
Se slozkou qoobox nejak nemuzu nic delat, winrar pise ze nelze precist obsah slozky BackEnv.
nove logy:
- RSIT:
RogueKiller V8.4.3 [Jan 10 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Podpora : http://www.geekstogo.com/forum/files/fi ... guekiller/
Webové stránky : http://tigzy.geekstogo.com/roguekiller.php
: http://tigzyrk.blogspot.com/
Operační systém : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Spuštěno v : Normální režim
Uživatel : nikol.kundratova [Práva správce]
Mód : Kontrola -- Datum : 01/15/2013 17:17:53
¤¤¤ Škodlivé procesy: : 1 ¤¤¤
[SUSP PATH] CrossLoopService.exe -- C:\Users\nikol.kundratova\AppData\Local\CrossLoop\CrossLoopService.exe -> SMAZÁNO [TermProc]
¤¤¤ ¤¤¤ Záznamy Registrů: : 8 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> NALEZENO
[HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> NALEZENO
[HJ] HKLM\[...]\Wow6432Node\System : ConsentPromptBehaviorAdmin (0) -> NALEZENO
[HJ] HKLM\[...]\System : EnableLUA (0) -> NALEZENO
[HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> NALEZENO
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
[ZeroAccess][FOLDER] U : C:\Windows\Installer\{5648413c-eb53-4e91-6c43-0041d6c19826}\U --> NALEZENO
[ZeroAccess][FOLDER] L : C:\Windows\Installer\{5648413c-eb53-4e91-6c43-0041d6c19826}\L --> NALEZENO
¤¤¤ Ovladač : [NENAHRÁNO] ¤¤¤
¤¤¤ Nákaza : ZeroAccess ¤¤¤
¤¤¤ Soubor HOSTS: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts
127.0.0.1 localhost
¤¤¤ Kontrola MBR: ¤¤¤
+++++ PhysicalDrive0: TOSHIBA MK5055GSXN +++++
--- User ---
[MBR] 0c821c6a1fc22330af98450051ce2b68
[BSP] dbfb206885cff68b713a9afd107e6b0e : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 400 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 821248 | Size: 238470 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 489207808 | Size: 238069 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Dokončeno : << RKreport[3]_S_01152013_02d1717.txt >>
RKreport[2]_S_01112013_02d2050.txt ; RKreport[3]_S_01152013_02d1717.txt
- GMER:
GMER 2.0.18444 - http://www.gmer.net
Rootkit scan 2013-01-15 17:31:32
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 TOSHIBA_ rev.GC00 465,76GB
Running: gmer.exe; Driver: C:\Users\NIKOL~1.KUN\AppData\Local\Temp\pwddykog.sys
---- Kernel code sections - GMER 2.0 ----
.text C:\Windows\system32\drivers\USBPORT.SYS!DllUnload fffff88004793d64 12 bytes {MOV RAX, 0xfffffa8006dee2a0; JMP RAX}
---- User code sections - GMER 2.0 ----
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ee1401 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ee1419 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ee1431 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ee144a 2 bytes [EE, 76]
.text ... * 9
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ee14dd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ee14f5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ee150d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ee1525 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ee153d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ee1555 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ee156d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ee1585 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ee159d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ee15b5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ee15cd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ee16b2 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe[1504] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ee16bd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ee1401 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ee1419 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ee1431 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ee144a 2 bytes [EE, 76]
.text ... * 9
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ee14dd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ee14f5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ee150d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ee1525 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ee153d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ee1555 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ee156d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ee1585 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ee159d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ee15b5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ee15cd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ee16b2 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\avgfws9.exe[14636] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ee16bd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ee1401 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ee1419 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ee1431 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ee144a 2 bytes [EE, 76]
.text ... * 9
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ee14dd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ee14f5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ee150d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ee1525 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ee153d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ee1555 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ee156d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ee1585 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ee159d 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ee15b5 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ee15cd 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ee16b2 2 bytes [EE, 76]
.text C:\Program Files (x86)\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe[3632] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ee16bd 2 bytes [EE, 76]
.text C:\Program Files (x86)\Mozilla Thunderbird\thunderbird.exe[3932] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000076f4c45a 5 bytes JMP 00000001012b12f1
