
Odvirování PC, zrychlení počítače, vzdálená pomoc prostřednictvím služby neslape.cz
prosím o kontrolu logu
Moderátor: Moderátoři
Pravidla fóra
Pokud chcete pomoc, vložte log z FRST [návod zde] nebo RSIT [návod zde]
Jednotlivé thready budou po vyřešení uzamčeny. Stejně tak ty, které budou nečinné déle než 14 dní. Vizte Pravidlo o zamykání témat. Děkujeme za pochopení.
!NOVINKA!
Nově lze využívat služby vzdálené pomoci, kdy se k vašemu počítači připojí odborník a bližší informace o problému si od vás získá telefonicky! Více na www.neslape.cz
Pokud chcete pomoc, vložte log z FRST [návod zde] nebo RSIT [návod zde]
Jednotlivé thready budou po vyřešení uzamčeny. Stejně tak ty, které budou nečinné déle než 14 dní. Vizte Pravidlo o zamykání témat. Děkujeme za pochopení.
!NOVINKA!
Nově lze využívat služby vzdálené pomoci, kdy se k vašemu počítači připojí odborník a bližší informace o problému si od vás získá telefonicky! Více na www.neslape.cz
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: ST3160827AS rev.3.42 -> Harddisk1\DR1 -> \Device\00000090
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x87FAA008]<<
1 ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\Harddisk1\DR1[0x8AC5FAB8]
error: Read S požadovaným prostředkem se pracuje.
kernel: MBR read successfully
user & kernel MBR OK
PE file found in sector at 312560640 !
Windows 5.1.2600 Disk: ST3160827AS rev.3.42 -> Harddisk1\DR1 -> \Device\00000090
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x87FAA008]<<
1 ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\Harddisk1\DR1[0x8AC5FAB8]
error: Read S požadovaným prostředkem se pracuje.
kernel: MBR read successfully
user & kernel MBR OK
PE file found in sector at 312560640 !
Nikdy není možné dobře zabezpečit svůj systém .............
Re: prosím o kontrolu logu
Tady je videt uz jen zbytek haveti, ten odstranime pozdeji...jeste poprosim o ty logy z gmeru...
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
zitra zaslu jelikoz jsem pustil gmer a objevila se modrá smrt tak zkusim ve stavu nouze
Nikdy není možné dobře zabezpečit svůj systém .............
Re: prosím o kontrolu logu
Je to mozna ze se objevila, je to tim kam gmer pri seknu "saha"...v nouzaku by to delat nemelo...pripadne pouzijte RR http://viry.cz/forum/viewtopic.php?f=29&t=86010
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
tak jsem provedl sken MBR ve stavu nouze a dopadlo to taky na restart. provedl jsem scan programem ROOTREPEAL ale pokud udelam report vsech soucasti tak se mi to sekne. Udelal jsem tedy jednotlive casti report prilozen
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: 1394BUS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\1394BUS.SYS
Address: 0xF7497000 Size: 57344 File Visible: - Signed: -
Status: -
Name: Aavmker4.SYS
Image Path: C:\WINDOWS\System32\Drivers\Aavmker4.SYS
Address: 0xF778F000 Size: 22144 File Visible: - Signed: -
Status: -
Name: ACPI.sys
Image Path: ACPI.sys
Address: 0xF7358000 Size: 188288 File Visible: - Signed: -
Status: -
Name: ACPI_HAL
Image Path: \Driver\ACPI_HAL
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: afd.sys
Image Path: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xF34E3000 Size: 138496 File Visible: - Signed: -
Status: -
Name: AmdK8.sys
Image Path: C:\WINDOWS\system32\DRIVERS\AmdK8.sys
Address: 0xF7527000 Size: 65536 File Visible: - Signed: -
Status: -
Name: arp1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\arp1394.sys
Address: 0xF6917000 Size: 60800 File Visible: - Signed: -
Status: -
Name: aswFsBlk.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswFsBlk.SYS
Address: 0xB87FC000 Size: 11008 File Visible: - Signed: -
Status: -
Name: aswMon2.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswMon2.SYS
Address: 0xB848B000 Size: 93440 File Visible: - Signed: -
Status: -
Name: aswSP.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswSP.SYS
Address: 0xF33D1000 Size: 158848 File Visible: - Signed: -
Status: -
Name: aswTdi.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswTdi.SYS
Address: 0xF68F7000 Size: 39936 File Visible: - Signed: -
Status: -
Name: atapi.sys
Image Path: atapi.sys
Address: 0xF7310000 Size: 96512 File Visible: - Signed: -
Status: -
Name: ATMFD.DLL
Image Path: C:\WINDOWS\System32\ATMFD.DLL
Address: 0xBFFA0000 Size: 286720 File Visible: - Signed: -
Status: -
Name: audstub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xF7B3A000 Size: 3072 File Visible: - Signed: -
Status: -
Name: AvgArCln.sys
Image Path: C:\WINDOWS\System32\DRIVERS\AvgArCln.sys
Address: 0xF7AE3000 Size: 3968 File Visible: - Signed: -
Status: -
Name: avgarkt.sys
Image Path: avgarkt.sys
Address: 0xF798B000 Size: 5632 File Visible: - Signed: -
Status: -
Name: Beep.SYS
Image Path: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xF79D5000 Size: 4224 File Visible: - Signed: -
Status: -
Name: BOOTVID.dll
Image Path: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF7897000 Size: 12288 File Visible: - Signed: -
Status: -
Name: btaudio.sys
Image Path: C:\WINDOWS\system32\drivers\btaudio.sys
Address: 0xF77E7000 Size: 16640 File Visible: - Signed: -
Status: -
Name: btkrnl.sys
Image Path: btkrnl.sys
Address: 0xF6FC5000 Size: 1245472 File Visible: - Signed: -
Status: -
Name: btport.sys
Image Path: C:\WINDOWS\system32\DRIVERS\btport.sys
Address: 0xF7817000 Size: 28032 File Visible: - Signed: -
Status: -
Name: btwusb.sys
Image Path: C:\WINDOWS\System32\Drivers\btwusb.sys
Address: 0xF68E7000 Size: 50592 File Visible: - Signed: -
Status: -
Name: Cdfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xB83A3000 Size: 63744 File Visible: - Signed: -
Status: -
Name: cdrom.sys
Image Path: C:\WINDOWS\system32\DRIVERS\cdrom.sys
Address: 0xF7567000 Size: 62976 File Visible: - Signed: -
Status: -
Name: CLASSPNP.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xF74E7000 Size: 53248 File Visible: - Signed: -
Status: -
Name: ctac32k.sys
Image Path: C:\WINDOWS\system32\drivers\ctac32k.sys
Address: 0xF3815000 Size: 638976 File Visible: - Signed: -
Status: -
Name: ctaud2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctaud2k.sys
Address: 0xF67C0000 Size: 439296 File Visible: - Signed: -
Status: -
Name: ctoss2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctoss2k.sys
Address: 0xF676A000 Size: 204800 File Visible: - Signed: -
Status: -
Name: ctprxy2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctprxy2k.sys
Address: 0xF77CF000 Size: 32768 File Visible: - Signed: -
Status: -
Name: ctsfm2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctsfm2k.sys
Address: 0xF38B1000 Size: 159744 File Visible: - Signed: -
Status: -
Name: disk.sys
Image Path: disk.sys
Address: 0xF74D7000 Size: 36352 File Visible: - Signed: -
Status: -
Name: drmk.sys
Image Path: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF7587000 Size: 61440 File Visible: - Signed: -
Status: -
Name: dump_nvata.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_nvata.sys
Address: 0xF2A52000 Size: 106496 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79F3000 Size: 8192 File Visible: No Signed: -
Status: -
Name: Dxapi.sys
Image Path: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xF3404000 Size: 12288 File Visible: - Signed: -
Status: -
Name: dxg.sys
Image Path: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBD000000 Size: 73728 File Visible: - Signed: -
Status: -
Name: dxgthk.sys
Image Path: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF7B92000 Size: 4096 File Visible: - Signed: -
Status: -
Name: emupia2k.sys
Image Path: C:\WINDOWS\system32\drivers\emupia2k.sys
Address: 0xF38FC000 Size: 184320 File Visible: - Signed: -
Status: -
Name: Fastfat.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
Address: 0xF2A6C000 Size: 143744 File Visible: - Signed: -
Status: -
Name: Fastfat.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
Address: 0xF2A6C000 Size: 143744 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: Fips.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xF68B7000 Size: 44544 File Visible: - Signed: -
Status: -
Name: fltmgr.sys
Image Path: fltmgr.sys
Address: 0xF72D6000 Size: 129792 File Visible: - Signed: -
Status: -
Name: Fs_Rec.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xF79D3000 Size: 7936 File Visible: - Signed: -
Status: -
Name: ftdisk.sys
Image Path: ftdisk.sys
Address: 0xF7328000 Size: 125184 File Visible: - Signed: -
Status: -
Name: gameenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\gameenum.sys
Address: 0xF6DF2000 Size: 10624 File Visible: - Signed: -
Status: -
Name: giveio.sys
Image Path: giveio.sys
Address: 0xF7A50000 Size: 1664 File Visible: No Signed: -
Status: -
Name: ha10kx2k.sys
Image Path: C:\WINDOWS\system32\drivers\ha10kx2k.sys
Address: 0xF3929000 Size: 1052672 File Visible: - Signed: -
Status: -
Name: hal.dll
Image Path: C:\WINDOWS\system32\hal.dll
Address: 0x806E4000 Size: 134400 File Visible: - Signed: -
Status: -
Name: HIDCLASS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS
Address: 0xF68C7000 Size: 36864 File Visible: - Signed: -
Status: -
Name: HIDPARSE.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS
Address: 0xF783F000 Size: 28672 File Visible: - Signed: -
Status: -
Name: hidusb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\hidusb.sys
Address: 0xF6ED3000 Size: 10368 File Visible: - Signed: -
Status: -
Name: HWiNFO32.SYS
Image Path: C:\Program Files\HWiNFO32\HWiNFO32.SYS
Address: 0xF3A83000 Size: 12544 File Visible: - Signed: -
Status: -
Name: imapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\imapi.sys
Address: 0xF7557000 Size: 42112 File Visible: - Signed: -
Status: -
Name: ip6fw.sys
Image Path: C:\WINDOWS\system32\drivers\ip6fw.sys
Address: 0xF76A7000 Size: 36608 File Visible: - Signed: -
Status: -
Name: ipnat.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xF3590000 Size: 152832 File Visible: - Signed: -
Status: -
Name: ipsec.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xF366F000 Size: 75264 File Visible: - Signed: -
Status: -
Name: irda.sys
Image Path: C:\WINDOWS\system32\DRIVERS\irda.sys
Address: 0xB85BA000 Size: 88192 File Visible: - Signed: -
Status: -
Name: isapnp.sys
Image Path: isapnp.sys
Address: 0xF74A7000 Size: 37248 File Visible: - Signed: -
Status: -
Name: kbdclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xF77AF000 Size: 24576 File Visible: - Signed: -
Status: -
Name: kbdhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdhid.sys
Address: 0xF360A000 Size: 14592 File Visible: - Signed: -
Status: -
Name: KDCOM.DLL
Image Path: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF7987000 Size: 8192 File Visible: - Signed: -
Status: -
Name: kmixer.sys
Image Path: C:\WINDOWS\system32\drivers\kmixer.sys
Address: 0xB76E9000 Size: 172416 File Visible: - Signed: -
Status: -
Name: ks.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ks.sys
Address: 0xF682C000 Size: 143360 File Visible: - Signed: -
Status: -
Name: KSecDD.sys
Image Path: KSecDD.sys
Address: 0xF72AD000 Size: 92928 File Visible: - Signed: -
Status: -
Name: mnmdd.SYS
Image Path: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xF79D7000 Size: 4224 File Visible: - Signed: -
Status: -
Name: mouclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xF77B7000 Size: 23040 File Visible: - Signed: -
Status: -
Name: mouhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouhid.sys
Address: 0xF3A73000 Size: 12160 File Visible: - Signed: -
Status: -
Name: MountMgr.sys
Image Path: MountMgr.sys
Address: 0xF74B7000 Size: 42368 File Visible: - Signed: -
Status: -
Name: mrxdav.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0xB7FE3000 Size: 180608 File Visible: - Signed: -
Status: -
Name: mrxsmb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xF3420000 Size: 455680 File Visible: - Signed: -
Status: -
Name: Msfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xF784F000 Size: 19072 File Visible: - Signed: -
Status: -
Name: msgpc.sys
Image Path: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xF75E7000 Size: 35072 File Visible: - Signed: -
Status: -
Name: mssmbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xF6DDE000 Size: 15488 File Visible: - Signed: -
Status: -
Name: Mup.sys
Image Path: Mup.sys
Address: 0xF70F6000 Size: 105344 File Visible: - Signed: -
Status: -
Name: NDIS.sys
Image Path: NDIS.sys
Address: 0xF71F3000 Size: 182656 File Visible: - Signed: -
Status: -
Name: ndistapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xF6DEA000 Size: 10112 File Visible: - Signed: -
Status: -
Name: ndisuio.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xB87EC000 Size: 14592 File Visible: - Signed: -
Status: -
