Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 29. 6. 2015
Čas skenování: 14:38
Protokol: text.txt
Správce: Ano
Verze: 2.1.8.1057
Databáze malwaru: v2015.06.29.01
Databáze rootkitů: v2015.06.26.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Ochrana programu: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: Ladislav
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 335843
Uplynulý čas: 6 min, 40 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Nenalezeny žádné škodlivé položky)
Moduly: 0
(Nenalezeny žádné škodlivé položky)
Klíče registru: 0
(Nenalezeny žádné škodlivé položky)
Hodnoty registru: 0
(Nenalezeny žádné škodlivé položky)
Data registru: 0
(Nenalezeny žádné škodlivé položky)
Složky: 0
(Nenalezeny žádné škodlivé položky)
Soubory: 0
(Nenalezeny žádné škodlivé položky)
Fyzické sektory: 0
(Nenalezeny žádné škodlivé položky)
(end)
Zaseknutí PC při kontrole s RogueKiller Vyřešeno
Re: Zaseknutí PC při kontrole s RogueKiller
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Re: Zaseknutí PC při kontrole s RogueKiller
Trvalo to nějak dlouho
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.2.1 (06.28.2015:2)
OS: Windows 8.1 Pro x64
Ran by Ladislav on po 29. 06. 2015 at 14:51:00,43
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Tasks
~~~ Registry Values
~~~ Registry Keys
~~~ Files
Successfully deleted: [File] C:\ProgramData\1434057927.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1434988801.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1434988805.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1435016984.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1435016986.bdinstall.bin
~~~ Folders
Successfully deleted: [Folder] C:\Program Files (x86)\elex-tech
Successfully deleted: [Folder] C:\Users\Ladislav\AppData\Roaming\elex-tech
~~~ Chrome
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Preferences] - default search provider reset
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:
[]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 29. 06. 2015 at 15:17:19,61
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.2.1 (06.28.2015:2)
OS: Windows 8.1 Pro x64
Ran by Ladislav on po 29. 06. 2015 at 14:51:00,43
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Tasks
~~~ Registry Values
~~~ Registry Keys
~~~ Files
Successfully deleted: [File] C:\ProgramData\1434057927.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1434988801.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1434988805.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1435016984.bdinstall.bin
Successfully deleted: [File] C:\ProgramData\1435016986.bdinstall.bin
~~~ Folders
Successfully deleted: [Folder] C:\Program Files (x86)\elex-tech
Successfully deleted: [Folder] C:\Users\Ladislav\AppData\Roaming\elex-tech
~~~ Chrome
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Preferences] - default search provider reset
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset
[C:\Users\Ladislav\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:
[]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 29. 06. 2015 at 15:17:19,61
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Re: Zaseknutí PC při kontrole s RogueKiller
RogueKiller
RogueKiller V10.8.7.0 (x64) [Jun 29 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno : Normální režim
Uživatel : Ladislav [Práva správce]
Started from : E:\Stažené soubory\RogueKillerX64.exe
Mód : Prohledat -- Datum : 06/29/2015 16:54:29
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 0 ¤¤¤
¤¤¤ Úlohy : 0 ¤¤¤
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 150 (Driver: Nahrán) ¤¤¤
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptEncrypt : Unknown @ 0x74bf3479 (jmp 0xfdae2bad|jmp 0xffffd022|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptExportKey : Unknown @ 0x74bf35a9 (jmp 0xfdb12996|jmp 0xffffcef2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptImportKey : Unknown @ 0x74bf3771 (jmp 0xfdb12b8d|jmp 0xffffcd2a|call 0x1fe)
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SHFS37A120G +++++
--- User ---
[MBR] 5a8d579673748784aa7f4f508e8190c2
