:\WINDOWS\System32\nlasvc.dll
22:43:25.0802 3440 NlaSvc - ok
22:43:25.0864 3440 [ A328A46D87BB92CE4D8A4528E9D84787 ] NMIndexingService C:\Program Files (x86)\Common Files\Ahead\Lib\NMIndexingService.exe
22:43:25.0864 3440 NMIndexingService - ok
22:43:25.0880 3440 [ 8F44A2F57C9F1A19AC9C6288C10FB351 ] Npfs C:\WINDOWS\system32\drivers\Npfs.sys
22:43:25.0880 3440 Npfs - ok
22:43:25.0927 3440 [ CBDB4F0871C88DF930FC0E8588CA67FC ] npsvctrig C:\WINDOWS\System32\drivers\npsvctrig.sys
22:43:25.0927 3440 npsvctrig - ok
22:43:25.0942 3440 [ 6E2271ED0C3E95B8E29F3752B91B9E84 ] nsi C:\WINDOWS\system32\nsisvc.dll
22:43:25.0942 3440 nsi - ok
22:43:25.0958 3440 [ E490B459978CB87779E84C761D22B827 ] nsiproxy C:\WINDOWS\system32\drivers\nsiproxy.sys
22:43:25.0958 3440 nsiproxy - ok
22:43:26.0020 3440 [ 1C80517BE6836A812F6A9B99B8321351 ] Ntfs C:\WINDOWS\system32\drivers\Ntfs.sys
22:43:26.0036 3440 Ntfs - ok
22:43:26.0052 3440 [ EF1B290FC9F0E47CC0B537292BEE5904 ] Null C:\WINDOWS\system32\drivers\Null.sys
22:43:26.0052 3440 Null - ok
22:43:26.0067 3440 [ BC6B5942AFF25EBAF62DE43C3807EDF8 ] nvraid C:\WINDOWS\system32\drivers\nvraid.sys
22:43:26.0067 3440 nvraid - ok
22:43:26.0083 3440 [ 1F43ABFFAC3D6CA356851D517392966E ] nvstor C:\WINDOWS\system32\drivers\nvstor.sys
22:43:26.0083 3440 nvstor - ok
22:43:26.0099 3440 [ 6934A936A7369DFE37B7DBA93F5E5E49 ] nv_agp C:\WINDOWS\system32\drivers\nv_agp.sys
22:43:26.0099 3440 nv_agp - ok
22:43:26.0130 3440 [ E287F157F7A0011D93179C64EF8ADCF2 ] p2pimsvc C:\WINDOWS\system32\pnrpsvc.dll
22:43:26.0145 3440 p2pimsvc - ok
22:43:26.0192 3440 [ 2A57A937BC5B1B2D6AFE6A8C5925F50B ] p2psvc C:\WINDOWS\system32\p2psvc.dll
22:43:26.0192 3440 p2psvc - ok
22:43:26.0208 3440 [ 764B1121867B2D9B31C491668AC72B2B ] Parport C:\WINDOWS\System32\drivers\parport.sys
22:43:26.0208 3440 Parport - ok
22:43:26.0239 3440 [ EF0C1749C9A8CEE9A457473D433CC00F ] partmgr C:\WINDOWS\system32\drivers\partmgr.sys
22:43:26.0239 3440 partmgr - ok
22:43:26.0255 3440 [ 9A5309EF92F39346CFD5A4C2C3D1BFAD ] PcaSvc C:\WINDOWS\System32\pcasvc.dll
22:43:26.0270 3440 PcaSvc - ok
22:43:26.0317 3440 [ 275AFE3FA35E8D78BE97695DF49817C6 ] pci C:\WINDOWS\system32\drivers\pci.sys
22:43:26.0317 3440 pci - ok
22:43:26.0349 3440 [ 346E38FCC6859A727DD28AFAD1F0AFF4 ] pciide C:\WINDOWS\system32\drivers\pciide.sys
22:43:26.0349 3440 pciide - ok
22:43:26.0380 3440 [ 4D3BDCC1C7B40C9D7B6AD990E6DEC397 ] pcmcia C:\WINDOWS\system32\drivers\pcmcia.sys
22:43:26.0380 3440 pcmcia - ok
22:43:26.0395 3440 [ BF28771D1436C88BE1D297D3098B0F7D ] pcw C:\WINDOWS\system32\drivers\pcw.sys
22:43:26.0411 3440 pcw - ok
22:43:26.0442 3440 [ B9D968D8E2B0F9C6301CEB39CFC9B9E4 ] pdc C:\WINDOWS\system32\drivers\pdc.sys
22:43:26.0442 3440 pdc - ok
22:43:26.0489 3440 [ 0ECEE590F2E2EF969FB74A6FC583A1E6 ] PEAUTH C:\WINDOWS\system32\drivers\peauth.sys
22:43:26.0505 3440 PEAUTH - ok
22:43:26.0583 3440 [ 8E3C640FFF5A963F570233AE99C0FFF3 ] PerfHost C:\WINDOWS\SysWow64\perfhost.exe
22:43:26.0583 3440 PerfHost - ok
22:43:26.0645 3440 [ 928061178CD9856CA6B67FFFCE6BA766 ] pla C:\WINDOWS\system32\pla.dll
22:43:26.0692 3440 pla - ok
22:43:26.0724 3440 [ BC6849C62DB407573C6AD8CB1A4D2628 ] PlugPlay C:\WINDOWS\system32\umpnpmgr.dll
22:43:26.0724 3440 PlugPlay - ok
22:43:26.0755 3440 [ 045EB4F260606A03BE340D09DEAF3BA4 ] PNRPAutoReg C:\WINDOWS\system32\pnrpauto.dll
22:43:26.0755 3440 PNRPAutoReg - ok
22:43:26.0786 3440 [ E287F157F7A0011D93179C64EF8ADCF2 ] PNRPsvc C:\WINDOWS\system32\pnrpsvc.dll
22:43:26.0786 3440 PNRPsvc - ok
22:43:26.0833 3440 [ C16097D77A232A288D65F299E2E01105 ] PolicyAgent C:\WINDOWS\System32\ipsecsvc.dll
22:43:26.0833 3440 PolicyAgent - ok
22:43:26.0864 3440 [ 00E08B30E7F7C13ECE2CDF4F46A77311 ] Power C:\WINDOWS\system32\umpo.dll
22:43:26.0864 3440 Power - ok
22:43:26.0895 3440 [ E075CC071022BD4E9BE7C024717C0E0A ] PptpMiniport C:\WINDOWS\system32\DRIVERS\raspptp.sys
22:43:26.0911 3440 PptpMiniport - ok
22:43:27.0036 3440 [ B7DB57A000D46D4DE75BC0C563E58072 ] PrintNotify C:\Windows\system32\spool\drivers\x64\3\PrintConfig.dll
22:43:27.0099 3440 PrintNotify - ok