Name: ndiswan.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xF5C06000 Size: 91520 File Visible: - Signed: -
Status: -
Name: NDProxy.SYS
Image Path: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xF7627000 Size: 40576 File Visible: - Signed: -
Status: -
Name: netbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xF6907000 Size: 34688 File Visible: - Signed: -
Status: -
Name: netbt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xF3505000 Size: 162816 File Visible: - Signed: -
Status: -
Name: nic1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nic1394.sys
Address: 0xF7597000 Size: 61824 File Visible: - Signed: -
Status: -
Name: Npfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xF7857000 Size: 30848 File Visible: - Signed: -
Status: -
Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xF7220000 Size: 574976 File Visible: - Signed: -
Status: -
Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xF7220000 Size: 574976 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: ntkrnlpa.exe
Image Path: C:\WINDOWS\system32\ntkrnlpa.exe
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: Null.SYS
Image Path: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xF7AE2000 Size: 2944 File Visible: - Signed: -
Status: -
Name: nv4_disp.dll
Image Path: C:\WINDOWS\System32\nv4_disp.dll
Address: 0xBD012000 Size: 6344704 File Visible: - Signed: -
Status: -
Name: nv4_mini.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
Address: 0xF5C31000 Size: 10604128 File Visible: - Signed: -
Status: -
Name: nvata.sys
Image Path: nvata.sys
Address: 0xF72F6000 Size: 105344 File Visible: - Signed: -
Status: -
Name: NVENETFD.sys
Image Path: C:\WINDOWS\system32\DRIVERS\NVENETFD.sys
Address: 0xF7647000 Size: 57856 File Visible: - Signed: -
Status: -
Name: nvnetbus.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nvnetbus.sys
Address: 0xF75A7000 Size: 40960 File Visible: - Signed: -
Status: -
Name: NVNRM.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\NVNRM.SYS
Address: 0xF664E000 Size: 1163264 File Visible: - Signed: -
Status: -
Name: ohci1394.sys
Image Path: ohci1394.sys
Address: 0xF7487000 Size: 61696 File Visible: - Signed: -
Status: -
Name: parport.sys
Image Path: C:\WINDOWS\system32\DRIVERS\parport.sys
Address: 0xF6873000 Size: 80000 File Visible: - Signed: -
Status: -
Name: PartMgr.sys
Image Path: PartMgr.sys
Address: 0xF770F000 Size: 19712 File Visible: - Signed: -
Status: -
Name: ParVdm.SYS
Image Path: C:\WINDOWS\System32\Drivers\ParVdm.SYS
Address: 0xF79BB000 Size: 6784 File Visible: - Signed: -
Status: -
Name: pci.sys
Image Path: pci.sys
Address: 0xF7347000 Size: 68736 File Visible: - Signed: -
Status: -
Name: pciide.sys
Image Path: pciide.sys
Address: 0xF7A4F000 Size: 3328 File Visible: - Signed: -
Status: -
Name: PCIIDEX.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
Address: 0xF7707000 Size: 28672 File Visible: - Signed: -
Status: -
Name: PCTAppEvent.sys
Image Path: C:\WINDOWS\system32\drivers\PCTAppEvent.sys
Address: 0xB7C95000 Size: 154368 File Visible: - Signed: -
Status: -
Name: pctgntdi.sys
Image Path: C:\WINDOWS\system32\drivers\pctgntdi.sys
Address: 0xF352D000 Size: 241408 File Visible: - Signed: -
Status: -
Name: pctNdis-PacketFilter.sys
Image Path: C:\WINDOWS\system32\drivers\pctNdis-PacketFilter.sys
Address: 0xB78E9000 Size: 81920 File Visible: - Signed: -
Status: -
Name: pctNdis.sys
Image Path: C:\WINDOWS\system32\DRIVERS\pctNdis.sys
Address: 0xF7607000 Size: 50432 File Visible: - Signed: -
Status: -
Name: pctplfw.sys
Image Path: C:\WINDOWS\system32\drivers\pctplfw.sys
Address: 0xB78CC000 Size: 117504 File Visible: - Signed: -
Status: -
Name: PnpManager
Image Path: \Driver\PnpManager
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: portcls.sys
Image Path: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xF679C000 Size: 147456 File Visible: - Signed: -
Status: -
Name: psched.sys
Image Path: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xF5BF5000 Size: 69120 File Visible: - Signed: -
Status: -
Name: ptilink.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xF77FF000 Size: 17792 File Visible: - Signed: -
Status: -
Name: rasacd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xF6F13000 Size: 8832 File Visible: - Signed: -
Status: -
Name: rasirda.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasirda.sys
Address: 0xF77EF000 Size: 19584 File Visible: - Signed: -
Status: -
Name: rasl2tp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xF75B7000 Size: 51328 File Visible: - Signed: -
Status: -
Name: raspppoe.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xF75C7000 Size: 41472 File Visible: - Signed: -
Status: -
Name: raspptp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xF75D7000 Size: 48384 File Visible: - Signed: -
Status: -
Name: raspti.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xF7807000 Size: 16512 File Visible: - Signed: -
Status: -
Name: RAW
Image Path: \FileSystem\RAW
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: rdbss.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xF3490000 Size: 175744 File Visible: - Signed: -
Status: -
Name: RDPCDD.sys
Image Path: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xF79D9000 Size: 4224 File Visible: - Signed: -
Status: -
Name: redbook.sys
Image Path: C:\WINDOWS\system32\DRIVERS\redbook.sys
Address: 0xF7577000 Size: 58496 File Visible: - Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB7D33000 Size: 49152 File Visible: No Signed: -
Status: -
Name: serenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serenum.sys
Address: 0xF6EC7000 Size: 15744 File Visible: - Signed: -
Status: -
Name: serial.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serial.sys
Address: 0xF7537000 Size: 64256 File Visible: - Signed: -
Status: -
Name: snapman.sys
Image Path: snapman.sys
Address: 0xF7110000 Size: 125536 File Visible: - Signed: -
Status: -
Name: snpstd3.sys
Image Path: C:\WINDOWS\system32\DRIVERS\snpstd3.sys
Address: 0xF2B80000 Size: 8718848 File Visible: - Signed: -
Status: -
Name: speedfan.sys
Image Path: speedfan.sys
Address: 0xF798D000 Size: 5248 File Visible: No Signed: -
Status: -
Name: sr.sys
Image Path: sr.sys
Address: 0xF72C4000 Size: 73344 File Visible: - Signed: -
Status: -
Name: srv.sys
Image Path: C:\WINDOWS\system32\DRIVERS\srv.sys
Address: 0xB7DAB000 Size: 357248 File Visible: - Signed: -
Status: -
Name: STREAM.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\STREAM.SYS
Address: 0xF68A7000 Size: 53248 File Visible: - Signed: -
Status: -
Name: swenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xF79CD000 Size: 4352 File Visible: - Signed: -
Status: -
Name: sysaudio.sys
Image Path: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xB83B3000 Size: 60800 File Visible: - Signed: -
Status: -
Name: tcpip.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xF3616000 Size: 361600 File Visible: - Signed: -
Status: -
Name: tcpip.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xF3616000 Size: 361600 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: tcpip6.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip6.sys
Address: 0xF35B6000 Size: 226880 File Visible: - Signed: -
Status: -
Name: TDI.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xF77F7000 Size: 20480 File Visible: - Signed: -
Status: -
Name: tdrpman.sys
Image Path: tdrpman.sys
Address: 0xF712F000 Size: 361792 File Visible: - Signed: -
Status: -
Name: termdd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xF75F7000 Size: 40704 File Visible: - Signed: -
Status: -
Name: tifsfilt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tifsfilt.sys
Address: 0xF76F7000 Size: 37696 File Visible: - Signed: -
Status: -
Name: timntr.sys
Image Path: timntr.sys
Address: 0xF7188000 Size: 435072 File Visible: - Signed: -
Status: -
Name: tunmp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tunmp.sys
Address: 0xF6ECB000 Size: 12288 File Visible: - Signed: -
Status: -
Name: update.sys
Image Path: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xF5B97000 Size: 384768 File Visible: - Signed: -
Status: -
Name: usbaudio.sys
Image Path: C:\WINDOWS\system32\drivers\usbaudio.sys
Address: 0xF6897000 Size: 60032 File Visible: - Signed: -
Status: -
Name: usbccgp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbccgp.sys
Address: 0xF7767000 Size: 32128 File Visible: - Signed: -
Status: -
Name: USBD.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xF79CF000 Size: 8192 File Visible: - Signed: -
Status: -
Name: usbehci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbehci.sys
Address: 0xF77C7000 Size: 30208 File Visible: - Signed: -
Status: -
Name: usbhub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xF7637000 Size: 59520 File Visible: - Signed: -
Status: -
Name: usbohci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbohci.sys
Address: 0xF77BF000 Size: 17152 File Visible: - Signed: -
Status: -
Name: USBPORT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xF684F000 Size: 147456 File Visible: - Signed: -
Status: -
Name: USBSTOR.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
Address: 0xF777F000 Size: 26368 File Visible: - Signed: -
Status: -
Name: VD_FileDisk.SYS
Image Path: C:\WINDOWS\System32\Drivers\VD_FileDisk.SYS
Address: 0xF6EF7000 Size: 16384 File Visible: - Signed: -
Status: -
Name: vga.sys
Image Path: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xF7847000 Size: 20992 File Visible: - Signed: -
Status: -
Name: VIDEOPRT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xF5C1D000 Size: 81920 File Visible: - Signed: -
Status: -
Name: VolSnap.sys
Image Path: VolSnap.sys
Address: 0xF74C7000 Size: 52480 File Visible: - Signed: -
Status: -
Name: wanarp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xF76B7000 Size: 34560 File Visible: - Signed: -
Status: -
Name: watchdog.sys
Image Path: C:\WINDOWS\System32\watchdog.sys
Address: 0xF77D7000 Size: 20480 File Visible: - Signed: -
Status: -
Name: wdmaud.sys
Image Path: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0xB81F6000 Size: 83072 File Visible: - Signed: -
Status: -
Name: Win32k
Image Path: \Driver\Win32k
Address: 0xBF800000 Size: 1855488 File Visible: - Signed: -
Status: -
Name: win32k.sys
Image Path: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000 Size: 1855488 File Visible: - Signed: -
Status: -
Name: WMILIB.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\WMILIB.SYS
Address: 0xF7989000 Size: 8192 File Visible: - Signed: -
Status: -
Name: WMIxWDM
Image Path: \Driver\WMIxWDM
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: 1394BUS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\1394BUS.SYS
Address: 0xF7497000 Size: 57344 File Visible: - Signed: -
Status: -
Name: Aavmker4.SYS
Image Path: C:\WINDOWS\System32\Drivers\Aavmker4.SYS
Address: 0xF778F000 Size: 22144 File Visible: - Signed: -
Status: -
Name: ACPI.sys
Image Path: ACPI.sys
Address: 0xF7358000 Size: 188288 File Visible: - Signed: -
Status: -
Name: ACPI_HAL
Image Path: \Driver\ACPI_HAL
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: afd.sys
Image Path: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xF34E3000 Size: 138496 File Visible: - Signed: -
Status: -
Name: AmdK8.sys
Image Path: C:\WINDOWS\system32\DRIVERS\AmdK8.sys
Address: 0xF7527000 Size: 65536 File Visible: - Signed: -
Status: -
Name: arp1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\arp1394.sys
Address: 0xF6917000 Size: 60800 File Visible: - Signed: -
Status: -
Name: aswFsBlk.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswFsBlk.SYS
Address: 0xB87FC000 Size: 11008 File Visible: - Signed: -
Status: -
Name: aswMon2.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswMon2.SYS
Address: 0xB848B000 Size: 93440 File Visible: - Signed: -
Status: -
Name: aswSP.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswSP.SYS
Address: 0xF33D1000 Size: 158848 File Visible: - Signed: -
Status: -
Name: aswTdi.SYS
Image Path: C:\WINDOWS\System32\Drivers\aswTdi.SYS
Address: 0xF68F7000 Size: 39936 File Visible: - Signed: -
Status: -
Name: atapi.sys
Image Path: atapi.sys
Address: 0xF7310000 Size: 96512 File Visible: - Signed: -
Status: -
Name: ATMFD.DLL
Image Path: C:\WINDOWS\System32\ATMFD.DLL
Address: 0xBFFA0000 Size: 286720 File Visible: - Signed: -
Status: -
Name: audstub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xF7B3A000 Size: 3072 File Visible: - Signed: -
Status: -
Name: AvgArCln.sys
Image Path: C:\WINDOWS\System32\DRIVERS\AvgArCln.sys
Address: 0xF7AE3000 Size: 3968 File Visible: - Signed: -
Status: -
Name: avgarkt.sys
Image Path: avgarkt.sys
Address: 0xF798B000 Size: 5632 File Visible: - Signed: -
Status: -
Name: Beep.SYS