[BSP] 395ae82b2179d4793f52dd87faed2bfa : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 718848 | Size: 114121 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: WDC WD5003ABYX-01WERA1 +++++
--- User ---
[MBR] c480e2b408ca468004ca6ed25cb1fe76
[BSP] 8e09b4ba12e1284e23d2637871cdf47b : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB [Unknown Bootstrap | Unknown Bootloader]
User = LL1 ... OK
User = LL2 ... OK
RogueKiller V10.8.7.0 (x64) [Jun 29 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno : Normální režim
Uživatel : Ladislav [Práva správce]
Started from : E:\Stažené soubory\RogueKillerX64.exe
Mód : Prohledat -- Datum : 06/29/2015 16:54:29
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 0 ¤¤¤
¤¤¤ Úlohy : 0 ¤¤¤
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 150 (Driver: Nahrán) ¤¤¤
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtMapViewOfSection : Unknown @ 0x74bf1501 (jmp 0xfd475691|jmp 0xffffef9a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtUnmapViewOfSection : Unknown @ 0x74bf1599 (jmp 0xfd475709|jmp 0xffffef02|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSuspendThread : Unknown @ 0x74bf1f19 (jmp 0xfd474999|jmp 0xffffe582|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetContextThread : Unknown @ 0x74bf1b89 (jmp 0xfd474909|jmp 0xffffe912|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtProtectVirtualMemory : Unknown @ 0x74bf4189 (jmp 0xfd478099|jmp 0xffffc312|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlEqualSid : Unknown @ 0x74bf39d1 (jmp 0xfd49c38c|jmp 0xffffcaca|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueryInformationToken : Unknown @ 0x74bf3939 (jmp 0xfd477b39|jmp 0xffffcb62|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateSection : Unknown @ 0x74bf48a9 (jmp 0xfd478819|jmp 0xffffbbf2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetInformationProcess : Unknown @ 0x74bf29c9 (jmp 0xfd476c19|jmp 0xffffdad2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcessToken : Unknown @ 0x74bf38a1 (jmp 0xfd476bc1|jmp 0xffffcbfa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetSystemInformation : Unknown @ 0x74bf2af9 (jmp 0xfd475699|jmp 0xffffd9a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtSetValueKey : Unknown @ 0x74bf49d9 (jmp 0xfd4787e9|jmp 0xffffbac2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateFile : Unknown @ 0x74bf3051 (jmp 0xfd476f11|jmp 0xffffd44a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtTerminateProcess : Unknown @ 0x74bf2931 (jmp 0xfd476a81|jmp 0xffffdb6a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtDuplicateObject : Unknown @ 0x74bf1d51 (jmp 0xfd475da1|jmp 0xffffe74a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtAdjustPrivilegesToken : Unknown @ 0x74bf2fb9 (jmp 0xfd476fb9|jmp 0xffffd4e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtWriteVirtualMemory : Unknown @ 0x74bf1af1 (jmp 0xfd475b61|jmp 0xffffe9aa|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateMutant : Unknown @ 0x74bf4779 (jmp 0xfd478129|jmp 0xffffbd22|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenProcess : Unknown @ 0x74bf1c21 (jmp 0xfd475dd1|jmp 0xffffe87a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtOpenSection : Unknown @ 0x74bf4811 (jmp 0xfd4788b1|jmp 0xffffbc8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - RtlCreateProcessParametersEx : Unknown @ 0x74bf2769 (jmp 0xfd4ac958|jmp 0xffffdd32|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtCreateThreadEx : Unknown @ 0x74bf17f9 (jmp 0xfd4750f9|jmp 0xffffeca2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtQueueApcThread : Unknown @ 0x74bf1cb9 (jmp 0xfd475c79|jmp 0xffffe7e2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) KERNEL32.DLL - CreateToolhelp32Snapshot : Unknown @ 0x74bf1e81 (jmp 0xfe239e15|jmp 0xffffe61a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageW : Unknown @ 0x74bf3df9 (jmp 0xfd6da9d2|jmp 0xffffc6a2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageA : Unknown @ 0x74bf3c31 (jmp 0xfd6db337|jmp 0xffffc86a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - PostMessageA : Unknown @ 0x74bf3d61 (jmp 0xfd6cd2c7|jmp 0xffffc73a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtVdmControl : Unknown @ 0x74bf3b99 (jmp 0xfd4764f9|jmp 0xffffc902|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - GetMessageW : Unknown @ 0x74bf3cc9 (jmp 0xfd6da856|jmp 0xffffc7d2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWinEventHook : Unknown @ 0x74bf2049 (jmp 0xfd6d0201|jmp 0xffffe452|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) USER32.dll - SetWindowsHookExW : Unknown @ 0x74bf16c9 (jmp 0xfd6d1926|jmp 0xffffedd2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptAcquireContextW : Unknown @ 0x74bf3349 (jmp 0xfdb128b9|jmp 0xffffd152|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptCreateHash : Unknown @ 0x74bf3511 (jmp 0xfdb12a3b|jmp 0xffffcf8a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGetHashParam : Unknown @ 0x74bf3641 (jmp 0xfdb12b49|jmp 0xffffce5a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptGenKey : Unknown @ 0x74bf33e1 (jmp 0xfdaf8c1a|jmp 0xffffd0ba|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ntdll.dll - NtLoadDriver : Unknown @ 0x74bf2a61 (jmp 0xfd475f51|jmp 0xffffda3a|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) WS2_32.dll - WSASend : Unknown @ 0x74bf3f29 (jmp 0xfdb697b3|jmp 0xffffc572|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptEncrypt : Unknown @ 0x74bf3479 (jmp 0xfdae2bad|jmp 0xffffd022|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptExportKey : Unknown @ 0x74bf35a9 (jmp 0xfdb12996|jmp 0xffffcef2|call 0x1fe)
[IAT:Inl(Hook.IEAT)] (chrome.exe) ADVAPI32.dll - CryptImportKey : Unknown @ 0x74bf3771 (jmp 0xfdb12b8d|jmp 0xffffcd2a|call 0x1fe)
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SHFS37A120G +++++
--- User ---
[MBR] 5a8d579673748784aa7f4f508e8190c2
[BSP] 395ae82b2179d4793f52dd87faed2bfa : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 718848 | Size: 114121 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: WDC WD5003ABYX-01WERA1 +++++
--- User ---
[MBR] c480e2b408ca468004ca6ed25cb1fe76
[BSP] 8e09b4ba12e1284e23d2637871cdf47b : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB [Unknown Bootstrap | Unknown Bootloader]
User = LL1 ... OK
User = LL2 ... OK
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
- jerabina
- člen Security týmu
-
Level 6
- Příspěvky: 3647
- Registrován: březen 13
- Bydliště: Litoměřice
- Pohlaví:
- Stav:
Offline
Re: Zaseknutí PC při kontrole s RogueKiller
Vypadá, že se to možná vrací, no uvidíme ..
Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB (kromě myši s klávesnice) nebo externí disky z počítače před spuštěním tohoto programu.
Spusť znovu RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Pak klikni na "Prohledat " ,po jeho skončení:
- V záložkách (Registry , Tasks , Web Browser apod.) vše zatrhni (dej zatržítka)
(musíš dát myší zatržítko do toho čtverečku vlevo od registru ap.)
- Klikni na "Smazat"
- Počkej, dokud Status box nezobrazí " Mazání dokončeno "
- Klikni na "Zpráva " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Vypni antivir
Stáhni
Zoek.exe
a uloz si ho na plochu.
Zavři všechny ostatní programy , okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
- pozor , náběh programu může trvat déle.
Do okna programu vlož skript níže:
klikni na Run Script
Program provede sken , opravu, sken i oprava může trvat i více minut ,je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů , jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.
Udělej nový sken MBAM.
Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB (kromě myši s klávesnice) nebo externí disky z počítače před spuštěním tohoto programu.
Spusť znovu RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Pak klikni na "Prohledat " ,po jeho skončení:
- V záložkách (Registry , Tasks , Web Browser apod.) vše zatrhni (dej zatržítka)
(musíš dát myší zatržítko do toho čtverečku vlevo od registru ap.)
- Klikni na "Smazat"
- Počkej, dokud Status box nezobrazí " Mazání dokončeno "
- Klikni na "Zpráva " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
Vypni antivir
Stáhni
Zoek.exe
a uloz si ho na plochu.