22:43:27.0130 3440 [ ECD373F9571C745894367CC2635EA44F ] Processor C:\WINDOWS\System32\drivers\processr.sys
22:43:27.0130 3440 Processor - ok
22:43:27.0161 3440 [ B2A890D96C05E33FDD2BF3F3D4D0DF92 ] ProfSvc C:\WINDOWS\system32\profsvc.dll
22:43:27.0161 3440 ProfSvc - ok
22:43:27.0208 3440 [ 8528BB05E4D4E25945F78B00B2555FB7 ] Psched C:\WINDOWS\system32\DRIVERS\pacer.sys
22:43:27.0208 3440 Psched - ok
22:43:27.0239 3440 [ AF90BB44C99D6820BE52C9BBAA523283 ] QWAVE C:\WINDOWS\system32\qwave.dll
22:43:27.0239 3440 QWAVE - ok
22:43:27.0255 3440 [ 3FB466684609A4329858CF2EBD62E0FD ] QWAVEdrv C:\WINDOWS\system32\drivers\qwavedrv.sys
22:43:27.0255 3440 QWAVEdrv - ok
22:43:27.0302 3440 [ 2C56F0EE27E4EF70CA4B4983D3638905 ] RasAcd C:\WINDOWS\system32\DRIVERS\rasacd.sys
22:43:27.0302 3440 RasAcd - ok
22:43:27.0317 3440 [ 55FE43112F61836D0581D615C72AA113 ] RasAgileVpn C:\WINDOWS\system32\DRIVERS\AgileVpn.sys
22:43:27.0317 3440 RasAgileVpn - ok
22:43:27.0364 3440 [ 5F061AC45266841A2860C1858ED863B8 ] RasAuto C:\WINDOWS\System32\rasauto.dll
22:43:27.0364 3440 RasAuto - ok
22:43:27.0380 3440 [ BBB6272B7F46C4640A8CDB8A70C3450F ] Rasl2tp C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
22:43:27.0380 3440 Rasl2tp - ok
22:43:27.0427 3440 [ 5C7B86EE33505E36026AFAAB62DA6364 ] RasMan C:\WINDOWS\System32\rasmans.dll
22:43:27.0442 3440 RasMan - ok
22:43:27.0458 3440 [ 5247F308C4103CDC4FE12AE1D235800A ] RasPppoe C:\WINDOWS\system32\DRIVERS\raspppoe.sys
22:43:27.0458 3440 RasPppoe - ok
22:43:27.0474 3440 [ 2B0F1677CDD08967005F34488559BC6F ] RasSstp C:\WINDOWS\system32\DRIVERS\rassstp.sys
22:43:27.0474 3440 RasSstp - ok
22:43:27.0505 3440 [ A1A5E79C0D1352AFDC08328A623DA051 ] rdbss C:\WINDOWS\system32\DRIVERS\rdbss.sys
22:43:27.0520 3440 rdbss - ok
22:43:27.0536 3440 [ 6B21EBF892CD8CACB71669B35AB5DE32 ] rdpbus C:\WINDOWS\System32\drivers\rdpbus.sys
22:43:27.0536 3440 rdpbus - ok
22:43:27.0552 3440 [ 680C1DAE268B6FB67FA21B389A8B79EF ] RDPDR C:\WINDOWS\system32\drivers\rdpdr.sys
22:43:27.0552 3440 RDPDR - ok
22:43:27.0599 3440 [ 858776908AF838E3790F3261B799CDA6 ] RdpVideoMiniport C:\WINDOWS\system32\drivers\rdpvideominiport.sys
22:43:27.0599 3440 RdpVideoMiniport - ok
22:43:27.0630 3440 [ A26AEC49F318FEE141DDDB2C5F99B3E6 ] rdyboost C:\WINDOWS\system32\drivers\rdyboost.sys
22:43:27.0630 3440 rdyboost - ok
22:43:27.0692 3440 [ E515A287C8FAE901EB8FB42F168E14F2 ] ReFS C:\WINDOWS\system32\drivers\ReFS.sys
22:43:27.0692 3440 ReFS - ok
22:43:27.0724 3440 [ BFFB40FBE6D2C3469F8D06EE5E4934AB ] RemoteAccess C:\WINDOWS\System32\mprdim.dll
22:43:27.0739 3440 RemoteAccess - ok
22:43:27.0770 3440 [ 4DCCABE03D06955ED61BABBD8EF9F30F ] RemoteRegistry C:\WINDOWS\system32\regsvc.dll
22:43:27.0770 3440 RemoteRegistry - ok
22:43:27.0802 3440 [ 0527EF6E23B9FAB37DDCBC479C6CFA28 ] RFCOMM C:\WINDOWS\System32\drivers\rfcomm.sys
22:43:27.0802 3440 RFCOMM - ok
22:43:27.0849 3440 [ D894CBD7DA753C881EE8D5E33B583225 ] RpcEptMapper C:\WINDOWS\System32\RpcEpMap.dll
22:43:27.0849 3440 RpcEptMapper - ok
22:43:27.0895 3440 [ 5CAE8F47B31D5CFC322B5B898C19E0FE ] RpcLocator C:\WINDOWS\system32\locator.exe
22:43:27.0895 3440 RpcLocator - ok
22:43:27.0927 3440 [ 81979817943D830BF24571B7C1B28A1A ] RpcSs C:\WINDOWS\system32\rpcss.dll
22:43:27.0942 3440 RpcSs - ok
22:43:27.0989 3440 [ D38250F459BF60D6F4B69B79DCD948CC ] RSP2STOR C:\WINDOWS\system32\DRIVERS\RtsP2Stor.sys
22:43:27.0989 3440 RSP2STOR - ok
22:43:28.0036 3440 [ 2D05A5508F4685412F2B89E8C2189ABC ] rspndr C:\WINDOWS\system32\DRIVERS\rspndr.sys
22:43:28.0036 3440 rspndr - ok
22:43:28.0067 3440 [ 3B7A94926B52D171C5B515EDECC2118E ] rtbth C:\WINDOWS\System32\drivers\rtbth.sys
22:43:28.0083 3440 rtbth - ok
22:43:28.0114 3440 [ 34DA0D14F5C3F1883A331AFB975AB434 ] RTL8168 C:\WINDOWS\system32\DRIVERS\Rt630x64.sys
22:43:28.0114 3440 RTL8168 - ok
22:43:28.0130 3440 [ 1A063730F221B2746FF00457AE17E4F0 ] s3cap C:\WINDOWS\System32\drivers\vms3cap.sys
22:43:28.0130 3440 s3cap - ok
22:43:28.0177 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] SamSs C:\WINDOWS\system32\lsass.exe
22:43:28.0177 3440 SamSs - ok