Image Path: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xF79D5000 Size: 4224 File Visible: - Signed: -
Status: -
Name: BOOTVID.dll
Image Path: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF7897000 Size: 12288 File Visible: - Signed: -
Status: -
Name: btaudio.sys
Image Path: C:\WINDOWS\system32\drivers\btaudio.sys
Address: 0xF77E7000 Size: 16640 File Visible: - Signed: -
Status: -
Name: btkrnl.sys
Image Path: btkrnl.sys
Address: 0xF6FC5000 Size: 1245472 File Visible: - Signed: -
Status: -
Name: btport.sys
Image Path: C:\WINDOWS\system32\DRIVERS\btport.sys
Address: 0xF7817000 Size: 28032 File Visible: - Signed: -
Status: -
Name: btwusb.sys
Image Path: C:\WINDOWS\System32\Drivers\btwusb.sys
Address: 0xF68E7000 Size: 50592 File Visible: - Signed: -
Status: -
Name: Cdfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xB83A3000 Size: 63744 File Visible: - Signed: -
Status: -
Name: cdrom.sys
Image Path: C:\WINDOWS\system32\DRIVERS\cdrom.sys
Address: 0xF7567000 Size: 62976 File Visible: - Signed: -
Status: -
Name: CLASSPNP.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xF74E7000 Size: 53248 File Visible: - Signed: -
Status: -
Name: ctac32k.sys
Image Path: C:\WINDOWS\system32\drivers\ctac32k.sys
Address: 0xF3815000 Size: 638976 File Visible: - Signed: -
Status: -
Name: ctaud2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctaud2k.sys
Address: 0xF67C0000 Size: 439296 File Visible: - Signed: -
Status: -
Name: ctoss2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctoss2k.sys
Address: 0xF676A000 Size: 204800 File Visible: - Signed: -
Status: -
Name: ctprxy2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctprxy2k.sys
Address: 0xF77CF000 Size: 32768 File Visible: - Signed: -
Status: -
Name: ctsfm2k.sys
Image Path: C:\WINDOWS\system32\drivers\ctsfm2k.sys
Address: 0xF38B1000 Size: 159744 File Visible: - Signed: -
Status: -
Name: disk.sys
Image Path: disk.sys
Address: 0xF74D7000 Size: 36352 File Visible: - Signed: -
Status: -
Name: drmk.sys
Image Path: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF7587000 Size: 61440 File Visible: - Signed: -
Status: -
Name: dump_nvata.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_nvata.sys
Address: 0xF2A52000 Size: 106496 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79F3000 Size: 8192 File Visible: No Signed: -
Status: -
Name: Dxapi.sys
Image Path: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xF3404000 Size: 12288 File Visible: - Signed: -
Status: -
Name: dxg.sys
Image Path: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBD000000 Size: 73728 File Visible: - Signed: -
Status: -
Name: dxgthk.sys
Image Path: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF7B92000 Size: 4096 File Visible: - Signed: -
Status: -
Name: emupia2k.sys
Image Path: C:\WINDOWS\system32\drivers\emupia2k.sys
Address: 0xF38FC000 Size: 184320 File Visible: - Signed: -
Status: -
Name: Fastfat.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
Address: 0xF2A6C000 Size: 143744 File Visible: - Signed: -
Status: -
Name: Fastfat.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
Address: 0xF2A6C000 Size: 143744 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: Fips.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xF68B7000 Size: 44544 File Visible: - Signed: -
Status: -
Name: fltmgr.sys
Image Path: fltmgr.sys
Address: 0xF72D6000 Size: 129792 File Visible: - Signed: -
Status: -
Name: Fs_Rec.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xF79D3000 Size: 7936 File Visible: - Signed: -
Status: -
Name: ftdisk.sys
Image Path: ftdisk.sys
Address: 0xF7328000 Size: 125184 File Visible: - Signed: -
Status: -
Name: gameenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\gameenum.sys
Address: 0xF6DF2000 Size: 10624 File Visible: - Signed: -
Status: -
Name: giveio.sys
Image Path: giveio.sys
Address: 0xF7A50000 Size: 1664 File Visible: No Signed: -
Status: -
Name: ha10kx2k.sys
Image Path: C:\WINDOWS\system32\drivers\ha10kx2k.sys
Address: 0xF3929000 Size: 1052672 File Visible: - Signed: -
Status: -
Name: hal.dll
Image Path: C:\WINDOWS\system32\hal.dll
Address: 0x806E4000 Size: 134400 File Visible: - Signed: -
Status: -
Name: HIDCLASS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS
Address: 0xF68C7000 Size: 36864 File Visible: - Signed: -
Status: -
Name: HIDPARSE.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS
Address: 0xF783F000 Size: 28672 File Visible: - Signed: -
Status: -
Name: hidusb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\hidusb.sys
Address: 0xF6ED3000 Size: 10368 File Visible: - Signed: -
Status: -
Name: HWiNFO32.SYS
Image Path: C:\Program Files\HWiNFO32\HWiNFO32.SYS
Address: 0xF3A83000 Size: 12544 File Visible: - Signed: -
Status: -
Name: imapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\imapi.sys
Address: 0xF7557000 Size: 42112 File Visible: - Signed: -
Status: -
Name: ip6fw.sys
Image Path: C:\WINDOWS\system32\drivers\ip6fw.sys
Address: 0xF76A7000 Size: 36608 File Visible: - Signed: -
Status: -
Name: ipnat.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xF3590000 Size: 152832 File Visible: - Signed: -
Status: -
Name: ipsec.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xF366F000 Size: 75264 File Visible: - Signed: -
Status: -
Name: irda.sys
Image Path: C:\WINDOWS\system32\DRIVERS\irda.sys
Address: 0xB85BA000 Size: 88192 File Visible: - Signed: -
Status: -
Name: isapnp.sys
Image Path: isapnp.sys
Address: 0xF74A7000 Size: 37248 File Visible: - Signed: -
Status: -
Name: kbdclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xF77AF000 Size: 24576 File Visible: - Signed: -
Status: -
Name: kbdhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdhid.sys
Address: 0xF360A000 Size: 14592 File Visible: - Signed: -
Status: -
Name: KDCOM.DLL
Image Path: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF7987000 Size: 8192 File Visible: - Signed: -
Status: -
Name: kmixer.sys
Image Path: C:\WINDOWS\system32\drivers\kmixer.sys
Address: 0xB76E9000 Size: 172416 File Visible: - Signed: -
Status: -
Name: ks.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ks.sys
Address: 0xF682C000 Size: 143360 File Visible: - Signed: -
Status: -
Name: KSecDD.sys
Image Path: KSecDD.sys
Address: 0xF72AD000 Size: 92928 File Visible: - Signed: -
Status: -
Name: mnmdd.SYS
Image Path: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xF79D7000 Size: 4224 File Visible: - Signed: -
Status: -
Name: mouclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xF77B7000 Size: 23040 File Visible: - Signed: -
Status: -
Name: mouhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouhid.sys
Address: 0xF3A73000 Size: 12160 File Visible: - Signed: -
Status: -
Name: MountMgr.sys
Image Path: MountMgr.sys
Address: 0xF74B7000 Size: 42368 File Visible: - Signed: -
Status: -
Name: mrxdav.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0xB7FE3000 Size: 180608 File Visible: - Signed: -
Status: -
Name: mrxsmb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xF3420000 Size: 455680 File Visible: - Signed: -
Status: -
Name: Msfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xF784F000 Size: 19072 File Visible: - Signed: -
Status: -
Name: msgpc.sys
Image Path: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xF75E7000 Size: 35072 File Visible: - Signed: -
Status: -
Name: mssmbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xF6DDE000 Size: 15488 File Visible: - Signed: -
Status: -
Name: Mup.sys
Image Path: Mup.sys
Address: 0xF70F6000 Size: 105344 File Visible: - Signed: -
Status: -
Name: NDIS.sys
Image Path: NDIS.sys
Address: 0xF71F3000 Size: 182656 File Visible: - Signed: -
Status: -
Name: ndistapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xF6DEA000 Size: 10112 File Visible: - Signed: -
Status: -
Name: ndisuio.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xB87EC000 Size: 14592 File Visible: - Signed: -
Status: -
Name: ndiswan.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xF5C06000 Size: 91520 File Visible: - Signed: -
Status: -
Name: NDProxy.SYS
Image Path: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xF7627000 Size: 40576 File Visible: - Signed: -
Status: -
Name: netbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xF6907000 Size: 34688 File Visible: - Signed: -
Status: -
Name: netbt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xF3505000 Size: 162816 File Visible: - Signed: -
Status: -
Name: nic1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nic1394.sys
Address: 0xF7597000 Size: 61824 File Visible: - Signed: -
Status: -
Name: Npfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xF7857000 Size: 30848 File Visible: - Signed: -
Status: -
Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xF7220000 Size: 574976 File Visible: - Signed: -
Status: -
Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xF7220000 Size: 574976 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: ntkrnlpa.exe
Image Path: C:\WINDOWS\system32\ntkrnlpa.exe
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: Null.SYS
Image Path: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xF7AE2000 Size: 2944 File Visible: - Signed: -
Status: -
Name: nv4_disp.dll
Image Path: C:\WINDOWS\System32\nv4_disp.dll
Address: 0xBD012000 Size: 6344704 File Visible: - Signed: -
Status: -
Name: nv4_mini.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
Address: 0xF5C31000 Size: 10604128 File Visible: - Signed: -
Status: -
Name: nvata.sys
Image Path: nvata.sys
Address: 0xF72F6000 Size: 105344 File Visible: - Signed: -
Status: -
Name: NVENETFD.sys
Image Path: C:\WINDOWS\system32\DRIVERS\NVENETFD.sys
Address: 0xF7647000 Size: 57856 File Visible: - Signed: -
Status: -
Name: nvnetbus.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nvnetbus.sys
Address: 0xF75A7000 Size: 40960 File Visible: - Signed: -
Status: -
Name: NVNRM.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\NVNRM.SYS
Address: 0xF664E000 Size: 1163264 File Visible: - Signed: -
Status: -
Name: ohci1394.sys
Image Path: ohci1394.sys
Address: 0xF7487000 Size: 61696 File Visible: - Signed: -
Status: -
Name: parport.sys
Image Path: C:\WINDOWS\system32\DRIVERS\parport.sys
Address: 0xF6873000 Size: 80000 File Visible: - Signed: -
Status: -
Name: PartMgr.sys
Image Path: PartMgr.sys
Address: 0xF770F000 Size: 19712 File Visible: - Signed: -
Status: -
Name: ParVdm.SYS
Image Path: C:\WINDOWS\System32\Drivers\ParVdm.SYS
Address: 0xF79BB000 Size: 6784 File Visible: - Signed: -
Status: -
Name: pci.sys
Image Path: pci.sys
Address: 0xF7347000 Size: 68736 File Visible: - Signed: -
Status: -
Name: pciide.sys
Image Path: pciide.sys
Address: 0xF7A4F000 Size: 3328 File Visible: - Signed: -
Status: -
Name: PCIIDEX.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
Address: 0xF7707000 Size: 28672 File Visible: - Signed: -
Status: -
Name: PCTAppEvent.sys
Image Path: C:\WINDOWS\system32\drivers\PCTAppEvent.sys
Address: 0xB7C95000 Size: 154368 File Visible: - Signed: -
Status: -
Name: pctgntdi.sys
Image Path: C:\WINDOWS\system32\drivers\pctgntdi.sys
Address: 0xF352D000 Size: 241408 File Visible: - Signed: -
Status: -
Name: pctNdis-PacketFilter.sys
Image Path: C:\WINDOWS\system32\drivers\pctNdis-PacketFilter.sys
Address: 0xB78E9000 Size: 81920 File Visible: - Signed: -
Status: -
Name: pctNdis.sys
Image Path: C:\WINDOWS\system32\DRIVERS\pctNdis.sys
Address: 0xF7607000 Size: 50432 File Visible: - Signed: -
Status: -
Name: pctplfw.sys
Image Path: C:\WINDOWS\system32\drivers\pctplfw.sys
Address: 0xB78CC000 Size: 117504 File Visible: - Signed: -
Status: -
Name: PnpManager
Image Path: \Driver\PnpManager
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: portcls.sys
Image Path: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xF679C000 Size: 147456 File Visible: - Signed: -
Status: -
Name: psched.sys
Image Path: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xF5BF5000 Size: 69120 File Visible: - Signed: -
Status: -
Name: ptilink.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xF77FF000 Size: 17792 File Visible: - Signed: -
Status: -
Name: rasacd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xF6F13000 Size: 8832 File Visible: - Signed: -
Status: -
Name: rasirda.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasirda.sys
Address: 0xF77EF000 Size: 19584 File Visible: - Signed: -
Status: -
Name: rasl2tp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xF75B7000 Size: 51328 File Visible: - Signed: -
Status: -
Name: raspppoe.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xF75C7000 Size: 41472 File Visible: - Signed: -
Status: -
Name: raspptp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xF75D7000 Size: 48384 File Visible: - Signed: -