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 0000000076f2f991 7 bytes {MOV EDX, 0x661628; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 0000000076f2fbd5 7 bytes {MOV EDX, 0x661668; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 0000000076f2fc05 7 bytes {MOV EDX, 0x6615a8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 0000000076f2fc1d 7 bytes {MOV EDX, 0x661528; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 0000000076f2fc35 7 bytes {MOV EDX, 0x661728; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 0000000076f2fc65 7 bytes {MOV EDX, 0x661768; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 0000000076f2fce5 7 bytes {MOV EDX, 0x6616e8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 0000000076f2fcfd 7 bytes {MOV EDX, 0x6616a8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 0000000076f2fd49 7 bytes {MOV EDX, 0x661468; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 0000000076f2fe41 7 bytes {MOV EDX, 0x6614a8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 0000000076f30099 7 bytes {MOV EDX, 0x661428; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 0000000076f310a5 7 bytes {MOV EDX, 0x6615e8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 0000000076f3111d 7 bytes {MOV EDX, 0x661568; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000076f31321 7 bytes {MOV EDX, 0x6614e8; JMP RDX}
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ee1401 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ee1419 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ee1431 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ee144a 2 bytes [EE, 76]
.text ... * 9
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ee14dd 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ee14f5 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ee150d 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ee1525 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ee153d 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ee1555 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ee156d 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ee1585 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ee159d 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ee15b5 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ee15cd 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ee16b2 2 bytes [EE, 76]
.text C:\Users\nikol.kundratova\AppData\Local\Google\Chrome\Application\chrome.exe[4812] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ee16bd 2 bytes [EE, 76]
---- Devices - GMER 2.0 ----
Device \Driver\aw61db9g \Device\Scsi\aw61db9g1Port2Path0Target0Lun0
Device \Driver\aw61db9g \Device\Scsi\aw61db9g1
Device \FileSystem\Ntfs \Ntfs
Device \FileSystem\fastfat \Fat
Device \Driver\usbehci \Device\USBPDO-1 ws\system32\drivers\kbdclass.sys
Device \Driver\vmlitestor \Device\RaidPort0 ws\system32\drivers\kbdclass.sys
Device \Driver\cdrom \Device\CdRom0 ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBT_Tcpip_{3AFEC9E3-0BC7-484D-A597-BAA66A2DFC52} ws\system32\drivers\kbdclass.sys
Device \Driver\cdrom \Device\CdRom1 ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBT_Tcpip_{29826BF0-0E7B-447B-91D1-050F94F99451} ws\system32\drivers\kbdclass.sys
Device \Driver\usbehci \Device\USBFDO-0 ws\system32\drivers\kbdclass.sys
Device \Driver\usbehci \Device\USBFDO-1 ws\system32\drivers\kbdclass.sys
Device \Driver\volmgr \Device\HarddiskVolume1 ws\system32\drivers\kbdclass.sys
Device \Driver\volmgr \Device\FtControl ws\system32\drivers\kbdclass.sys
Device \Driver\volmgr \Device\HarddiskVolume2 ws\system32\drivers\kbdclass.sys
Device \Driver\volmgr \Device\VolMgrControl ws\system32\drivers\kbdclass.sys
Device \Driver\volmgr \Device\HarddiskVolume3 ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBT_Tcpip_{3B688101-06D6-4E7E-876B-C3E189051211} ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBT_Tcpip_{5854C12F-5D2F-4E7A-A713-6A5775D8A793} ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBt_Wins_Export ws\system32\drivers\kbdclass.sys
Device \Driver\NetBT \Device\NetBT_Tcpip_{6AA20926-F88B-44E7-AE5A-D74B64281C9F} ws\system32\drivers\kbdclass.sys
Device \Driver\usbehci \Device\USBPDO-0
Device \Driver\vmlitestor \Device\ScsiPort1
Device \Driver\aw61db9g \Device\ScsiPort2
---- Modules - GMER 2.0 ----
Module \SystemRoot\System32\Drivers\aw61db9g.SYS fffff88004c00000-fffff88004c45000 (282624 bytes)
---- Threads - GMER 2.0 ----
Thread C:\Windows\System32\spoolsv.exe [1456:1880] 000007fef92d10c8
Thread C:\Windows\System32\spoolsv.exe [1456:1900] 000007fef9296144
Thread C:\Windows\System32\spoolsv.exe [1456:1904] 000007fef9085fd0
Thread C:\Windows\System32\spoolsv.exe [1456:1912] 000007fef9073438
Thread C:\Windows\System32\spoolsv.exe [1456:1916] 000007fef90863ec
Thread C:\Windows\System32\spoolsv.exe [1456:1936] 000007fef9645e5c
Thread C:\Windows\System32\spoolsv.exe [1456:1940] 000007fef9a55074
Thread C:\Windows\System32\spoolsv.exe [1456:1088] 000007fef9338760
Thread C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [1256:2176] 000007fefb722a7c
Thread C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [1256:2336] 000007fefba76204
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2204] 000007fefb722a7c
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:348] 0000000010004360
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:532] 0000000010004360
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:1280] 0000000010004360
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2144] 0000000010004360
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2092] 0000000010004360
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2508] 0000000002c81220
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2516] 0000000003c212b0
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2524] 00000000045b12b0
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2548] 00000000045e15f0
Thread C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [1776:2712] 0000000004b34150
Thread C:\Program Files\TOSHIBA\TECO\Teco.exe [2096:2216] 000007fefb722a7c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2976] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2488] 000000006e904d5c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2496] 0000000073bb24e9
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3372] 000000006e904733
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3376] 000000006e905695
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3404] 000000006e906056
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3408] 000000006e908230