22:43:28.0224 3440 [ C624A1B32211C3166EDB3F4AB02A30B7 ] sbp2port C:\WINDOWS\system32\drivers\sbp2port.sys
22:43:28.0224 3440 sbp2port - ok
22:43:28.0270 3440 [ 47C497FA4DDEA908633CAA60CEBE6805 ] SCardSvr C:\WINDOWS\System32\SCardSvr.dll
22:43:28.0270 3440 SCardSvr - ok
22:43:28.0302 3440 [ E76C4E98302AE39CC6FA5D20FC8B5438 ] ScDeviceEnum C:\WINDOWS\System32\ScDeviceEnum.dll
22:43:28.0302 3440 ScDeviceEnum - ok
22:43:28.0349 3440 [ ABD0237B15DBD2B4695F4B7D734A58F7 ] scfilter C:\WINDOWS\system32\DRIVERS\scfilter.sys
22:43:28.0349 3440 scfilter - ok
22:43:28.0380 3440 [ A95838FFFAEAA7500263D491575F7E0C ] Schedule C:\WINDOWS\system32\schedsvc.dll
22:43:28.0427 3440 Schedule - ok
22:43:28.0474 3440 [ AB285CE3431FF3D2ACE669245874C1C7 ] SCPolicySvc C:\WINDOWS\System32\certprop.dll
22:43:28.0474 3440 SCPolicySvc - ok
22:43:28.0505 3440 [ FDEC5799BA499D18AFA3A540538866E7 ] sdbus C:\WINDOWS\System32\drivers\sdbus.sys
22:43:28.0505 3440 sdbus - ok
22:43:28.0552 3440 [ 0B1E929D11A8E358106955603FAC65E8 ] sdstor C:\WINDOWS\System32\drivers\sdstor.sys
22:43:28.0552 3440 sdstor - ok
22:43:28.0567 3440 [ 3EA8A16169C26AFBEB544E0E48421186 ] secdrv C:\WINDOWS\system32\drivers\secdrv.sys
22:43:28.0567 3440 secdrv - ok
22:43:28.0614 3440 [ C49009F897BA4F2F4F31043663AA1485 ] seclogon C:\WINDOWS\system32\seclogon.dll
22:43:28.0614 3440 seclogon - ok
22:43:28.0630 3440 [ A88882E64BDC1D8E8D6E727B71CCCC53 ] SENS C:\WINDOWS\System32\sens.dll
22:43:28.0630 3440 SENS - ok
22:43:28.0646 3440 [ E66A7C8CE7ED22DED6DF1CA479FB4790 ] SensrSvc C:\WINDOWS\system32\sensrsvc.dll
22:43:28.0661 3440 SensrSvc - ok
22:43:28.0708 3440 [ DB2FF24CE0BDD15FE75870AFE312BA89 ] SerCx C:\WINDOWS\system32\drivers\SerCx.sys
22:43:28.0708 3440 SerCx - ok
22:43:28.0739 3440 [ 0044B31F93946D5D41982314381FE431 ] SerCx2 C:\WINDOWS\system32\drivers\SerCx2.sys
22:43:28.0739 3440 SerCx2 - ok
22:43:28.0755 3440 [ 3CD600C089C1251BEEB4CD4CD5164F9E ] Serenum C:\WINDOWS\System32\drivers\serenum.sys
22:43:28.0771 3440 Serenum - ok
22:43:28.0771 3440 [ D864381BC9C725FAB01D94C060660166 ] Serial C:\WINDOWS\System32\drivers\serial.sys
22:43:28.0771 3440 Serial - ok
22:43:28.0786 3440 [ 0BD2B65DCE756FDE95A2E5CCCBF7705D ] sermouse C:\WINDOWS\System32\drivers\sermouse.sys
22:43:28.0802 3440 sermouse - ok
22:43:28.0833 3440 [ D5C3776CBD8BC307DCCA3FD4CE667A37 ] SessionEnv C:\WINDOWS\system32\sessenv.dll
22:43:28.0849 3440 SessionEnv - ok
22:43:28.0864 3440 [ 472B7A5AC181C050888DB454663DD764 ] sfloppy C:\WINDOWS\System32\drivers\sfloppy.sys
22:43:28.0864 3440 sfloppy - ok
22:43:28.0911 3440 [ F4414F57DF2CECB8FC969AA43A6B0D50 ] SharedAccess C:\WINDOWS\System32\ipnathlp.dll
22:43:28.0911 3440 SharedAccess - ok
22:43:28.0989 3440 [ 0D190D8B4B20446BE6299AC734DFADF1 ] ShellHWDetection C:\WINDOWS\System32\shsvcs.dll
22:43:28.0989 3440 ShellHWDetection - ok
22:43:29.0005 3440 [ 2F518D13DD6F3053837FE606F1A2EA1F ] SiSRaid2 C:\WINDOWS\system32\drivers\SiSRaid2.sys
22:43:29.0021 3440 SiSRaid2 - ok
22:43:29.0036 3440 [ 1AC9A200A9C49C4508F04AAFFCA34A3F ] SiSRaid4 C:\WINDOWS\system32\drivers\sisraid4.sys
22:43:29.0036 3440 SiSRaid4 - ok
22:43:29.0067 3440 [ AF5CC3F9B88F140D78FC967ABF0F4EC7 ] SmbDrv C:\WINDOWS\System32\drivers\Smb_driver_AMDASF.sys
22:43:29.0067 3440 SmbDrv - ok
22:43:29.0099 3440 [ 410F4660C8472873818A288EBBE1FC8A ] SmbDrvI C:\WINDOWS\system32\DRIVERS\Smb_driver_Intel.sys
22:43:29.0114 3440 SmbDrvI - ok
22:43:29.0161 3440 [ 587ACA15210D1B01FBF272E07A08F91A ] smphost C:\WINDOWS\System32\smphost.dll
22:43:29.0161 3440 smphost - ok
22:43:29.0208 3440 [ 49EEB92DE930B8566EF615D600781DB4 ] SNMPTRAP C:\WINDOWS\System32\snmptrap.exe
22:43:29.0208 3440 SNMPTRAP - ok
22:43:29.0271 3440 [ 87765EF43C33BE342F4ACB0E3FBF89A6 ] spaceport C:\WINDOWS\system32\drivers\spaceport.sys
22:43:29.0271 3440 spaceport - ok
22:43:29.0302 3440 [ F337BE11071818FC3F5DC2940B6BDE34 ] SpbCx C:\WINDOWS\system32\drivers\SpbCx.sys
22:43:29.0302 3440 SpbCx - ok
22:43:29.0333 3440 [ FE0CB40F36D3FCDD3A1B312EF72C38D5 ] Spooler C:\WINDOWS\System32\spoolsv.exe
22:43:29.0333 3440 Spooler - ok
22:43:29.0474 3440 [ C993A0B97BECD3AAF5158E3869878465 ] sppsvc C:\WINDOWS\system32\sppsvc.exe