Status: -
Name: raspti.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xF7807000 Size: 16512 File Visible: - Signed: -
Status: -
Name: RAW
Image Path: \FileSystem\RAW
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Name: rdbss.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xF3490000 Size: 175744 File Visible: - Signed: -
Status: -
Name: RDPCDD.sys
Image Path: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xF79D9000 Size: 4224 File Visible: - Signed: -
Status: -
Name: redbook.sys
Image Path: C:\WINDOWS\system32\DRIVERS\redbook.sys
Address: 0xF7577000 Size: 58496 File Visible: - Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB7D33000 Size: 49152 File Visible: No Signed: -
Status: -
Name: serenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serenum.sys
Address: 0xF6EC7000 Size: 15744 File Visible: - Signed: -
Status: -
Name: serial.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serial.sys
Address: 0xF7537000 Size: 64256 File Visible: - Signed: -
Status: -
Name: snapman.sys
Image Path: snapman.sys
Address: 0xF7110000 Size: 125536 File Visible: - Signed: -
Status: -
Name: snpstd3.sys
Image Path: C:\WINDOWS\system32\DRIVERS\snpstd3.sys
Address: 0xF2B80000 Size: 8718848 File Visible: - Signed: -
Status: -
Name: speedfan.sys
Image Path: speedfan.sys
Address: 0xF798D000 Size: 5248 File Visible: No Signed: -
Status: -
Name: sr.sys
Image Path: sr.sys
Address: 0xF72C4000 Size: 73344 File Visible: - Signed: -
Status: -
Name: srv.sys
Image Path: C:\WINDOWS\system32\DRIVERS\srv.sys
Address: 0xB7DAB000 Size: 357248 File Visible: - Signed: -
Status: -
Name: STREAM.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\STREAM.SYS
Address: 0xF68A7000 Size: 53248 File Visible: - Signed: -
Status: -
Name: swenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xF79CD000 Size: 4352 File Visible: - Signed: -
Status: -
Name: sysaudio.sys
Image Path: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xB83B3000 Size: 60800 File Visible: - Signed: -
Status: -
Name: tcpip.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xF3616000 Size: 361600 File Visible: - Signed: -
Status: -
Name: tcpip.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xF3616000 Size: 361600 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: tcpip6.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip6.sys
Address: 0xF35B6000 Size: 226880 File Visible: - Signed: -
Status: -
Name: TDI.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xF77F7000 Size: 20480 File Visible: - Signed: -
Status: -
Name: tdrpman.sys
Image Path: tdrpman.sys
Address: 0xF712F000 Size: 361792 File Visible: - Signed: -
Status: -
Name: termdd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xF75F7000 Size: 40704 File Visible: - Signed: -
Status: -
Name: tifsfilt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tifsfilt.sys
Address: 0xF76F7000 Size: 37696 File Visible: - Signed: -
Status: -
Name: timntr.sys
Image Path: timntr.sys
Address: 0xF7188000 Size: 435072 File Visible: - Signed: -
Status: -
Name: tunmp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tunmp.sys
Address: 0xF6ECB000 Size: 12288 File Visible: - Signed: -
Status: -
Name: update.sys
Image Path: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xF5B97000 Size: 384768 File Visible: - Signed: -
Status: -
Name: usbaudio.sys
Image Path: C:\WINDOWS\system32\drivers\usbaudio.sys
Address: 0xF6897000 Size: 60032 File Visible: - Signed: -
Status: -
Name: usbccgp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbccgp.sys
Address: 0xF7767000 Size: 32128 File Visible: - Signed: -
Status: -
Name: USBD.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xF79CF000 Size: 8192 File Visible: - Signed: -
Status: -
Name: usbehci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbehci.sys
Address: 0xF77C7000 Size: 30208 File Visible: - Signed: -
Status: -
Name: usbhub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xF7637000 Size: 59520 File Visible: - Signed: -
Status: -
Name: usbohci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbohci.sys
Address: 0xF77BF000 Size: 17152 File Visible: - Signed: -
Status: -
Name: USBPORT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xF684F000 Size: 147456 File Visible: - Signed: -
Status: -
Name: USBSTOR.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
Address: 0xF777F000 Size: 26368 File Visible: - Signed: -
Status: -
Name: VD_FileDisk.SYS
Image Path: C:\WINDOWS\System32\Drivers\VD_FileDisk.SYS
Address: 0xF6EF7000 Size: 16384 File Visible: - Signed: -
Status: -
Name: vga.sys
Image Path: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xF7847000 Size: 20992 File Visible: - Signed: -
Status: -
Name: VIDEOPRT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xF5C1D000 Size: 81920 File Visible: - Signed: -
Status: -
Name: VolSnap.sys
Image Path: VolSnap.sys
Address: 0xF74C7000 Size: 52480 File Visible: - Signed: -
Status: -
Name: wanarp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xF76B7000 Size: 34560 File Visible: - Signed: -
Status: -
Name: watchdog.sys
Image Path: C:\WINDOWS\System32\watchdog.sys
Address: 0xF77D7000 Size: 20480 File Visible: - Signed: -
Status: -
Name: wdmaud.sys
Image Path: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0xB81F6000 Size: 83072 File Visible: - Signed: -
Status: -
Name: Win32k
Image Path: \Driver\Win32k
Address: 0xBF800000 Size: 1855488 File Visible: - Signed: -
Status: -
Name: win32k.sys
Image Path: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000 Size: 1855488 File Visible: - Signed: -
Status: -
Name: WMILIB.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\WMILIB.SYS
Address: 0xF7989000 Size: 8192 File Visible: - Signed: -
Status: -
Name: WMIxWDM
Image Path: \Driver\WMIxWDM
Address: 0x804D7000 Size: 2150400 File Visible: - Signed: -
Status: -
Nikdy není možné dobře zabezpečit svůj systém .............
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
další část
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Processes
-------------------
Path: System
PID: 4 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 420 Status: -
Path: C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
PID: 608 Status: -
Path: C:\Program Files\Alwil Software\Avast5\AvastUI.exe
PID: 880 Status: -
Path: C:\WINDOWS\system32\spoolsv.exe
PID: 932 Status: -
Path: C:\WINDOWS\CTHELPER.EXE
PID: 960 Status: -
Path: C:\WINDOWS\tsnpstd3.exe
PID: 1000 Status: -
Path: C:\WINDOWS\vsnpstd3.exe
PID: 1048 Status: -
Path: C:\Documents and Settings\Admin\Local Settings\Data aplikací\Google\Chrome\Application\chrome.exe
PID: 1088 Status: -
Path: C:\WINDOWS\explorer.exe
PID: 1180 Status: -
Path: C:\WINDOWS\system32\smss.exe
PID: 1260 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1292 Status: -
Path: C:\WINDOWS\system32\csrss.exe
PID: 1352 Status: -
Path: C:\WINDOWS\system32\winlogon.exe
PID: 1376 Status: -
Path: C:\WINDOWS\system32\services.exe
PID: 1424 Status: -
Path: C:\WINDOWS\system32\lsass.exe
PID: 1460 Status: -
Path: C:\WINDOWS\system32\nvsvc32.exe
PID: 1612 Status: -
Path: C:\Program Files\Common Files\soft602\602updsvc\602updsvc.exe
PID: 1624 Status: -
Path: C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe
PID: 1640 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1696 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1740 Status: -
Path: C:\Program Files\Common Files\Seagate\Schedule2\schedhlp.exe
PID: 1808 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1868 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1932 Status: -
Path: C:\Documents and Settings\Admin\Local Settings\Data aplikací\Google\Chrome\Application\chrome.exe
PID: 1956 Status: -
Path: C:\Program Files\OO Software\Defrag\oodtray.exe
PID: 1992 Status: -
Path: C:\Program Files\Java\jre6\bin\jqs.exe
PID: 2136 Status: -
Path: C:\Program Files\Nero\Update\NASvc.exe
PID: 2176 Status: -
Path: C:\Program Files\Corel\Corel VideoStudio 12\uvPL.exe
PID: 2460 Status: -
Path: C:\Program Files\OO Software\Defrag\oodag.exe
PID: 2476 Status: -
Path: C:\Program Files\NetSoftware\NetSoftware.exe
PID: 2492 Status: -
Path: C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe
PID: 2548 Status: -
Path: C:\Program Files\PC Tools Firewall Plus\FWService.exe
PID: 2564 Status: -
Path: C:\Documents and Settings\Admin\Plocha\RootRepeal.exe
PID: 2716 Status: -
Path: C:\Program Files\WallpaperDownloader\WallpaperDownloader.exe
PID: 2772 Status: -
Path: C:\WINDOWS\system32\ctfmon.exe
PID: 2788 Status: -
Path: C:\WINDOWS\system32\PnkBstrA.exe
PID: 2868 Status: -
Path: C:\WINDOWS\system32\PnkBstrB.exe
PID: 2900 Status: -
Path: C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
PID: 3060 Status: -
Path: C:\WINDOWS\system32\tcpsvcs.exe
PID: 3104 Status: -
Path: C:\WINDOWS\system32\snmp.exe
PID: 3120 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 3148 Status: -
Path: C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
PID: 3256 Status: -
Path: C:\WINDOWS\system32\searchindexer.exe
PID: 3296 Status: -
Path: C:\WINDOWS\system32\wuauclt.exe
PID: 3436 Status: -
Path: C:\Program Files\MSI\DualCoreCenter\DualCoreCenter.exe
PID: 3452 Status: -
Path: C:\WINDOWS\system32\alg.exe
PID: 3840 Status: -
Path: C:\WINDOWS\system32\wbem\wmiprvse.exe
PID: 3936 Status: -
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Processes
-------------------
Path: System
PID: 4 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 420 Status: -
Path: C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
PID: 608 Status: -
Path: C:\Program Files\Alwil Software\Avast5\AvastUI.exe
PID: 880 Status: -
Path: C:\WINDOWS\system32\spoolsv.exe
PID: 932 Status: -
Path: C:\WINDOWS\CTHELPER.EXE
PID: 960 Status: -
Path: C:\WINDOWS\tsnpstd3.exe
PID: 1000 Status: -
Path: C:\WINDOWS\vsnpstd3.exe
PID: 1048 Status: -
Path: C:\Documents and Settings\Admin\Local Settings\Data aplikací\Google\Chrome\Application\chrome.exe
PID: 1088 Status: -
Path: C:\WINDOWS\explorer.exe
PID: 1180 Status: -
Path: C:\WINDOWS\system32\smss.exe
PID: 1260 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1292 Status: -
Path: C:\WINDOWS\system32\csrss.exe
PID: 1352 Status: -
Path: C:\WINDOWS\system32\winlogon.exe
PID: 1376 Status: -
Path: C:\WINDOWS\system32\services.exe
PID: 1424 Status: -
Path: C:\WINDOWS\system32\lsass.exe
PID: 1460 Status: -
Path: C:\WINDOWS\system32\nvsvc32.exe
PID: 1612 Status: -
Path: C:\Program Files\Common Files\soft602\602updsvc\602updsvc.exe
PID: 1624 Status: -
Path: C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe
PID: 1640 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1696 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1740 Status: -
Path: C:\Program Files\Common Files\Seagate\Schedule2\schedhlp.exe
PID: 1808 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1868 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 1932 Status: -
Path: C:\Documents and Settings\Admin\Local Settings\Data aplikací\Google\Chrome\Application\chrome.exe
PID: 1956 Status: -
Path: C:\Program Files\OO Software\Defrag\oodtray.exe
PID: 1992 Status: -
Path: C:\Program Files\Java\jre6\bin\jqs.exe
PID: 2136 Status: -
Path: C:\Program Files\Nero\Update\NASvc.exe
PID: 2176 Status: -
Path: C:\Program Files\Corel\Corel VideoStudio 12\uvPL.exe
PID: 2460 Status: -
Path: C:\Program Files\OO Software\Defrag\oodag.exe
PID: 2476 Status: -
Path: C:\Program Files\NetSoftware\NetSoftware.exe
PID: 2492 Status: -
Path: C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe
PID: 2548 Status: -
Path: C:\Program Files\PC Tools Firewall Plus\FWService.exe
PID: 2564 Status: -
Path: C:\Documents and Settings\Admin\Plocha\RootRepeal.exe
PID: 2716 Status: -
Path: C:\Program Files\WallpaperDownloader\WallpaperDownloader.exe
PID: 2772 Status: -
Path: C:\WINDOWS\system32\ctfmon.exe
PID: 2788 Status: -
Path: C:\WINDOWS\system32\PnkBstrA.exe
PID: 2868 Status: -
Path: C:\WINDOWS\system32\PnkBstrB.exe
PID: 2900 Status: -
Path: C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
PID: 3060 Status: -
Path: C:\WINDOWS\system32\tcpsvcs.exe
PID: 3104 Status: -
Path: C:\WINDOWS\system32\snmp.exe
PID: 3120 Status: -
Path: C:\WINDOWS\system32\svchost.exe
PID: 3148 Status: -
Path: C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
PID: 3256 Status: -
Path: C:\WINDOWS\system32\searchindexer.exe
PID: 3296 Status: -
Path: C:\WINDOWS\system32\wuauclt.exe
PID: 3436 Status: -
Path: C:\Program Files\MSI\DualCoreCenter\DualCoreCenter.exe
PID: 3452 Status: -
Path: C:\WINDOWS\system32\alg.exe
PID: 3840 Status: -
Path: C:\WINDOWS\system32\wbem\wmiprvse.exe
PID: 3936 Status: -
Nikdy není možné dobře zabezpečit svůj systém .............