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2036] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2020] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2032] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1660] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1644] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2392] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:4004] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3300] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2612] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2620] 000000006c62786a
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2888] 00000000699c78e9
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2464] 000000006991ff70
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1652] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1684] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1804] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1924] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2692] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2332] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2764] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2504] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2780] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2820] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1752] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3296] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3056] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:3472] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1800] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1028] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1120] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1048] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1268] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2480] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:5072] 00000000723432fb
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6332] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:7000] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:7132] 0000000070a862ee
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6800] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6556] 0000000069a62acd
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:7032] 0000000072528066
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6756] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6920] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:4032] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:5036] 000000006991ff70
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:1604] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6960] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6808] 000000006ba74dd0
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:7052] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6688] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:2604] 0000000069bac920
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6848] 000000006b6b3250
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:6680] 000000007312c59c
Thread C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944:7980] 000000007312c59c
Thread C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe [2684:3352] 000000006c62786a
Thread C:\Windows\system32\TODDSrv.exe [4172:4232] 000007fefee4a808
Thread C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe [4244:4284] 000007fefee4a808
Thread C:\Program Files\TOSHIBA\TECO\TecoService.exe [4352:4384] 000007fefee4a808
Thread C:\Program Files (x86)\AVG\AVG9\avgwdsvc.exe [20780:21616] 00000000100529b0
Thread C:\Program Files (x86)\AVG\AVG9\avgwdsvc.exe [20780:19620] 0000000010057f60
Thread C:\Program Files (x86)\AVG\AVG9\avgwdsvc.exe [20780:17292] 0000000010080c10
Thread C:\Program Files (x86)\AVG\AVG9\avgam.exe [3108:19372] 00000000100529b0
Thread C:\Program Files (x86)\AVG\AVG9\avgam.exe [3108:20920] 0000000010057f60
Thread C:\Program Files (x86)\AVG\AVG9\avgam.exe [3108:19484] 0000000010080c10
---- Processes - GMER 2.0 ----
Library ? (*** suspicious ***) @ C:\Windows\system32\csrss.exe [504] 000007fefd030000
Library ? (*** suspicious ***) @ C:\Windows\System32\spoolsv.exe [1456] 000007fefb270000
Library ? (*** suspicious ***) @ C:\Program Files (x86)\Nokia\Nokia Suite\NokiaSuite.exe [2944] 0000000073190000
Library ? (*** suspicious ***) @ C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe [2684] 000000006efe0000
Library ? (*** suspicious ***) @ C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE [4640] 000007fef4ef0000
Library ? (*** suspicious ***) @ C:\Windows\system32\SearchIndexer.exe [5524] 000007fefb3a0000
Library ? (*** suspicious ***) @ C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe [5704] 000007fefe2f0000
Library ? (*** suspicious ***) @ C:\Windows\system32\svchost.exe [6288] 000007fefee30000
Library ? (*** suspicious ***) @ C:\Program Files\Windows Media Player\wmpnetwk.exe [7056] 000007fef3a50000
Library ? (*** suspicious ***) @ [20576] 0000000001300000
Library ? (*** suspicious ***) @ C:\Program Files (x86)\AVG\AVG9\avgwdsvc.exe [20780] 000000006d740000
Library ? (*** suspicious ***) @ C:\Program Files (x86)\AVG\AVG9\avgam.exe [3108] 0000000075ae0000
Library ? (*** suspicious ***) @ C:\Program Files (x86)\Mozilla Thunderbird\thunderbird.exe [3932] 000000006ea00000
---- Registry - GMER 2.0 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\111111111111
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\111111111111@2cd2e762f401 0xC9 0x83 0x67 0x02 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xD4 0xC3 0x97 0x02 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x60 0xC0 0x62 0x86 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files (x86)\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x8F 0xD6 0x3B 0xB1 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x03 0xCE 0x2B 0x14 ...
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\111111111111 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\111111111111@2cd2e762f401 0xC9 0x83 0x67 0x02 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xD4 0xC3 0x97 0x02 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x60 0xC0 0x62 0x86 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files (x86)\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x8F 0xD6 0x3B 0xB1 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x03 0xCE 0x2B 0x14 ...
---- EOF - GMER 2.0 ----
Díky. radek