Zavři všechny ostatní programy , okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
- pozor , náběh programu může trvat déle.
Do okna programu vlož skript níže:
Kód: Vybrat vše
autoclean;
emptyclsid;
iedefaults;
FFdefaults;
CHRdefaults;
emptyalltemp;
resethosts;
klikni na Run Script
Program provede sken , opravu, sken i oprava může trvat i více minut ,je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů , jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.
Udělej nový sken MBAM.
Když nevíš jak dál, přichází na řadu prostudovat manuál!
HJT návod
Pokud neodpovídám do vašich témat v sekci HJT když jsem online, tak je to jen proto, že jsem na mobilu kde je studování logů a psaní skriptů nemožné. Neberte to tedy prosím jako ignoraci.
HJT návod
Pokud neodpovídám do vašich témat v sekci HJT když jsem online, tak je to jen proto, že jsem na mobilu kde je studování logů a psaní skriptů nemožné. Neberte to tedy prosím jako ignoraci.
Re: Zaseknutí PC při kontrole s RogueKiller
RogueKiller V10.8.7.0 (x64) [Jun 29 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno : Normální režim
Uživatel : Ladislav [Práva správce]
Started from : E:\Stažené soubory\RogueKillerX64.exe
Mód : Smazat -- Datum : 06/29/2015 17:15:26
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 0 ¤¤¤
¤¤¤ Úlohy : 0 ¤¤¤
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SHFS37A120G +++++
--- User ---
[MBR] 5a8d579673748784aa7f4f508e8190c2
[BSP] 395ae82b2179d4793f52dd87faed2bfa : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 718848 | Size: 114121 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: WDC WD5003ABYX-01WERA1 +++++
--- User ---
[MBR] c480e2b408ca468004ca6ed25cb1fe76
[BSP] 8e09b4ba12e1284e23d2637871cdf47b : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB [Unknown Bootstrap | Unknown Bootloader]
User = LL1 ... OK
User = LL2 ... OK
============================================
RKreport_SCN_06292015_165429.log - RKreport_SCN_06292015_171257.log - RKreport_DEL_06292015_171317.log - RKreport_DEL_06292015_171319.log
RKreport_DEL_06292015_171340.log - RKreport_DEL_06292015_171341.log - RKreport_DEL_06292015_171342.log - RKreport_DEL_06292015_171420.log
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 8.1 (6.3.9200 ) 64 bits version
Spuštěno : Normální režim
Uživatel : Ladislav [Práva správce]
Started from : E:\Stažené soubory\RogueKillerX64.exe
Mód : Smazat -- Datum : 06/29/2015 17:15:26
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 0 ¤¤¤
¤¤¤ Úlohy : 0 ¤¤¤
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SHFS37A120G +++++
--- User ---
[MBR] 5a8d579673748784aa7f4f508e8190c2
[BSP] 395ae82b2179d4793f52dd87faed2bfa : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 718848 | Size: 114121 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: WDC WD5003ABYX-01WERA1 +++++
--- User ---
[MBR] c480e2b408ca468004ca6ed25cb1fe76
[BSP] 8e09b4ba12e1284e23d2637871cdf47b : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB [Unknown Bootstrap | Unknown Bootloader]
User = LL1 ... OK
User = LL2 ... OK
============================================
RKreport_SCN_06292015_165429.log - RKreport_SCN_06292015_171257.log - RKreport_DEL_06292015_171317.log - RKreport_DEL_06292015_171319.log
RKreport_DEL_06292015_171340.log - RKreport_DEL_06292015_171341.log - RKreport_DEL_06292015_171342.log - RKreport_DEL_06292015_171420.log
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Re: Zaseknutí PC při kontrole s RogueKiller
Jak dlouho se má přesně ten Zoek.exe zapínat ? Už je to 10 minut
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Re: Zaseknutí PC při kontrole s RogueKiller
Po 20 minutách pořád nic. Pokračuji tedy dál
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 29. 6. 2015
Čas skenování: 17:52
Protokol: tect.txt
Správce: Ano
Verze: 2.1.8.1057
Databáze malwaru: v2015.06.29.03
Databáze rootkitů: v2015.06.26.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Ochrana programu: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: Ladislav