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
SSDT
-------------------
#: 000 Function Name: NtAcceptConnectPort
Status: Not hooked
#: 001 Function Name: NtAccessCheck
Status: Not hooked
#: 002 Function Name: NtAccessCheckAndAuditAlarm
Status: Not hooked
#: 003 Function Name: NtAccessCheckByType
Status: Not hooked
#: 004 Function Name: NtAccessCheckByTypeAndAuditAlarm
Status: Not hooked
#: 005 Function Name: NtAccessCheckByTypeResultList
Status: Not hooked
#: 006 Function Name: NtAccessCheckByTypeResultListAndAuditAlarm
Status: Not hooked
#: 007 Function Name: NtAccessCheckByTypeResultListAndAuditAlarmByHandle
Status: Not hooked
#: 008 Function Name: NtAddAtom
Status: Not hooked
#: 009 Function Name: NtAddBootEntry
Status: Not hooked
#: 010 Function Name: NtAdjustGroupsToken
Status: Not hooked
#: 011 Function Name: NtAdjustPrivilegesToken
Status: Not hooked
#: 012 Function Name: NtAlertResumeThread
Status: Not hooked
#: 013 Function Name: NtAlertThread
Status: Not hooked
#: 014 Function Name: NtAllocateLocallyUniqueId
Status: Not hooked
#: 015 Function Name: NtAllocateUserPhysicalPages
Status: Not hooked
#: 016 Function Name: NtAllocateUuids
Status: Not hooked
#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4394
#: 018 Function Name: NtAreMappedFilesTheSame
Status: Not hooked
#: 019 Function Name: NtAssignProcessToJobObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3dde
#: 020 Function Name: NtCallbackReturn
Status: Not hooked
#: 021 Function Name: NtCancelDeviceWakeupRequest
Status: Not hooked
#: 022 Function Name: NtCancelIoFile
Status: Not hooked
#: 023 Function Name: NtCancelTimer
Status: Not hooked
#: 024 Function Name: NtClearEvent
Status: Not hooked
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9cf0
#: 026 Function Name: NtCloseObjectAuditAlarm
Status: Not hooked
#: 027 Function Name: NtCompactKeys
Status: Not hooked
#: 028 Function Name: NtCompareTokens
Status: Not hooked
#: 029 Function Name: NtCompleteConnectPort
Status: Not hooked
#: 030 Function Name: NtCompressKey
Status: Not hooked
#: 031 Function Name: NtConnectPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3e26
#: 032 Function Name: NtContinue
Status: Not hooked
#: 033 Function Name: NtCreateDebugObject
Status: Not hooked
#: 034 Function Name: NtCreateDirectoryObject
Status: Not hooked
#: 035 Function Name: NtCreateEvent
Status: Not hooked
#: 036 Function Name: NtCreateEventPair
Status: Not hooked
#: 037 Function Name: NtCreateFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3ede
#: 038 Function Name: NtCreateIoCompletion
Status: Not hooked
#: 039 Function Name: NtCreateJobObject
Status: Not hooked
#: 040 Function Name: NtCreateJobSet
Status: Not hooked
#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9bac
#: 042 Function Name: NtCreateMailslotFile
Status: Not hooked
#: 043 Function Name: NtCreateMutant
Status: Not hooked
#: 044 Function Name: NtCreateNamedPipeFile
Status: Not hooked
#: 045 Function Name: NtCreatePagingFile
Status: Not hooked
#: 046 Function Name: NtCreatePort
Status: Not hooked
#: 047 Function Name: NtCreateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4b70
#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4bfc
#: 049 Function Name: NtCreateProfile
Status: Not hooked
#: 050 Function Name: NtCreateSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3f5e
#: 051 Function Name: NtCreateSemaphore
Status: Not hooked
#: 052 Function Name: NtCreateSymbolicLinkObject
Status: Not hooked
#: 053 Function Name: NtCreateThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4c8c
#: 054 Function Name: NtCreateTimer
Status: Not hooked
#: 055 Function Name: NtCreateToken
Status: Not hooked
#: 056 Function Name: NtCreateWaitablePort
Status: Not hooked
#: 057 Function Name: NtDebugActiveProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3fae
#: 058 Function Name: NtDebugContinue
Status: Not hooked
#: 059 Function Name: NtDelayExecution
Status: Not hooked
#: 060 Function Name: NtDeleteAtom
Status: Not hooked
#: 061 Function Name: NtDeleteBootEntry
Status: Not hooked
#: 062 Function Name: NtDeleteFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3ff6
#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca403e
#: 064 Function Name: NtDeleteObjectAuditAlarm
Status: Not hooked
#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4086
#: 066 Function Name: NtDeviceIoControlFile
Status: Not hooked
#: 067 Function Name: NtDisplayString
Status: Not hooked
#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca40d0
#: 069 Function Name: NtDuplicateToken
Status: Not hooked
#: 070 Function Name: NtEnumerateBootEntries
Status: Not hooked
#: 071 Function Name: NtEnumerateKey
Status: Not hooked
#: 072 Function Name: NtEnumerateSystemEnvironmentValuesEx
Status: Not hooked
#: 073 Function Name: NtEnumerateValueKey
Status: Not hooked
#: 074 Function Name: NtExtendSection
Status: Not hooked
#: 075 Function Name: NtFilterToken
Status: Not hooked
#: 076 Function Name: NtFindAtom
Status: Not hooked
#: 077 Function Name: NtFlushBuffersFile
Status: Not hooked
#: 078 Function Name: NtFlushInstructionCache
Status: Not hooked
#: 079 Function Name: NtFlushKey
Status: Not hooked
#: 080 Function Name: NtFlushVirtualMemory
Status: Not hooked
#: 081 Function Name: NtFlushWriteBuffer
Status: Not hooked
#: 082 Function Name: NtFreeUserPhysicalPages
Status: Not hooked
#: 083 Function Name: NtFreeVirtualMemory
Status: Not hooked
#: 084 Function Name: NtFsControlFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca411a
#: 085 Function Name: NtGetContextThread
Status: Not hooked
#: 086 Function Name: NtGetDevicePowerState
Status: Not hooked
#: 087 Function Name: NtGetPlugPlayEvent
Status: Not hooked
#: 088 Function Name: NtGetWriteWatch
Status: Not hooked
#: 089 Function Name: NtImpersonateAnonymousToken
Status: Not hooked
#: 090 Function Name: NtImpersonateClientOfPort
Status: Not hooked
#: 091 Function Name: NtImpersonateThread
Status: Not hooked
#: 092 Function Name: NtInitializeRegistry
Status: Not hooked
#: 093 Function Name: NtInitiatePowerAction
Status: Not hooked
#: 094 Function Name: NtIsProcessInJob
Status: Not hooked
#: 095 Function Name: NtIsSystemResumeAutomatic
Status: Not hooked
#: 096 Function Name: NtListenPort
Status: Not hooked
#: 097 Function Name: NtLoadDriver
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4164
#: 098 Function Name: NtLoadKey
Status: Not hooked
#: 099 Function Name: NtLoadKey2
Status: Not hooked
#: 100 Function Name: NtLockFile
Status: Not hooked
#: 101 Function Name: NtLockProductActivationKeys
Status: Not hooked
#: 102 Function Name: NtLockRegistryKey
Status: Not hooked
#: 103 Function Name: NtLockVirtualMemory
Status: Not hooked
#: 104 Function Name: NtMakePermanentObject
Status: Not hooked
#: 105 Function Name: NtMakeTemporaryObject
Status: Not hooked
#: 106 Function Name: NtMapUserPhysicalPages
Status: Not hooked
#: 107 Function Name: NtMapUserPhysicalPagesScatter
Status: Not hooked
#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca41da
#: 109 Function Name: NtModifyBootEntry
Status: Not hooked
#: 110 Function Name: NtNotifyChangeDirectoryFile
Status: Not hooked
#: 111 Function Name: NtNotifyChangeKey
Status: Not hooked
#: 112 Function Name: NtNotifyChangeMultipleKeys
Status: Not hooked
#: 113 Function Name: NtOpenDirectoryObject
Status: Not hooked
#: 114 Function Name: NtOpenEvent
Status: Not hooked
#: 115 Function Name: NtOpenEventPair
Status: Not hooked
#: 116 Function Name: NtOpenFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4222
#: 117 Function Name: NtOpenIoCompletion
Status: Not hooked
#: 118 Function Name: NtOpenJobObject
Status: Not hooked
#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4272
#: 120 Function Name: NtOpenMutant
Status: Not hooked
#: 121 Function Name: NtOpenObjectAuditAlarm
Status: Not hooked
#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d96c2
#: 123 Function Name: NtOpenProcessToken
Status: Not hooked
#: 124 Function Name: NtOpenProcessTokenEx
Status: Not hooked
#: 125 Function Name: NtOpenSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca42ba
#: 126 Function Name: NtOpenSemaphore
Status: Not hooked
#: 127 Function Name: NtOpenSymbolicLinkObject
Status: Not hooked
#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4302
#: 129 Function Name: NtOpenThreadToken
Status: Not hooked
#: 130 Function Name: NtOpenThreadTokenEx
Status: Not hooked
#: 131 Function Name: NtOpenTimer
Status: Not hooked
#: 132 Function Name: NtPlugPlayControl
Status: Not hooked
#: 133 Function Name: NtPowerInformation
Status: Not hooked
#: 134 Function Name: NtPrivilegeCheck
Status: Not hooked
#: 135 Function Name: NtPrivilegeObjectAuditAlarm
Status: Not hooked
#: 136 Function Name: NtPrivilegedServiceAuditAlarm
Status: Not hooked
#: 137 Function Name: NtProtectVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca43e2
#: 138 Function Name: NtPulseEvent
Status: Not hooked
#: 139 Function Name: NtQueryAttributesFile
Status: Not hooked
#: 140 Function Name: NtQueryBootEntryOrder
Status: Not hooked
#: 141 Function Name: NtQueryBootOptions
Status: Not hooked
#: 142 Function Name: NtQueryDebugFilterState
Status: Not hooked
#: 143 Function Name: NtQueryDefaultLocale
Status: Not hooked
#: 144 Function Name: NtQueryDefaultUILanguage
Status: Not hooked
#: 145 Function Name: NtQueryDirectoryFile
Status: Not hooked
#: 146 Function Name: NtQueryDirectoryObject
Status: Not hooked
#: 147 Function Name: NtQueryEaFile
Status: Not hooked
#: 148 Function Name: NtQueryEvent
Status: Not hooked
#: 149 Function Name: NtQueryFullAttributesFile
Status: Not hooked
#: 150 Function Name: NtQueryInformationAtom
Status: Not hooked
#: 151 Function Name: NtQueryInformationFile
Status: Not hooked
#: 152 Function Name: NtQueryInformationJobObject
Status: Not hooked
#: 153 Function Name: NtQueryInformationPort
Status: Not hooked
#: 154 Function Name: NtQueryInformationProcess
Status: Not hooked
#: 155 Function Name: NtQueryInformationThread
Status: Not hooked
#: 156 Function Name: NtQueryInformationToken
Status: Not hooked
#: 157 Function Name: NtQueryInstallUILanguage
Status: Not hooked
#: 158 Function Name: NtQueryIntervalProfile
Status: Not hooked
#: 159 Function Name: NtQueryIoCompletion
Status: Not hooked
#: 160 Function Name: NtQueryKey
Status: Not hooked
#: 161 Function Name: NtQueryMultipleValueKey
Status: Not hooked
#: 162 Function Name: NtQueryMutant
Status: Not hooked
#: 163 Function Name: NtQueryObject
Status: Not hooked
#: 164 Function Name: NtQueryOpenSubKeys
Status: Not hooked
#: 165 Function Name: NtQueryPerformanceCounter
Status: Not hooked
#: 166 Function Name: NtQueryQuotaInformationFile
Status: Not hooked
#: 167 Function Name: NtQuerySection
Status: Not hooked
#: 168 Function Name: NtQuerySecurityObject
Status: Not hooked
#: 169 Function Name: NtQuerySemaphore
Status: Not hooked
#: 170 Function Name: NtQuerySymbolicLinkObject
Status: Not hooked
#: 171 Function Name: NtQuerySystemEnvironmentValue
Status: Not hooked
#: 172 Function Name: NtQuerySystemEnvironmentValueEx
Status: Not hooked
#: 173 Function Name: NtQuerySystemInformation
Status: Not hooked
#: 174 Function Name: NtQuerySystemTime
Status: Not hooked
#: 175 Function Name: NtQueryTimer
Status: Not hooked
#: 176 Function Name: NtQueryTimerResolution
Status: Not hooked
#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9da6
#: 178 Function Name: NtQueryVirtualMemory
Status: Not hooked
#: 179 Function Name: NtQueryVolumeInformationFile
Status: Not hooked
#: 180 Function Name: NtQueueApcThread
Status: Not hooked
#: 181 Function Name: NtRaiseException
Status: Not hooked
#: 182 Function Name: NtRaiseHardError
Status: Not hooked
#: 183 Function Name: NtReadFile
Status: Not hooked
#: 184 Function Name: NtReadFileScatter
Status: Not hooked
#: 185 Function Name: NtReadRequestData
Status: Not hooked
#: 186 Function Name: NtReadVirtualMemory
Status: Not hooked
#: 187 Function Name: NtRegisterThreadTerminatePort
Status: Not hooked