22:43:29.0521 3440 sppsvc - ok
22:43:29.0552 3440 [ 2B78788A1485F9B99A578A299DF42C02 ] srv C:\WINDOWS\system32\DRIVERS\srv.sys
22:43:29.0567 3440 srv - ok
22:43:29.0599 3440 [ E62EAEF0BAC9DD61BF22D4A7F2F18571 ] srv2 C:\WINDOWS\system32\DRIVERS\srv2.sys
22:43:29.0599 3440 srv2 - ok
22:43:29.0614 3440 [ 466BDC0006103F2547D308DD3CD64398 ] srvnet C:\WINDOWS\system32\DRIVERS\srvnet.sys
22:43:29.0614 3440 srvnet - ok
22:43:29.0646 3440 [ BB9ED3EDD8E85008215A7250D325A72E ] SSDPSRV C:\WINDOWS\System32\ssdpsrv.dll
22:43:29.0661 3440 SSDPSRV - ok
22:43:29.0708 3440 [ 3911418AFDE10EA6823B7799E4815524 ] SstpSvc C:\WINDOWS\system32\sstpsvc.dll
22:43:29.0724 3440 SstpSvc - ok
22:43:29.0755 3440 [ 366DEA74BBA65B362BCCFC6FC2ADFD8B ] stexstor C:\WINDOWS\system32\drivers\stexstor.sys
22:43:29.0755 3440 stexstor - ok
22:43:29.0817 3440 [ D638904FE86A5FE542A1BA13A9D68E5C ] stisvc C:\WINDOWS\System32\wiaservc.dll
22:43:29.0833 3440 stisvc - ok
22:43:29.0849 3440 [ 0ED2E318ABB68C1A35A8B8038BDB4C90 ] storahci C:\WINDOWS\system32\drivers\storahci.sys
22:43:29.0849 3440 storahci - ok
22:43:29.0880 3440 [ 7A08CEE1535F5A448215634C5EA74E50 ] storflt C:\WINDOWS\system32\DRIVERS\vmstorfl.sys
22:43:29.0880 3440 storflt - ok
22:43:29.0896 3440 [ 6B06E2D11E604BE2B1A406C4CB3B90DE ] stornvme C:\WINDOWS\system32\drivers\stornvme.sys
22:43:29.0911 3440 stornvme - ok
22:43:29.0942 3440 [ 3118058E3D07021A55324A943C6D722B ] StorSvc C:\WINDOWS\system32\storsvc.dll
22:43:29.0942 3440 StorSvc - ok
22:43:29.0958 3440 [ 548759755BC73DAD663250239D7E0B9F ] storvsc C:\WINDOWS\system32\drivers\storvsc.sys
22:43:29.0958 3440 storvsc - ok
22:43:30.0005 3440 [ D8E1AE075AB3E8AD56F69C44AA978596 ] svsvc C:\WINDOWS\system32\svsvc.dll
22:43:30.0005 3440 svsvc - ok
22:43:30.0021 3440 [ 84E0F5D41C138C5CC975137A2A98F6D3 ] swenum C:\WINDOWS\System32\drivers\swenum.sys
22:43:30.0021 3440 swenum - ok
22:43:30.0067 3440 [ E3C92D60F6AD7763961D1E7628002844 ] swprv C:\WINDOWS\System32\swprv.dll
22:43:30.0083 3440 swprv - ok
22:43:30.0130 3440 [ 0F34FE968C91D02CE30D76C257F2BDA0 ] SynTP C:\WINDOWS\system32\DRIVERS\SynTP.sys
22:43:30.0130 3440 SynTP - ok
22:43:30.0177 3440 [ 3DA26652B12E9AB43FD04976AC6DFD33 ] SysMain C:\WINDOWS\system32\sysmain.dll
22:43:30.0192 3440 SysMain - ok
22:43:30.0224 3440 [ D65B1C952AEB864C2BAC7A770B17ECCE ] SystemEventsBroker C:\WINDOWS\System32\SystemEventsBrokerServer.dll
22:43:30.0224 3440 SystemEventsBroker - ok
22:43:30.0271 3440 [ BA6DD39266A5E15515C8C14DA2DA3E5C ] TabletInputService C:\WINDOWS\System32\TabSvc.dll
22:43:30.0286 3440 TabletInputService - ok
22:43:30.0302 3440 [ B517410F157693043DACA21B19B258A6 ] TapiSrv C:\WINDOWS\System32\tapisrv.dll
22:43:30.0317 3440 TapiSrv - ok
22:43:30.0380 3440 [ FEEFE783D87C9063CDAC6DBDCF95F533 ] Tcpip C:\WINDOWS\system32\drivers\tcpip.sys
22:43:30.0396 3440 Tcpip - ok
22:43:30.0458 3440 [ FEEFE783D87C9063CDAC6DBDCF95F533 ] TCPIP6 C:\WINDOWS\system32\DRIVERS\tcpip.sys
22:43:30.0474 3440 TCPIP6 - ok
22:43:30.0489 3440 [ 41CF802064F72E55F50CA0A221FD36D4 ] tcpipreg C:\WINDOWS\system32\drivers\tcpipreg.sys
22:43:30.0505 3440 tcpipreg - ok
22:43:30.0536 3440 [ FFF28F9F6823EB1756C60F1649560BBF ] tdx C:\WINDOWS\system32\DRIVERS\tdx.sys
22:43:30.0536 3440 tdx - ok
22:43:30.0583 3440 [ 232D185D2337F141311D0CF1983E1431 ] terminpt C:\WINDOWS\System32\drivers\terminpt.sys
22:43:30.0583 3440 terminpt - ok
22:43:30.0646 3440 [ 2C77831737491F4D684D315B95C62883 ] TermService C:\WINDOWS\System32\termsrv.dll
22:43:30.0661 3440 TermService - ok
22:43:30.0677 3440 [ 05FBE1F7C13E87AF7A414CDF288B1F62 ] Themes C:\WINDOWS\system32\themeservice.dll
22:43:30.0677 3440 Themes - ok
22:43:30.0724 3440 [ FD788C2D96EA91469A3C1D13E80D7473 ] THREADORDER C:\WINDOWS\system32\mmcss.dll
22:43:30.0739 3440 THREADORDER - ok
22:43:30.0739 3440 [ 347A3E49CE18402305B8119A6EC7CFEB ] TimeBroker C:\WINDOWS\System32\TimeBrokerServer.dll
22:43:30.0755 3440 TimeBroker - ok
22:43:30.0771 3440 [ 82F909359600D3603FE852DB7F135626 ] TPM C:\WINDOWS\system32\drivers\tpm.sys
22:43:30.0771 3440 TPM - ok