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 338062
Uplynulý čas: 6 min, 27 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Nenalezeny žádné škodlivé položky)
Moduly: 0
(Nenalezeny žádné škodlivé položky)
Klíče registru: 0
(Nenalezeny žádné škodlivé položky)
Hodnoty registru: 0
(Nenalezeny žádné škodlivé položky)
Data registru: 0
(Nenalezeny žádné škodlivé položky)
Složky: 0
(Nenalezeny žádné škodlivé položky)
Soubory: 0
(Nenalezeny žádné škodlivé položky)
Fyzické sektory: 0
(Nenalezeny žádné škodlivé položky)
(end)
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 29. 6. 2015
Čas skenování: 17:52
Protokol: tect.txt
Správce: Ano
Verze: 2.1.8.1057
Databáze malwaru: v2015.06.29.03
Databáze rootkitů: v2015.06.26.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Ochrana programu: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: Ladislav
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 338062
Uplynulý čas: 6 min, 27 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Nenalezeny žádné škodlivé položky)
Moduly: 0
(Nenalezeny žádné škodlivé položky)
Klíče registru: 0
(Nenalezeny žádné škodlivé položky)
Hodnoty registru: 0
(Nenalezeny žádné škodlivé položky)
Data registru: 0
(Nenalezeny žádné škodlivé položky)
Složky: 0
(Nenalezeny žádné škodlivé položky)
Soubory: 0
(Nenalezeny žádné škodlivé položky)
Fyzické sektory: 0
(Nenalezeny žádné škodlivé položky)
(end)
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
- jaro3
- člen Security týmu
-
Guru Level 15
- Příspěvky: 43298
- Registrován: červen 07
- Bydliště: Jižní Čechy
- Pohlaví:
- Stav:
Offline
Re: Zaseknutí PC při kontrole s RogueKiller
Zkus ho v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra
Re: Zaseknutí PC při kontrole s RogueKiller
Zoek.exe v5.0.0.0 Updated 04-May-2015
Tool run by Ladislav on po 29. 06. 2015 at 18:35:42,60.
Microsoft Windows 8.1 Pro 6.3.9600 x64
Running in: Safe Mode NETWORK Internet Access Detected
Launched: C:\Users\Ladislav\Desktop\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
==== Reset Hosts File ======================
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
==== Empty Folders Check ======================
C:\PROGRA~3\Shared Space deleted successfully
C:\Users\Ladislav\AppData\Roaming\GZero deleted successfully
C:\Users\Ladislav\AppData\Roaming\QuickScan deleted successfully
C:\Users\Ladislav\AppData\Local\PackageStaging deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully
==== Deleting CLSID Registry Keys ======================
==== Deleting CLSID Registry Values ======================
==== Deleting Services ======================
==== Deleting Files \ Folders ======================
C:\PROGRA~3\Package Cache deleted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Search.lnk deleted
==== Chromium Look ======================
==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/?LinkId=69157"
==== All HKCU SearchScopes ======================
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0191A6B0-1154-4C22-9182-23A95BBE92D9} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
==== Reset Google Chrome ======================
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences.bad was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully
==== Empty IE Cache ======================
C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Ladislav\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Ladislav\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
No Java Cache Found
==== C:\zoek_backup content ======================
C:\zoek_backup (files=25 folders=29 28110931 bytes)
==== Empty Temp Folders ======================
C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\Ladislav\AppData\Local\Temp will be emptied at reboot
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\Temp will be emptied at reboot
Tool run by Ladislav on po 29. 06. 2015 at 18:35:42,60.