#: 188 Function Name: NtReleaseMutant
Status: Not hooked
#: 189 Function Name: NtReleaseSemaphore
Status: Not hooked
#: 190 Function Name: NtRemoveIoCompletion
Status: Not hooked
#: 191 Function Name: NtRemoveProcessDebug
Status: Not hooked
#: 192 Function Name: NtRenameKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33da22e
#: 193 Function Name: NtReplaceKey
Status: Not hooked
#: 194 Function Name: NtReplyPort
Status: Not hooked
#: 195 Function Name: NtReplyWaitReceivePort
Status: Not hooked
#: 196 Function Name: NtReplyWaitReceivePortEx
Status: Not hooked
#: 197 Function Name: NtReplyWaitReplyPort
Status: Not hooked
#: 198 Function Name: NtRequestDeviceWakeup
Status: Not hooked
#: 199 Function Name: NtRequestPort
Status: Not hooked
#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca434a
#: 201 Function Name: NtRequestWakeupLatency
Status: Not hooked
#: 202 Function Name: NtResetEvent
Status: Not hooked
#: 203 Function Name: NtResetWriteWatch
Status: Not hooked
#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca442a
#: 205 Function Name: NtResumeProcess
Status: Not hooked
#: 206 Function Name: NtResumeThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4478
#: 207 Function Name: NtSaveKey
Status: Not hooked
#: 208 Function Name: NtSaveKeyEx
Status: Not hooked
#: 209 Function Name: NtSaveMergedKeys
Status: Not hooked
#: 210 Function Name: NtSecureConnectPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4564
#: 211 Function Name: NtSetBootEntryOrder
Status: Not hooked
#: 212 Function Name: NtSetBootOptions
Status: Not hooked
#: 213 Function Name: NtSetContextThread
Status: Not hooked
#: 214 Function Name: NtSetDebugFilterState
Status: Not hooked
#: 215 Function Name: NtSetDefaultHardErrorPort
Status: Not hooked
#: 216 Function Name: NtSetDefaultLocale
Status: Not hooked
#: 217 Function Name: NtSetDefaultUILanguage
Status: Not hooked
#: 218 Function Name: NtSetEaFile
Status: Not hooked
#: 219 Function Name: NtSetEvent
Status: Not hooked
#: 220 Function Name: NtSetEventBoostPriority
Status: Not hooked
#: 221 Function Name: NtSetHighEventPair
Status: Not hooked
#: 222 Function Name: NtSetHighWaitLowEventPair
Status: Not hooked
#: 223 Function Name: NtSetInformationDebugObject
Status: Not hooked
#: 224 Function Name: NtSetInformationFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca44c0
#: 225 Function Name: NtSetInformationJobObject
Status: Not hooked
#: 226 Function Name: NtSetInformationKey
Status: Not hooked
#: 227 Function Name: NtSetInformationObject
Status: Not hooked
#: 228 Function Name: NtSetInformationProcess
Status: Not hooked
#: 229 Function Name: NtSetInformationThread
Status: Not hooked
#: 230 Function Name: NtSetInformationToken
Status: Not hooked
#: 231 Function Name: NtSetIntervalProfile
Status: Not hooked
#: 232 Function Name: NtSetIoCompletion
Status: Not hooked
#: 233 Function Name: NtSetLdtEntries
Status: Not hooked
#: 234 Function Name: NtSetLowEventPair
Status: Not hooked
#: 235 Function Name: NtSetLowWaitHighEventPair
Status: Not hooked
#: 236 Function Name: NtSetQuotaInformationFile
Status: Not hooked
#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4610
#: 238 Function Name: NtSetSystemEnvironmentValue
Status: Not hooked
#: 239 Function Name: NtSetSystemEnvironmentValueEx
Status: Not hooked
#: 240 Function Name: NtSetSystemInformation
Status: Not hooked
#: 241 Function Name: NtSetSystemPowerState
Status: Not hooked
#: 242 Function Name: NtSetSystemTime
Status: Not hooked
#: 243 Function Name: NtSetThreadExecutionState
Status: Not hooked
#: 244 Function Name: NtSetTimer
Status: Not hooked
#: 245 Function Name: NtSetTimerResolution
Status: Not hooked
#: 246 Function Name: NtSetUuidSeed
Status: Not hooked
#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4510
#: 248 Function Name: NtSetVolumeInformationFile
Status: Not hooked
#: 249 Function Name: NtShutdownSystem
Status: Not hooked
#: 250 Function Name: NtSignalAndWaitForSingleObject
Status: Not hooked
#: 251 Function Name: NtStartProfile
Status: Not hooked
#: 252 Function Name: NtStopProfile
Status: Not hooked
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca465a
#: 254 Function Name: NtSuspendThread
Status: Not hooked
#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca46a2
#: 256 Function Name: NtTerminateJobObject
Status: Not hooked
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca46ea
#: 258 Function Name: NtTerminateThread
Status: Not hooked
#: 259 Function Name: NtTestAlert
Status: Not hooked
#: 260 Function Name: NtTraceEvent
Status: Not hooked
#: 261 Function Name: NtTranslateFilePath
Status: Not hooked
#: 262 Function Name: NtUnloadDriver
Status: Not hooked
#: 263 Function Name: NtUnloadKey
Status: Not hooked
#: 264 Function Name: NtUnloadKeyEx
Status: Not hooked
#: 265 Function Name: NtUnlockFile
Status: Not hooked
#: 266 Function Name: NtUnlockVirtualMemory
Status: Not hooked
#: 267 Function Name: NtUnmapViewOfSection
Status: Not hooked
#: 268 Function Name: NtVdmControl
Status: Not hooked
#: 269 Function Name: NtWaitForDebugEvent
Status: Not hooked
#: 270 Function Name: NtWaitForMultipleObjects
Status: Not hooked
#: 271 Function Name: NtWaitForSingleObject
Status: Not hooked
#: 272 Function Name: NtWaitHighEventPair
Status: Not hooked
#: 273 Function Name: NtWaitLowEventPair
Status: Not hooked
#: 274 Function Name: NtWriteFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4738
#: 275 Function Name: NtWriteFileGather
Status: Not hooked
#: 276 Function Name: NtWriteRequestData
Status: Not hooked
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4780
#: 278 Function Name: NtYieldExecution
Status: Not hooked
#: 279 Function Name: NtCreateKeyedEvent
Status: Not hooked
#: 280 Function Name: NtOpenKeyedEvent
Status: Not hooked
#: 281 Function Name: NtReleaseKeyedEvent
Status: Not hooked
#: 282 Function Name: NtWaitForKeyedEvent
Status: Not hooked
#: 283 Function Name: NtQueryPortInformationProcess
Status: Not hooked
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
SSDT
-------------------
#: 000 Function Name: NtAcceptConnectPort
Status: Not hooked
#: 001 Function Name: NtAccessCheck
Status: Not hooked
#: 002 Function Name: NtAccessCheckAndAuditAlarm
Status: Not hooked
#: 003 Function Name: NtAccessCheckByType
Status: Not hooked
#: 004 Function Name: NtAccessCheckByTypeAndAuditAlarm
Status: Not hooked
#: 005 Function Name: NtAccessCheckByTypeResultList
Status: Not hooked
#: 006 Function Name: NtAccessCheckByTypeResultListAndAuditAlarm
Status: Not hooked
#: 007 Function Name: NtAccessCheckByTypeResultListAndAuditAlarmByHandle
Status: Not hooked
#: 008 Function Name: NtAddAtom
Status: Not hooked
#: 009 Function Name: NtAddBootEntry
Status: Not hooked
#: 010 Function Name: NtAdjustGroupsToken
Status: Not hooked
#: 011 Function Name: NtAdjustPrivilegesToken
Status: Not hooked
#: 012 Function Name: NtAlertResumeThread
Status: Not hooked
#: 013 Function Name: NtAlertThread
Status: Not hooked
#: 014 Function Name: NtAllocateLocallyUniqueId
Status: Not hooked
#: 015 Function Name: NtAllocateUserPhysicalPages
Status: Not hooked
#: 016 Function Name: NtAllocateUuids
Status: Not hooked
#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4394
#: 018 Function Name: NtAreMappedFilesTheSame
Status: Not hooked
#: 019 Function Name: NtAssignProcessToJobObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3dde
#: 020 Function Name: NtCallbackReturn
Status: Not hooked
#: 021 Function Name: NtCancelDeviceWakeupRequest
Status: Not hooked
#: 022 Function Name: NtCancelIoFile
Status: Not hooked
#: 023 Function Name: NtCancelTimer
Status: Not hooked
#: 024 Function Name: NtClearEvent
Status: Not hooked
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9cf0
#: 026 Function Name: NtCloseObjectAuditAlarm
Status: Not hooked
#: 027 Function Name: NtCompactKeys
Status: Not hooked
#: 028 Function Name: NtCompareTokens
Status: Not hooked
#: 029 Function Name: NtCompleteConnectPort
Status: Not hooked
#: 030 Function Name: NtCompressKey
Status: Not hooked
#: 031 Function Name: NtConnectPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3e26
#: 032 Function Name: NtContinue
Status: Not hooked
#: 033 Function Name: NtCreateDebugObject
Status: Not hooked
#: 034 Function Name: NtCreateDirectoryObject
Status: Not hooked
#: 035 Function Name: NtCreateEvent
Status: Not hooked
#: 036 Function Name: NtCreateEventPair
Status: Not hooked
#: 037 Function Name: NtCreateFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3ede
#: 038 Function Name: NtCreateIoCompletion
Status: Not hooked
#: 039 Function Name: NtCreateJobObject
Status: Not hooked
#: 040 Function Name: NtCreateJobSet
Status: Not hooked
#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9bac
#: 042 Function Name: NtCreateMailslotFile
Status: Not hooked
#: 043 Function Name: NtCreateMutant
Status: Not hooked
#: 044 Function Name: NtCreateNamedPipeFile
Status: Not hooked
#: 045 Function Name: NtCreatePagingFile
Status: Not hooked
#: 046 Function Name: NtCreatePort
Status: Not hooked
#: 047 Function Name: NtCreateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4b70
#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4bfc
#: 049 Function Name: NtCreateProfile
Status: Not hooked
#: 050 Function Name: NtCreateSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3f5e
#: 051 Function Name: NtCreateSemaphore
Status: Not hooked
#: 052 Function Name: NtCreateSymbolicLinkObject
Status: Not hooked
#: 053 Function Name: NtCreateThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4c8c
#: 054 Function Name: NtCreateTimer
Status: Not hooked
#: 055 Function Name: NtCreateToken
Status: Not hooked
#: 056 Function Name: NtCreateWaitablePort
Status: Not hooked
#: 057 Function Name: NtDebugActiveProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3fae
#: 058 Function Name: NtDebugContinue
Status: Not hooked
#: 059 Function Name: NtDelayExecution
Status: Not hooked
#: 060 Function Name: NtDeleteAtom
Status: Not hooked
#: 061 Function Name: NtDeleteBootEntry
Status: Not hooked
#: 062 Function Name: NtDeleteFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca3ff6
#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca403e
#: 064 Function Name: NtDeleteObjectAuditAlarm
Status: Not hooked
#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4086
#: 066 Function Name: NtDeviceIoControlFile
Status: Not hooked
#: 067 Function Name: NtDisplayString
Status: Not hooked
#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca40d0
#: 069 Function Name: NtDuplicateToken
Status: Not hooked
#: 070 Function Name: NtEnumerateBootEntries
Status: Not hooked
#: 071 Function Name: NtEnumerateKey
Status: Not hooked
#: 072 Function Name: NtEnumerateSystemEnvironmentValuesEx
Status: Not hooked
#: 073 Function Name: NtEnumerateValueKey
Status: Not hooked
#: 074 Function Name: NtExtendSection
Status: Not hooked
#: 075 Function Name: NtFilterToken
Status: Not hooked
#: 076 Function Name: NtFindAtom
Status: Not hooked
#: 077 Function Name: NtFlushBuffersFile
Status: Not hooked
#: 078 Function Name: NtFlushInstructionCache
Status: Not hooked
#: 079 Function Name: NtFlushKey
Status: Not hooked
#: 080 Function Name: NtFlushVirtualMemory
Status: Not hooked
#: 081 Function Name: NtFlushWriteBuffer
Status: Not hooked
#: 082 Function Name: NtFreeUserPhysicalPages
Status: Not hooked
#: 083 Function Name: NtFreeVirtualMemory
Status: Not hooked
#: 084 Function Name: NtFsControlFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca411a
#: 085 Function Name: NtGetContextThread
Status: Not hooked
#: 086 Function Name: NtGetDevicePowerState
Status: Not hooked
#: 087 Function Name: NtGetPlugPlayEvent
Status: Not hooked
#: 088 Function Name: NtGetWriteWatch
Status: Not hooked
#: 089 Function Name: NtImpersonateAnonymousToken
Status: Not hooked
#: 090 Function Name: NtImpersonateClientOfPort
Status: Not hooked
#: 091 Function Name: NtImpersonateThread
Status: Not hooked
#: 092 Function Name: NtInitializeRegistry
Status: Not hooked