22:43:30.0786 3440 [ C97E14BB6A196B0554D6EB67D8818175 ] TrkWks C:\WINDOWS\System32\trkwks.dll
22:43:30.0802 3440 TrkWks - ok
22:43:30.0864 3440 [ 887CC44830D3F367CAD17A0CA7CCA5C8 ] TrustedInstaller C:\WINDOWS\servicing\TrustedInstaller.exe
22:43:30.0864 3440 TrustedInstaller - ok
22:43:30.0880 3440 [ BF8F54CA37E9C9D6582C31C5761F8C93 ] TsUsbFlt C:\WINDOWS\system32\drivers\tsusbflt.sys
22:43:30.0896 3440 TsUsbFlt - ok
22:43:30.0927 3440 [ E0088068DCE2EE82897027DDB8E05254 ] TsUsbGD C:\WINDOWS\System32\drivers\TsUsbGD.sys
22:43:30.0927 3440 TsUsbGD - ok
22:43:30.0943 3440 [ C8E0E78B5D284C2FF59BDFFDAF997242 ] tunnel C:\WINDOWS\system32\DRIVERS\tunnel.sys
22:43:30.0943 3440 tunnel - ok
22:43:30.0974 3440 [ F6EEAD052943B5A3104C1405BB856C54 ] uagp35 C:\WINDOWS\system32\drivers\uagp35.sys
22:43:30.0974 3440 uagp35 - ok
22:43:31.0005 3440 [ FE6067B1FD4E63650C667B33D080565B ] UASPStor C:\WINDOWS\System32\drivers\uaspstor.sys
22:43:31.0005 3440 UASPStor - ok
22:43:31.0036 3440 [ B034A41891A36457B994307DFA772293 ] UCX01000 C:\WINDOWS\System32\drivers\ucx01000.sys
22:43:31.0052 3440 UCX01000 - ok
22:43:31.0068 3440 [ 1EC649F112896FAE33250F0B97AC5D0B ] udfs C:\WINDOWS\system32\DRIVERS\udfs.sys
22:43:31.0068 3440 udfs - ok
22:43:31.0083 3440 [ 9578691F297E1B1F519970FE6D47CB21 ] UEFI C:\WINDOWS\System32\drivers\UEFI.sys
22:43:31.0083 3440 UEFI - ok
22:43:31.0130 3440 [ 320878AFECDBBD61BBE98624A6CAAC08 ] UI0Detect C:\WINDOWS\system32\UI0Detect.exe
22:43:31.0130 3440 UI0Detect - ok
22:43:31.0161 3440 [ 5EAB5117DDB24FC4D39E6FFFCF1837B9 ] uliagpkx C:\WINDOWS\system32\drivers\uliagpkx.sys
22:43:31.0161 3440 uliagpkx - ok
22:43:31.0177 3440 [ DA34C39A18E60E7C3FA0630566408034 ] umbus C:\WINDOWS\System32\drivers\umbus.sys
22:43:31.0177 3440 umbus - ok
22:43:31.0255 3440 [ AE8294875E5446E359B1E8035D40C05E ] UmPass C:\WINDOWS\System32\drivers\umpass.sys
22:43:31.0255 3440 UmPass - ok
22:43:31.0302 3440 [ E3DDF7D43E05784FAA5E042605EEE528 ] UmRdpService C:\WINDOWS\System32\umrdp.dll
22:43:31.0318 3440 UmRdpService - ok
22:43:31.0427 3440 [ DBE2E6388379D5CC78099650541E9566 ] UNS C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
22:43:31.0427 3440 UNS - ok
22:43:31.0443 3440 [ 4A2FFDAC45F317E17DF642C7160EB633 ] upnphost C:\WINDOWS\System32\upnphost.dll
22:43:31.0458 3440 upnphost - ok
22:43:31.0489 3440 [ 433ECDE01A52691FA7ACA51C10C09B70 ] usbccgp C:\WINDOWS\System32\drivers\usbccgp.sys
22:43:31.0489 3440 usbccgp - ok
22:43:31.0536 3440 [ B3D6457D841A0CAEF4C52D88621715F2 ] usbcir C:\WINDOWS\System32\drivers\usbcir.sys
22:43:31.0536 3440 usbcir - ok
22:43:31.0583 3440 [ 5477D6E27C7D266EF8C152B9A25ADE5E ] usbehci C:\WINDOWS\System32\drivers\usbehci.sys
22:43:31.0583 3440 usbehci - ok
22:43:31.0599 3440 [ DF56C2C04EFA328D7A66B69007130266 ] usbhub C:\WINDOWS\System32\drivers\usbhub.sys
22:43:31.0614 3440 usbhub - ok
22:43:31.0646 3440 [ CFC52C49BEFE4D70D87FFA900EAB9777 ] USBHUB3 C:\WINDOWS\System32\drivers\UsbHub3.sys
22:43:31.0646 3440 USBHUB3 - ok
22:43:31.0661 3440 [ 3019097FB6C985EF24C058090FF3BDBD ] usbohci C:\WINDOWS\System32\drivers\usbohci.sys
22:43:31.0661 3440 usbohci - ok
22:43:31.0693 3440 [ 4D655E3B684BE9B0F7FFD8A2935C348C ] usbprint C:\WINDOWS\System32\drivers\usbprint.sys
22:43:31.0693 3440 usbprint - ok
22:43:31.0739 3440 [ EA23453240137F6773174E0D93F61A69 ] USBSTOR C:\WINDOWS\System32\drivers\USBSTOR.SYS
22:43:31.0739 3440 USBSTOR - ok
22:43:31.0755 3440 [ BA4FA655E0FC577DB7436FC963932CE4 ] usbuhci C:\WINDOWS\System32\drivers\usbuhci.sys
22:43:31.0755 3440 usbuhci - ok
22:43:31.0771 3440 [ 18F744E8CCEB2670040EBAF7AD77B8C6 ] usbvideo C:\WINDOWS\System32\Drivers\usbvideo.sys
22:43:31.0771 3440 usbvideo - ok
22:43:31.0818 3440 [ 48430B0313FC1CFE3D2400553F1A93CD ] USBXHCI C:\WINDOWS\System32\drivers\USBXHCI.SYS
22:43:31.0818 3440 USBXHCI - ok
22:43:31.0849 3440 [ F6F209DDB94959BA104FC8FC87C53759 ] VaultSvc C:\WINDOWS\system32\lsass.exe
22:43:31.0849 3440 VaultSvc - ok
22:43:31.0880 3440 [ FD911873C0BB6945FA38C16E9A2B58F9 ] VClone C:\WINDOWS\System32\drivers\VClone.sys
22:43:31.0880 3440 VClone - ok