Microsoft Windows 8.1 Pro 6.3.9600 x64
Running in: Safe Mode NETWORK Internet Access Detected
Launched: C:\Users\Ladislav\Desktop\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
==== Reset Hosts File ======================
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
==== Empty Folders Check ======================
C:\PROGRA~3\Shared Space deleted successfully
C:\Users\Ladislav\AppData\Roaming\GZero deleted successfully
C:\Users\Ladislav\AppData\Roaming\QuickScan deleted successfully
C:\Users\Ladislav\AppData\Local\PackageStaging deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully
==== Deleting CLSID Registry Keys ======================
==== Deleting CLSID Registry Values ======================
==== Deleting Services ======================
==== Deleting Files \ Folders ======================
C:\PROGRA~3\Package Cache deleted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Search.lnk deleted
==== Chromium Look ======================
==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/?LinkId=69157"
==== All HKCU SearchScopes ======================
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0191A6B0-1154-4C22-9182-23A95BBE92D9} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
==== Reset Google Chrome ======================
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences.bad was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully
==== Empty IE Cache ======================
C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Ladislav\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Ladislav\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
C:\Users\Ladislav\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
No Java Cache Found
==== C:\zoek_backup content ======================
C:\zoek_backup (files=25 folders=29 28110931 bytes)
==== Empty Temp Folders ======================
C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\Ladislav\AppData\Local\Temp will be emptied at reboot
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\Temp will be emptied at reboot
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Re: Zaseknutí PC při kontrole s RogueKiller
Log z Malwarebytes Anti-Malware znovu
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 29. 6. 2015
Čas skenování: 19:05
Protokol: LOG ZNOVA.txt
Správce: Ano
Verze: 2.1.8.1057
Databáze malwaru: v2015.06.29.03
Databáze rootkitů: v2015.06.26.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Ochrana programu: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: Ladislav
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 338192
Uplynulý čas: 6 min, 45 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Nenalezeny žádné škodlivé položky)
Moduly: 0
(Nenalezeny žádné škodlivé položky)
Klíče registru: 0
(Nenalezeny žádné škodlivé položky)
Hodnoty registru: 0
(Nenalezeny žádné škodlivé položky)
Data registru: 0
(Nenalezeny žádné škodlivé položky)
Složky: 0
(Nenalezeny žádné škodlivé položky)
Soubory: 0
(Nenalezeny žádné škodlivé položky)
Fyzické sektory: 0
(Nenalezeny žádné škodlivé položky)
(end)
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 29. 6. 2015
Čas skenování: 19:05
Protokol: LOG ZNOVA.txt
Správce: Ano
Verze: 2.1.8.1057
Databáze malwaru: v2015.06.29.03
Databáze rootkitů: v2015.06.26.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Ochrana programu: Vypnuto
OS: Windows 8.1
CPU: x64
Souborový systém: NTFS
Uživatel: Ladislav
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 338192
Uplynulý čas: 6 min, 45 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Nenalezeny žádné škodlivé položky)
Moduly: 0
(Nenalezeny žádné škodlivé položky)
Klíče registru: 0
(Nenalezeny žádné škodlivé položky)
Hodnoty registru: 0
(Nenalezeny žádné škodlivé položky)
Data registru: 0
(Nenalezeny žádné škodlivé položky)
Složky: 0
(Nenalezeny žádné škodlivé položky)
Soubory: 0
(Nenalezeny žádné škodlivé položky)
Fyzické sektory: 0
(Nenalezeny žádné škodlivé položky)
(end)
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
- jerabina
- člen Security týmu
-
Level 6
- Příspěvky: 3647
- Registrován: březen 13
- Bydliště: Litoměřice
- Pohlaví:
- Stav:
Offline
Re: Zaseknutí PC při kontrole s RogueKiller
Super, vypadá, že se to už nevrací.
Vlož sem nový log z HJT + info o problémech.
Vlož sem nový log z HJT + info o problémech.
Když nevíš jak dál, přichází na řadu prostudovat manuál!
HJT návod
Pokud neodpovídám do vašich témat v sekci HJT když jsem online, tak je to jen proto, že jsem na mobilu kde je studování logů a psaní skriptů nemožné. Neberte to tedy prosím jako ignoraci.
HJT návod
Pokud neodpovídám do vašich témat v sekci HJT když jsem online, tak je to jen proto, že jsem na mobilu kde je studování logů a psaní skriptů nemožné. Neberte to tedy prosím jako ignoraci.