#: 093 Function Name: NtInitiatePowerAction
Status: Not hooked
#: 094 Function Name: NtIsProcessInJob
Status: Not hooked
#: 095 Function Name: NtIsSystemResumeAutomatic
Status: Not hooked
#: 096 Function Name: NtListenPort
Status: Not hooked
#: 097 Function Name: NtLoadDriver
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4164
#: 098 Function Name: NtLoadKey
Status: Not hooked
#: 099 Function Name: NtLoadKey2
Status: Not hooked
#: 100 Function Name: NtLockFile
Status: Not hooked
#: 101 Function Name: NtLockProductActivationKeys
Status: Not hooked
#: 102 Function Name: NtLockRegistryKey
Status: Not hooked
#: 103 Function Name: NtLockVirtualMemory
Status: Not hooked
#: 104 Function Name: NtMakePermanentObject
Status: Not hooked
#: 105 Function Name: NtMakeTemporaryObject
Status: Not hooked
#: 106 Function Name: NtMapUserPhysicalPages
Status: Not hooked
#: 107 Function Name: NtMapUserPhysicalPagesScatter
Status: Not hooked
#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca41da
#: 109 Function Name: NtModifyBootEntry
Status: Not hooked
#: 110 Function Name: NtNotifyChangeDirectoryFile
Status: Not hooked
#: 111 Function Name: NtNotifyChangeKey
Status: Not hooked
#: 112 Function Name: NtNotifyChangeMultipleKeys
Status: Not hooked
#: 113 Function Name: NtOpenDirectoryObject
Status: Not hooked
#: 114 Function Name: NtOpenEvent
Status: Not hooked
#: 115 Function Name: NtOpenEventPair
Status: Not hooked
#: 116 Function Name: NtOpenFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4222
#: 117 Function Name: NtOpenIoCompletion
Status: Not hooked
#: 118 Function Name: NtOpenJobObject
Status: Not hooked
#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4272
#: 120 Function Name: NtOpenMutant
Status: Not hooked
#: 121 Function Name: NtOpenObjectAuditAlarm
Status: Not hooked
#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d96c2
#: 123 Function Name: NtOpenProcessToken
Status: Not hooked
#: 124 Function Name: NtOpenProcessTokenEx
Status: Not hooked
#: 125 Function Name: NtOpenSection
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca42ba
#: 126 Function Name: NtOpenSemaphore
Status: Not hooked
#: 127 Function Name: NtOpenSymbolicLinkObject
Status: Not hooked
#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4302
#: 129 Function Name: NtOpenThreadToken
Status: Not hooked
#: 130 Function Name: NtOpenThreadTokenEx
Status: Not hooked
#: 131 Function Name: NtOpenTimer
Status: Not hooked
#: 132 Function Name: NtPlugPlayControl
Status: Not hooked
#: 133 Function Name: NtPowerInformation
Status: Not hooked
#: 134 Function Name: NtPrivilegeCheck
Status: Not hooked
#: 135 Function Name: NtPrivilegeObjectAuditAlarm
Status: Not hooked
#: 136 Function Name: NtPrivilegedServiceAuditAlarm
Status: Not hooked
#: 137 Function Name: NtProtectVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca43e2
#: 138 Function Name: NtPulseEvent
Status: Not hooked
#: 139 Function Name: NtQueryAttributesFile
Status: Not hooked
#: 140 Function Name: NtQueryBootEntryOrder
Status: Not hooked
#: 141 Function Name: NtQueryBootOptions
Status: Not hooked
#: 142 Function Name: NtQueryDebugFilterState
Status: Not hooked
#: 143 Function Name: NtQueryDefaultLocale
Status: Not hooked
#: 144 Function Name: NtQueryDefaultUILanguage
Status: Not hooked
#: 145 Function Name: NtQueryDirectoryFile
Status: Not hooked
#: 146 Function Name: NtQueryDirectoryObject
Status: Not hooked
#: 147 Function Name: NtQueryEaFile
Status: Not hooked
#: 148 Function Name: NtQueryEvent
Status: Not hooked
#: 149 Function Name: NtQueryFullAttributesFile
Status: Not hooked
#: 150 Function Name: NtQueryInformationAtom
Status: Not hooked
#: 151 Function Name: NtQueryInformationFile
Status: Not hooked
#: 152 Function Name: NtQueryInformationJobObject
Status: Not hooked
#: 153 Function Name: NtQueryInformationPort
Status: Not hooked
#: 154 Function Name: NtQueryInformationProcess
Status: Not hooked
#: 155 Function Name: NtQueryInformationThread
Status: Not hooked
#: 156 Function Name: NtQueryInformationToken
Status: Not hooked
#: 157 Function Name: NtQueryInstallUILanguage
Status: Not hooked
#: 158 Function Name: NtQueryIntervalProfile
Status: Not hooked
#: 159 Function Name: NtQueryIoCompletion
Status: Not hooked
#: 160 Function Name: NtQueryKey
Status: Not hooked
#: 161 Function Name: NtQueryMultipleValueKey
Status: Not hooked
#: 162 Function Name: NtQueryMutant
Status: Not hooked
#: 163 Function Name: NtQueryObject
Status: Not hooked
#: 164 Function Name: NtQueryOpenSubKeys
Status: Not hooked
#: 165 Function Name: NtQueryPerformanceCounter
Status: Not hooked
#: 166 Function Name: NtQueryQuotaInformationFile
Status: Not hooked
#: 167 Function Name: NtQuerySection
Status: Not hooked
#: 168 Function Name: NtQuerySecurityObject
Status: Not hooked
#: 169 Function Name: NtQuerySemaphore
Status: Not hooked
#: 170 Function Name: NtQuerySymbolicLinkObject
Status: Not hooked
#: 171 Function Name: NtQuerySystemEnvironmentValue
Status: Not hooked
#: 172 Function Name: NtQuerySystemEnvironmentValueEx
Status: Not hooked
#: 173 Function Name: NtQuerySystemInformation
Status: Not hooked
#: 174 Function Name: NtQuerySystemTime
Status: Not hooked
#: 175 Function Name: NtQueryTimer
Status: Not hooked
#: 176 Function Name: NtQueryTimerResolution
Status: Not hooked
#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33d9da6
#: 178 Function Name: NtQueryVirtualMemory
Status: Not hooked
#: 179 Function Name: NtQueryVolumeInformationFile
Status: Not hooked
#: 180 Function Name: NtQueueApcThread
Status: Not hooked
#: 181 Function Name: NtRaiseException
Status: Not hooked
#: 182 Function Name: NtRaiseHardError
Status: Not hooked
#: 183 Function Name: NtReadFile
Status: Not hooked
#: 184 Function Name: NtReadFileScatter
Status: Not hooked
#: 185 Function Name: NtReadRequestData
Status: Not hooked
#: 186 Function Name: NtReadVirtualMemory
Status: Not hooked
#: 187 Function Name: NtRegisterThreadTerminatePort
Status: Not hooked
#: 188 Function Name: NtReleaseMutant
Status: Not hooked
#: 189 Function Name: NtReleaseSemaphore
Status: Not hooked
#: 190 Function Name: NtRemoveIoCompletion
Status: Not hooked
#: 191 Function Name: NtRemoveProcessDebug
Status: Not hooked
#: 192 Function Name: NtRenameKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xf33da22e
#: 193 Function Name: NtReplaceKey
Status: Not hooked
#: 194 Function Name: NtReplyPort
Status: Not hooked
#: 195 Function Name: NtReplyWaitReceivePort
Status: Not hooked
#: 196 Function Name: NtReplyWaitReceivePortEx
Status: Not hooked
#: 197 Function Name: NtReplyWaitReplyPort
Status: Not hooked
#: 198 Function Name: NtRequestDeviceWakeup
Status: Not hooked
#: 199 Function Name: NtRequestPort
Status: Not hooked
#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca434a
#: 201 Function Name: NtRequestWakeupLatency
Status: Not hooked
#: 202 Function Name: NtResetEvent
Status: Not hooked
#: 203 Function Name: NtResetWriteWatch
Status: Not hooked
#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca442a
#: 205 Function Name: NtResumeProcess
Status: Not hooked
#: 206 Function Name: NtResumeThread
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4478
#: 207 Function Name: NtSaveKey
Status: Not hooked
#: 208 Function Name: NtSaveKeyEx
Status: Not hooked
#: 209 Function Name: NtSaveMergedKeys
Status: Not hooked
#: 210 Function Name: NtSecureConnectPort
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4564
#: 211 Function Name: NtSetBootEntryOrder
Status: Not hooked
#: 212 Function Name: NtSetBootOptions
Status: Not hooked
#: 213 Function Name: NtSetContextThread
Status: Not hooked
#: 214 Function Name: NtSetDebugFilterState
Status: Not hooked
#: 215 Function Name: NtSetDefaultHardErrorPort
Status: Not hooked
#: 216 Function Name: NtSetDefaultLocale
Status: Not hooked
#: 217 Function Name: NtSetDefaultUILanguage
Status: Not hooked
#: 218 Function Name: NtSetEaFile
Status: Not hooked
#: 219 Function Name: NtSetEvent
Status: Not hooked
#: 220 Function Name: NtSetEventBoostPriority
Status: Not hooked
#: 221 Function Name: NtSetHighEventPair
Status: Not hooked
#: 222 Function Name: NtSetHighWaitLowEventPair
Status: Not hooked
#: 223 Function Name: NtSetInformationDebugObject
Status: Not hooked
#: 224 Function Name: NtSetInformationFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca44c0
#: 225 Function Name: NtSetInformationJobObject
Status: Not hooked
#: 226 Function Name: NtSetInformationKey
Status: Not hooked
#: 227 Function Name: NtSetInformationObject
Status: Not hooked
#: 228 Function Name: NtSetInformationProcess
Status: Not hooked
#: 229 Function Name: NtSetInformationThread
Status: Not hooked
#: 230 Function Name: NtSetInformationToken
Status: Not hooked
#: 231 Function Name: NtSetIntervalProfile
Status: Not hooked
#: 232 Function Name: NtSetIoCompletion
Status: Not hooked
#: 233 Function Name: NtSetLdtEntries
Status: Not hooked
#: 234 Function Name: NtSetLowEventPair
Status: Not hooked
#: 235 Function Name: NtSetLowWaitHighEventPair
Status: Not hooked
#: 236 Function Name: NtSetQuotaInformationFile
Status: Not hooked
#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4610
#: 238 Function Name: NtSetSystemEnvironmentValue
Status: Not hooked
#: 239 Function Name: NtSetSystemEnvironmentValueEx
Status: Not hooked
#: 240 Function Name: NtSetSystemInformation
Status: Not hooked
#: 241 Function Name: NtSetSystemPowerState
Status: Not hooked
#: 242 Function Name: NtSetSystemTime
Status: Not hooked
#: 243 Function Name: NtSetThreadExecutionState
Status: Not hooked
#: 244 Function Name: NtSetTimer
Status: Not hooked
#: 245 Function Name: NtSetTimerResolution
Status: Not hooked
#: 246 Function Name: NtSetUuidSeed
Status: Not hooked
#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4510
#: 248 Function Name: NtSetVolumeInformationFile
Status: Not hooked
#: 249 Function Name: NtShutdownSystem
Status: Not hooked
#: 250 Function Name: NtSignalAndWaitForSingleObject
Status: Not hooked
#: 251 Function Name: NtStartProfile
Status: Not hooked
#: 252 Function Name: NtStopProfile
Status: Not hooked
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca465a
#: 254 Function Name: NtSuspendThread
Status: Not hooked
#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca46a2
#: 256 Function Name: NtTerminateJobObject
Status: Not hooked
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca46ea
#: 258 Function Name: NtTerminateThread
Status: Not hooked
#: 259 Function Name: NtTestAlert
Status: Not hooked
#: 260 Function Name: NtTraceEvent
Status: Not hooked
#: 261 Function Name: NtTranslateFilePath
Status: Not hooked
#: 262 Function Name: NtUnloadDriver
Status: Not hooked
#: 263 Function Name: NtUnloadKey
Status: Not hooked
#: 264 Function Name: NtUnloadKeyEx
Status: Not hooked
#: 265 Function Name: NtUnlockFile
Status: Not hooked
#: 266 Function Name: NtUnlockVirtualMemory
Status: Not hooked
#: 267 Function Name: NtUnmapViewOfSection
Status: Not hooked
#: 268 Function Name: NtVdmControl
Status: Not hooked
#: 269 Function Name: NtWaitForDebugEvent
Status: Not hooked
#: 270 Function Name: NtWaitForMultipleObjects
Status: Not hooked
#: 271 Function Name: NtWaitForSingleObject
Status: Not hooked
#: 272 Function Name: NtWaitHighEventPair
Status: Not hooked
#: 273 Function Name: NtWaitLowEventPair
Status: Not hooked
#: 274 Function Name: NtWriteFile
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4738
#: 275 Function Name: NtWriteFileGather
Status: Not hooked
#: 276 Function Name: NtWriteRequestData
Status: Not hooked
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4780
#: 278 Function Name: NtYieldExecution
Status: Not hooked
#: 279 Function Name: NtCreateKeyedEvent
Status: Not hooked
#: 280 Function Name: NtOpenKeyedEvent
Status: Not hooked
#: 281 Function Name: NtReleaseKeyedEvent
Status: Not hooked
#: 282 Function Name: NtWaitForKeyedEvent
Status: Not hooked
#: 283 Function Name: NtQueryPortInformationProcess
Status: Not hooked
Nikdy není možné dobře zabezpečit svůj systém .............