22:43:31.0927 3440 [ FEB26E3B8345A7E8D62F945C4AE86562 ] vdrvroot C:\WINDOWS\system32\drivers\vdrvroot.sys
22:43:31.0927 3440 vdrvroot - ok
22:43:31.0989 3440 [ E3EF58D4123B5AA29C8E19825AF84A5E ] vds C:\WINDOWS\System32\vds.exe
22:43:32.0005 3440 vds - ok
22:43:32.0021 3440 [ A026EDEAA5EECAE0B08E2748B616D4BD ] VerifierExt C:\WINDOWS\system32\drivers\VerifierExt.sys
22:43:32.0021 3440 VerifierExt - ok
22:43:32.0052 3440 [ 52E483A3701A5A61A75A06993720347D ] vhdmp C:\WINDOWS\System32\drivers\vhdmp.sys
22:43:32.0068 3440 vhdmp - ok
22:43:32.0083 3440 [ 06D38968028E9AB19DE9B618C7B6D199 ] viaide C:\WINDOWS\system32\drivers\viaide.sys
22:43:32.0083 3440 viaide - ok
22:43:32.0099 3440 [ C6305BDFC4F7CE51F72BB072C03D4ACE ] vmbus C:\WINDOWS\system32\drivers\vmbus.sys
22:43:32.0099 3440 vmbus - ok
22:43:32.0114 3440 [ DA40BEA0A863CE768C940CA9723BF81F ] VMBusHID C:\WINDOWS\System32\drivers\VMBusHID.sys
22:43:32.0114 3440 VMBusHID - ok
22:43:32.0161 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicguestinterface C:\WINDOWS\System32\ICSvc.dll
22:43:32.0161 3440 vmicguestinterface - ok
22:43:32.0177 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicheartbeat C:\WINDOWS\System32\ICSvc.dll
22:43:32.0177 3440 vmicheartbeat - ok
22:43:32.0193 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmickvpexchange C:\WINDOWS\System32\ICSvc.dll
22:43:32.0208 3440 vmickvpexchange - ok
22:43:32.0208 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicrdv C:\WINDOWS\System32\ICSvc.dll
22:43:32.0224 3440 vmicrdv - ok
22:43:32.0224 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicshutdown C:\WINDOWS\System32\ICSvc.dll
22:43:32.0239 3440 vmicshutdown - ok
22:43:32.0239 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmictimesync C:\WINDOWS\System32\ICSvc.dll
22:43:32.0255 3440 vmictimesync - ok
22:43:32.0255 3440 [ 9067880BBB1C18703DBFF27D731D7ECA ] vmicvss C:\WINDOWS\System32\ICSvc.dll
22:43:32.0271 3440 vmicvss - ok
22:43:32.0286 3440 [ 55D7D963DE85162F1C49721E502F9744 ] volmgr C:\WINDOWS\system32\drivers\volmgr.sys
22:43:32.0286 3440 volmgr - ok
22:43:32.0318 3440 [ CCB9E901F7254BF96D28EB1B0E5329B7 ] volmgrx C:\WINDOWS\system32\drivers\volmgrx.sys
22:43:32.0318 3440 volmgrx - ok
22:43:32.0364 3440 [ 3595FBDF25F8BA6256072D103937D7D6 ] volsnap C:\WINDOWS\system32\drivers\volsnap.sys
22:43:32.0364 3440 volsnap - ok
22:43:32.0396 3440 [ 01355C98B5C3ED1EC446743CDA848FCE ] vpci C:\WINDOWS\System32\drivers\vpci.sys
22:43:32.0396 3440 vpci - ok
22:43:32.0411 3440 [ 4539F45F9F4C9757A86A56C949421E07 ] vsmraid C:\WINDOWS\system32\drivers\vsmraid.sys
22:43:32.0411 3440 vsmraid - ok
22:43:32.0474 3440 [ 4957B27219515B93A508B91068B87BF5 ] VSS C:\WINDOWS\system32\vssvc.exe
22:43:32.0489 3440 VSS - ok
22:43:32.0536 3440 [ 0849B7260F26FE05EA56DED0672E2F4B ] VSTXRAID C:\WINDOWS\system32\drivers\vstxraid.sys
22:43:32.0552 3440 VSTXRAID - ok
22:43:32.0568 3440 [ BE970C369E43B509C1EDA2B8FA7CECB0 ] vwifibus C:\WINDOWS\System32\drivers\vwifibus.sys
22:43:32.0568 3440 vwifibus - ok
22:43:32.0583 3440 [ 6B26AD573CCDD5209DF4397438B76354 ] vwififlt C:\WINDOWS\system32\DRIVERS\vwififlt.sys
22:43:32.0583 3440 vwififlt - ok
22:43:32.0599 3440 [ 0B48E0DFB44EE475F4FD8A8EE599AF30 ] vwifimp C:\WINDOWS\system32\DRIVERS\vwifimp.sys
22:43:32.0599 3440 vwifimp - ok
22:43:32.0630 3440 [ 7599E582CA3A6AAA95A18FFE1172D339 ] W32Time C:\WINDOWS\system32\w32time.dll
22:43:32.0646 3440 W32Time - ok
22:43:32.0724 3440 [ 8E553C859C83784DEC08B10AFC3EAC92 ] w3logsvc C:\WINDOWS\system32\inetsrv\w3logsvc.dll
22:43:32.0724 3440 w3logsvc - ok
22:43:32.0739 3440 [ 0910AB9ED404C1434E2D0376C2AD5D8B ] WacomPen C:\WINDOWS\System32\drivers\wacompen.sys
22:43:32.0739 3440 WacomPen - ok
22:43:32.0755 3440 [ AFCD4054D61BD708B82991348ED1C763 ] Wanarp C:\WINDOWS\system32\DRIVERS\wanarp.sys
22:43:32.0755 3440 Wanarp - ok
22:43:32.0755 3440 [ AFCD4054D61BD708B82991348ED1C763 ] Wanarpv6 C:\WINDOWS\system32\DRIVERS\wanarp.sys
22:43:32.0755 3440 Wanarpv6 - ok
22:43:32.0818 3440 [ 9BAE40BD31E3EE0B0C70BEF167E0A2BC ] WAS C:\WINDOWS\system32\inetsrv\iisw3adm.dll
22:43:32.0833 3440 WAS - ok