Re: Zaseknutí PC při kontrole s RogueKiller
Všechno vypadá v pořádku. Start a odezva Windows je mnohem lepší.
Logfile of Trend Micro HijackThis v2.0.5
Scan saved at 19:50:07, on 29. 6. 2015
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.9600.16384)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\ASUS\AI Suite III\AISuite3.exe
C:\Program Files (x86)\ASUS\AI Suite III\DIP4\DIPAwayMode\DipAwayMode.exe
C:\Program Files (x86)\MSI Afterburner\MSIAfterburner.exe
C:\Program Files (x86)\ASUS\AI Suite III\ASUSMiniBar.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Users\Ladislav\Downloads\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O17 - HKLM\System\CCS\Services\Tcpip\..\{42130A1C-1CB4-4B55-9CB3-54E022BE3913}: NameServer = 156.154.70.25,156.154.71.25
O23 - Service: AMD External Events Utility - Unknown owner - C:\WINDOWS\system32\atiesrxx.exe (file missing)
O23 - Service: AMD FUEL Service - Advanced Micro Devices, Inc. - C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
O23 - Service: ASUS Com Service (asComSvc) - Unknown owner - C:\Program Files (x86)\ASUS\AXSP\1.02.00\atkexComSvc.exe
O23 - Service: ASUS HM Com Service (asHmComSvc) - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AAHM\1.00.22\aaHMSvc.exe
O23 - Service: AsusFanControlService - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AsusFanControlService\1.06.18\AsusFanControlService.exe
O23 - Service: COMODO Internet Security Helper Service (CmdAgent) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
O23 - Service: COMODO Virtual Service Manager (cmdvirth) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdvirth.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Bitdefender Antivirus Free Edition (gzserv) - Bitdefender - C:\Program Files\Bitdefender\Antivirus Free Edition\gzserv.exe
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\WINDOWS\system32\IEEtwCollector.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 5995 bytes
Logfile of Trend Micro HijackThis v2.0.5
Scan saved at 19:50:07, on 29. 6. 2015
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.9600.16384)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\ASUS\AI Suite III\AISuite3.exe
C:\Program Files (x86)\ASUS\AI Suite III\DIP4\DIPAwayMode\DipAwayMode.exe
C:\Program Files (x86)\MSI Afterburner\MSIAfterburner.exe
C:\Program Files (x86)\ASUS\AI Suite III\ASUSMiniBar.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Users\Ladislav\Downloads\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O17 - HKLM\System\CCS\Services\Tcpip\..\{42130A1C-1CB4-4B55-9CB3-54E022BE3913}: NameServer = 156.154.70.25,156.154.71.25
O23 - Service: AMD External Events Utility - Unknown owner - C:\WINDOWS\system32\atiesrxx.exe (file missing)
O23 - Service: AMD FUEL Service - Advanced Micro Devices, Inc. - C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
O23 - Service: ASUS Com Service (asComSvc) - Unknown owner - C:\Program Files (x86)\ASUS\AXSP\1.02.00\atkexComSvc.exe
O23 - Service: ASUS HM Com Service (asHmComSvc) - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AAHM\1.00.22\aaHMSvc.exe
O23 - Service: AsusFanControlService - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AsusFanControlService\1.06.18\AsusFanControlService.exe
O23 - Service: COMODO Internet Security Helper Service (CmdAgent) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
O23 - Service: COMODO Virtual Service Manager (cmdvirth) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdvirth.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Bitdefender Antivirus Free Edition (gzserv) - Bitdefender - C:\Program Files\Bitdefender\Antivirus Free Edition\gzserv.exe
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\WINDOWS\system32\IEEtwCollector.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 5995 bytes
Procesor: I3 6100
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Zakladní deska: ASROCK Z170 PRO4
Chlazení: NOCTUA NH-D15S
SSD: Kingston HyperX Savage SSD 120GB
HDD : 500GB Seagate
GPU: Zatím není.
RAM: Kingston HyperX Fury Black 8GB DDR4
ZROJ: EVGA 430W
CASE : In-Win 805C GOLD, zlatá
Kdo je online
Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 88 hostů