22:43:32.0896 3440 [ 61692DB39AD3DF2F29392D68EAA7BB93 ] wbengine C:\WINDOWS\system32\wbengine.exe
22:43:32.0911 3440 wbengine - ok
22:43:32.0958 3440 [ 3BC1D1D56637A32CD91C8AE08E2484AA ] WbioSrvc C:\WINDOWS\System32\wbiosrvc.dll
22:43:32.0958 3440 WbioSrvc - ok
22:43:33.0021 3440 [ A07CFC4B593D15B6BF06813C3B5B33BF ] Wcmsvc C:\WINDOWS\System32\wcmsvc.dll
22:43:33.0021 3440 Wcmsvc - ok
22:43:33.0052 3440 [ D2726823DF7E19F213F4805A9D6D145F ] wcncsvc C:\WINDOWS\System32\wcncsvc.dll
22:43:33.0052 3440 wcncsvc - ok
22:43:33.0068 3440 [ 846C02A8B48CBD921A3D6AB521AA0DC4 ] WcsPlugInService C:\WINDOWS\System32\WcsPlugInService.dll
22:43:33.0083 3440 WcsPlugInService - ok
22:43:33.0114 3440 [ 241895E8A9C158DF86E12FDD21033A32 ] WdBoot C:\WINDOWS\system32\drivers\WdBoot.sys
22:43:33.0114 3440 WdBoot - ok
22:43:33.0177 3440 [ CB6C63FF8342B467E2EF76E98D5B934D ] Wdf01000 C:\WINDOWS\system32\drivers\Wdf01000.sys
22:43:33.0177 3440 Wdf01000 - ok
22:43:33.0193 3440 [ C52148456E0F6EAD9E903020A79207FC ] WdFilter C:\WINDOWS\system32\drivers\WdFilter.sys
22:43:33.0193 3440 WdFilter - ok
22:43:33.0208 3440 [ 40C67D1A4891120874767F6E6604D6C5 ] WdiServiceHost C:\WINDOWS\system32\wdi.dll
22:43:33.0224 3440 WdiServiceHost - ok
22:43:33.0224 3440 [ 40C67D1A4891120874767F6E6604D6C5 ] WdiSystemHost C:\WINDOWS\system32\wdi.dll
22:43:33.0239 3440 WdiSystemHost - ok
22:43:33.0255 3440 [ 57F22324FAAF92ADF957B281E88F1743 ] WdNisDrv C:\WINDOWS\system32\Drivers\WdNisDrv.sys
22:43:33.0255 3440 WdNisDrv - ok
22:43:33.0286 3440 WdNisSvc - ok
22:43:33.0302 3440 [ 6588A957873326361AB1CAC4E76F8394 ] WebClient C:\WINDOWS\System32\webclnt.dll
22:43:33.0318 3440 WebClient - ok
22:43:33.0333 3440 [ 3274312F263882B51B964329FAF49734 ] Wecsvc C:\WINDOWS\system32\wecsvc.dll
22:43:33.0349 3440 Wecsvc - ok
22:43:33.0364 3440 [ 7CDD84E0023A0C5C230B06A7965EC65E ] WEPHOSTSVC C:\WINDOWS\system32\wephostsvc.dll
22:43:33.0380 3440 WEPHOSTSVC - ok
22:43:33.0411 3440 [ 959534ACF085C137D2D094384EF89C45 ] wercplsupport C:\WINDOWS\System32\wercplsupport.dll
22:43:33.0411 3440 wercplsupport - ok
22:43:33.0458 3440 [ 82BCCF5FBE47AC9E8CBA2020994DFB3F ] WerSvc C:\WINDOWS\System32\WerSvc.dll
22:43:33.0474 3440 WerSvc - ok
22:43:33.0505 3440 [ BFBE1C5F57FE7A885673A1962D5532B7 ] WFPLWFS C:\WINDOWS\system32\DRIVERS\wfplwfs.sys
22:43:33.0505 3440 WFPLWFS - ok
22:43:33.0521 3440 [ E06AFE2F94BA7CFA2FE4FD2A449E60E2 ] WiaRpc C:\WINDOWS\System32\wiarpc.dll
22:43:33.0521 3440 WiaRpc - ok
22:43:33.0552 3440 [ 867BCC69ED9C31C501465EB0E8BA9DFA ] WIMMount C:\WINDOWS\system32\drivers\wimmount.sys
22:43:33.0552 3440 WIMMount - ok
22:43:33.0552 3440 WinDefend - ok
22:43:33.0599 3440 [ DD079EC8F44DCA3A176B345C6ADEFB66 ] WinHttpAutoProxySvc C:\WINDOWS\system32\winhttp.dll
22:43:33.0615 3440 WinHttpAutoProxySvc - ok
22:43:33.0677 3440 [ 9DB490F3E823C5C3C070644B96CB9D59 ] Winmgmt C:\WINDOWS\system32\wbem\WMIsvc.dll
22:43:33.0677 3440 Winmgmt - ok
22:43:33.0740 3440 [ C8D6344BDE2691A196E61C0D3372EAB7 ] WinRM C:\WINDOWS\system32\WsmSvc.dll
22:43:33.0786 3440 WinRM - ok
22:43:33.0833 3440 [ 4F2A80D65AE6F845776E2F06AE6782ED ] WirelessButtonDriver C:\WINDOWS\System32\drivers\WirelessButtonDriver64.sys
22:43:33.0833 3440 WirelessButtonDriver - ok
22:43:33.0880 3440 [ 5A917027826D759CC3238C7D3CEC3438 ] WlanSvc C:\WINDOWS\System32\wlansvc.dll
22:43:33.0911 3440 WlanSvc - ok
22:43:33.0974 3440 [ 5F56C0DE776C7AE43AF749845BFAA1EF ] wlidsvc C:\WINDOWS\system32\wlidsvc.dll
22:43:34.0005 3440 wlidsvc - ok
22:43:34.0021 3440 [ 2834D9D3B4F554A39C72F00EA3F0E128 ] WmiAcpi C:\WINDOWS\System32\drivers\wmiacpi.sys
22:43:34.0021 3440 WmiAcpi - ok
22:43:34.0068 3440 [ 7AFAC828F52D62F304A911EC32F42EEE ] wmiApSrv C:\WINDOWS\system32\wbem\WmiApSrv.exe
22:43:34.0068 3440 wmiApSrv - ok
22:43:34.0099 3440 WMPNetworkSvc - ok
22:43:34.0115 3440 [ 7FC5667DF73D4B04AA457CC3A4180E09 ] Wof C:\WINDOWS\system32\drivers\Wof.sys
22:43:34.0130 3440 Wof - ok
22:43:34.0193 3440 [ 65C65F3BD784158C456E721DDC9F0EA2 ] workfolderssvc C:\WINDOWS\system32\workfolderssvc.dll
22:43:34.0224 3440 workfolderssvc - ok
22:43:34.0255 3440 [ C1F564F324685C088ECAB1933576CF91 ] wpcfltr C:\WINDOWS\system32\DRIVERS\wpcfltr.sys
22:43:34.0255 3440 wpcfltr - ok
22:43:34.0286 3440 [ 4E6A0F60DA7EF050D3D26417CD4D24E9 ] WPCSvc C:\WINDOWS\System32\wpcsvc.dll
22:43:34.0302 3440 WPCSvc - ok
22:43:34.0318 3440 [ D27491CFCE452C154CECFA155AD0EBC8 ] WPDBusEnum C:\WINDOWS\system32\wpdbusenum.dll
22:43:34.0318 3440 WPDBusEnum - ok
22:43:34.0365 3440 [ 9F2904B55F6CECCD1A8D986B5CE2609A ] WpdUpFltr C:\WINDOWS\system32\drivers\WpdUpFltr.sys
22:43:34.0365 3440 WpdUpFltr - ok
22:43:34.0396 3440 [ AE072B0339D0A18E455DC21666CAD572 ] ws2ifsl C:\WINDOWS\system32\drivers\ws2ifsl.sys
22:43:34.0396 3440 ws2ifsl - ok
22:43:34.0443 3440 [ 515583507D3828E827FF6352C9ACCEFA ] wscsvc C:\WINDOWS\System32\wscsvc.dll
22:43:34.0443 3440 wscsvc - ok
22:43:34.0458 3440 WSearch - ok
22:43:34.0552 3440 [ 95B6670E6933E1DEE19686C55BE709A0 ] WSService C:\WINDOWS\System32\WSService.dll
22:43:34.0615 3440 WSService - ok
22:43:34.0708 3440 [ 779FB2F26E4339A4DD3EEF57E4E593FA ] wuauserv C:\WINDOWS\system32\wuaueng.dll
22:43:34.0771 3440 wuauserv - ok
22:43:34.0802 3440 [ 2FEAE33E9B2B56104596E1BA444405A9 ] WudfPf C:\WINDOWS\system32\drivers\WudfPf.sys
22:43:34.0818 3440 WudfPf - ok
22:43:34.0833 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFRd C:\WINDOWS\System32\drivers\WUDFRd.sys
22:43:34.0833 3440 WUDFRd - ok
22:43:34.0833 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFSensorLP C:\WINDOWS\System32\drivers\WUDFRd.sys
22:43:34.0833 3440 WUDFSensorLP - ok
22:43:34.0880 3440 [ BB73CBC65AABC4EA0A5C6A1474A0A743 ] wudfsvc C:\WINDOWS\System32\WUDFSvc.dll
22:43:34.0880 3440 wudfsvc - ok
22:43:34.0896 3440 [ 19240C13F526125554B5370566F21A0A ] WUDFWpdFs C:\WINDOWS\system32\DRIVERS\WUDFRd.sys
22:43:34.0896 3440 WUDFWpdFs - ok
22:43:34.0927 3440 [ 2FA9794CA36147756F3FDFD6CA29B46F ] WwanSvc C:\WINDOWS\System32\wwansvc.dll
22:43:34.0943 3440 WwanSvc - ok
22:43:34.0958 3440 ================ Scan global ===============================
22:43:35.0005 3440 [ C89780A6F58D113C28A96D85D1261DC5 ] C:\WINDOWS\system32\basesrv.dll
22:43:35.0052 3440 [ 00DD4D2ACC2E72155A8AAA82018BEC0D ] C:\WINDOWS\system32\winsrv.dll
22:43:35.0068 3440 [ 9C1833ABD62876856836C5AE55C7CE86 ] C:\WINDOWS\system32\sxssrv.dll
22:43:35.0115 3440 [ B4B610BBCB002EC478C6FD80CF915697 ] C:\WINDOWS\system32\services.exe
22:43:35.0130 3440 [Global] - ok
22:43:35.0130 3440 ================ Scan MBR ==================================
22:43:35.0146 3440 [ 5FB38429D5D77768867C76DCBDB35194 ] \Device\Harddisk0\DR0
22:43:35.0146 3440 \Device\Harddisk0\DR0 - ok
22:43:35.0146 3440 ================ Scan VBR ==================================
22:43:35.0161 3440 [ DBC12FC8277A390F6D15777AA7EA5BBB ] \Device\Harddisk0\DR0\Partition1
22:43:35.0161 3440 \Device\Harddisk0\DR0\Partition1 - ok
22:43:35.0177 3440 [ 936692671A402884DD84ED806920091E ] \Device\Harddisk0\DR0\Partition2
22:43:35.0177 3440 \Device\Harddisk0\DR0\Partition2 - ok
22:43:35.0177 3440 [ E99BCA8C7A1A998A1112698A92004DCF ] \Device\Harddisk0\DR0\Partition3
22:43:35.0177 3440 \Device\Harddisk0\DR0\Partition3 - ok
22:43:35.0208 3440 [ 2343A610B9A75D74875466C4CB402943 ] \Device\Harddisk0\DR0\Partition4
22:43:35.0208 3440 \Device\Harddisk0\DR0\Partition4 - ok
22:43:35.0240 3440 [ 628C65501E57804F7538316BCC45721F ] \Device\Harddisk0\DR0\Partition5
22:43:35.0240 3440 \Device\Harddisk0\DR0\Partition5 - ok
22:43:35.0302 3440 [ 456606893ECD7B449DD4E1008C648C71 ] \Device\Harddisk0\DR0\Partition6
22:43:35.0302 3440 \Device\Harddisk0\DR0\Partition6 - ok
22:43:35.0302 3440 ============================================================
22:43:35.0302 3440 Scan finished
22:43:35.0302 3440 ============================================================
22:43:35.0318 4340 Detected object count: 0
22:43:35.0318 4340 Actual detected object count: 0
22:45:12.0579 5548 Deinitialize success
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43298
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: kontrola logu
Co problémy?
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Kdo je online
Uživatelé prohlížející si toto fórum: Majestic-12 [Bot] a 113 hostů