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
to je poslední log který jsem vytvořil,ale systém se mi zdá stabilní,ale jakmile si to šáhne někde na disku tak to začně dělat zasek, nebo se mi objeví vpravo dole Windows- Zápis se zpožděním se nezdařil
tady poslední část logu
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Shadow SSDT
-------------------
#: 000 Function Name: NtGdiAbortDoc
Status: Not hooked
#: 001 Function Name: NtGdiAbortPath
Status: Not hooked
#: 002 Function Name: NtGdiAddFontResourceW
Status: Not hooked
#: 003 Function Name: NtGdiAddRemoteFontToDC
Status: Not hooked
#: 004 Function Name: NtGdiAddFontMemResourceEx
Status: Not hooked
#: 005 Function Name: NtGdiRemoveMergeFont
Status: Not hooked
#: 006 Function Name: NtGdiAddRemoteMMInstanceToDC
Status: Not hooked
#: 007 Function Name: NtGdiAlphaBlend
Status: Not hooked
#: 008 Function Name: NtGdiAngleArc
Status: Not hooked
#: 009 Function Name: NtGdiAnyLinkedFonts
Status: Not hooked
#: 010 Function Name: NtGdiFontIsLinked
Status: Not hooked
#: 011 Function Name: NtGdiArcInternal
Status: Not hooked
#: 012 Function Name: NtGdiBeginPath
Status: Not hooked
#: 013 Function Name: NtGdiBitBlt
Status: Not hooked
#: 014 Function Name: NtGdiCancelDC
Status: Not hooked
#: 015 Function Name: NtGdiCheckBitmapBits
Status: Not hooked
#: 016 Function Name: NtGdiCloseFigure
Status: Not hooked
#: 017 Function Name: NtGdiClearBitmapAttributes
Status: Not hooked
#: 018 Function Name: NtGdiClearBrushAttributes
Status: Not hooked
#: 019 Function Name: NtGdiColorCorrectPalette
Status: Not hooked
#: 020 Function Name: NtGdiCombineRgn
Status: Not hooked
#: 021 Function Name: NtGdiCombineTransform
Status: Not hooked
#: 022 Function Name: NtGdiComputeXformCoefficients
Status: Not hooked
#: 023 Function Name: NtGdiConsoleTextOut
Status: Not hooked
#: 024 Function Name: NtGdiConvertMetafileRect
Status: Not hooked
#: 025 Function Name: NtGdiCreateBitmap
Status: Not hooked
#: 026 Function Name: NtGdiCreateClientObj
Status: Not hooked
#: 027 Function Name: NtGdiCreateColorSpace
Status: Not hooked
#: 028 Function Name: NtGdiCreateColorTransform
Status: Not hooked
#: 029 Function Name: NtGdiCreateCompatibleBitmap
Status: Not hooked
#: 030 Function Name: NtGdiCreateCompatibleDC
Status: Not hooked
#: 031 Function Name: NtGdiCreateDIBBrush
Status: Not hooked
#: 032 Function Name: NtGdiCreateDIBitmapInternal
Status: Not hooked
#: 033 Function Name: NtGdiCreateDIBSection
Status: Not hooked
#: 034 Function Name: NtGdiCreateEllipticRgn
Status: Not hooked
#: 035 Function Name: NtGdiCreateHalftonePalette
Status: Not hooked
#: 036 Function Name: NtGdiCreateHatchBrushInternal
Status: Not hooked
#: 037 Function Name: NtGdiCreateMetafileDC
Status: Not hooked
#: 038 Function Name: NtGdiCreatePaletteInternal
Status: Not hooked
#: 039 Function Name: NtGdiCreatePatternBrushInternal
Status: Not hooked
#: 040 Function Name: NtGdiCreatePen
Status: Not hooked
#: 041 Function Name: NtGdiCreateRectRgn
Status: Not hooked
#: 042 Function Name: NtGdiCreateRoundRectRgn
Status: Not hooked
#: 043 Function Name: NtGdiCreateServerMetaFile
Status: Not hooked
#: 044 Function Name: NtGdiCreateSolidBrush
Status: Not hooked
#: 045 Function Name: NtGdiD3dContextCreate
Status: Not hooked
#: 046 Function Name: NtGdiD3dContextDestroy
Status: Not hooked
#: 047 Function Name: NtGdiD3dContextDestroyAll
Status: Not hooked
#: 048 Function Name: NtGdiD3dValidateTextureStageState
Status: Not hooked
#: 049 Function Name: NtGdiD3dDrawPrimitives2
Status: Not hooked
#: 050 Function Name: NtGdiDdGetDriverState
Status: Not hooked
#: 051 Function Name: NtGdiDdAddAttachedSurface
Status: Not hooked
#: 052 Function Name: NtGdiDdAlphaBlt
Status: Not hooked
#: 053 Function Name: NtGdiDdAttachSurface
Status: Not hooked
#: 054 Function Name: NtGdiDdBeginMoCompFrame
Status: Not hooked
#: 055 Function Name: NtGdiDdBlt
Status: Not hooked
#: 056 Function Name: NtGdiDdCanCreateSurface
Status: Not hooked
#: 057 Function Name: NtGdiDdCanCreateD3DBuffer
Status: Not hooked
#: 058 Function Name: NtGdiDdColorControl
Status: Not hooked
#: 059 Function Name: NtGdiDdCreateDirectDrawObject
Status: Not hooked
#: 060 Function Name: NtGdiDdCreateSurface
Status: Not hooked
#: 061 Function Name: NtGdiDdCreateD3DBuffer
Status: Not hooked
#: 062 Function Name: NtGdiDdCreateMoComp
Status: Not hooked
#: 063 Function Name: NtGdiDdCreateSurfaceObject
Status: Not hooked
#: 064 Function Name: NtGdiDdDeleteDirectDrawObject
Status: Not hooked
#: 065 Function Name: NtGdiDdDeleteSurfaceObject
Status: Not hooked
#: 066 Function Name: NtGdiDdDestroyMoComp
Status: Not hooked
#: 067 Function Name: NtGdiDdDestroySurface
Status: Not hooked
#: 068 Function Name: NtGdiDdDestroyD3DBuffer
Status: Not hooked
#: 069 Function Name: NtGdiDdEndMoCompFrame
Status: Not hooked
#: 070 Function Name: NtGdiDdFlip
Status: Not hooked
#: 071 Function Name: NtGdiDdFlipToGDISurface
Status: Not hooked
#: 072 Function Name: NtGdiDdGetAvailDriverMemory
Status: Not hooked
#: 073 Function Name: NtGdiDdGetBltStatus
Status: Not hooked
#: 074 Function Name: NtGdiDdGetDC
Status: Not hooked
#: 075 Function Name: NtGdiDdGetDriverInfo
Status: Not hooked
#: 076 Function Name: NtGdiDdGetDxHandle
Status: Not hooked
#: 077 Function Name: NtGdiDdGetFlipStatus
Status: Not hooked
#: 078 Function Name: NtGdiDdGetInternalMoCompInfo
Status: Not hooked
#: 079 Function Name: NtGdiDdGetMoCompBuffInfo
Status: Not hooked
#: 080 Function Name: NtGdiDdGetMoCompGuids
Status: Not hooked
#: 081 Function Name: NtGdiDdGetMoCompFormats
Status: Not hooked
#: 082 Function Name: NtGdiDdGetScanLine
Status: Not hooked
#: 083 Function Name: NtGdiDdLock
Status: Not hooked
#: 084 Function Name: NtGdiDdLockD3D
Status: Not hooked
#: 085 Function Name: NtGdiDdQueryDirectDrawObject
Status: Not hooked
#: 086 Function Name: NtGdiDdQueryMoCompStatus
Status: Not hooked
#: 087 Function Name: NtGdiDdReenableDirectDrawObject
Status: Not hooked
#: 088 Function Name: NtGdiDdReleaseDC
Status: Not hooked
#: 089 Function Name: NtGdiDdRenderMoComp
Status: Not hooked
#: 090 Function Name: NtGdiDdResetVisrgn
Status: Not hooked
#: 091 Function Name: NtGdiDdSetColorKey
Status: Not hooked
#: 092 Function Name: NtGdiDdSetExclusiveMode
Status: Not hooked
#: 093 Function Name: NtGdiDdSetGammaRamp
Status: Not hooked
#: 094 Function Name: NtGdiDdCreateSurfaceEx
Status: Not hooked
#: 095 Function Name: NtGdiDdSetOverlayPosition
Status: Not hooked
#: 096 Function Name: NtGdiDdUnattachSurface
Status: Not hooked
#: 097 Function Name: NtGdiDdUnlock
Status: Not hooked
#: 098 Function Name: NtGdiDdUnlockD3D
Status: Not hooked
#: 099 Function Name: NtGdiDdUpdateOverlay
Status: Not hooked
#: 100 Function Name: NtGdiDdWaitForVerticalBlank
Status: Not hooked
#: 101 Function Name: NtGdiDvpCanCreateVideoPort
Status: Not hooked
#: 102 Function Name: NtGdiDvpColorControl
Status: Not hooked
#: 103 Function Name: NtGdiDvpCreateVideoPort
Status: Not hooked
#: 104 Function Name: NtGdiDvpDestroyVideoPort
Status: Not hooked
#: 105 Function Name: NtGdiDvpFlipVideoPort
Status: Not hooked
#: 106 Function Name: NtGdiDvpGetVideoPortBandwidth
Status: Not hooked
#: 107 Function Name: NtGdiDvpGetVideoPortField
Status: Not hooked
#: 108 Function Name: NtGdiDvpGetVideoPortFlipStatus
Status: Not hooked
#: 109 Function Name: NtGdiDvpGetVideoPortInputFormats
Status: Not hooked
#: 110 Function Name: NtGdiDvpGetVideoPortLine
Status: Not hooked
#: 111 Function Name: NtGdiDvpGetVideoPortOutputFormats
Status: Not hooked
#: 112 Function Name: NtGdiDvpGetVideoPortConnectInfo
Status: Not hooked
#: 113 Function Name: NtGdiDvpGetVideoSignalStatus
Status: Not hooked
#: 114 Function Name: NtGdiDvpUpdateVideoPort
Status: Not hooked
#: 115 Function Name: NtGdiDvpWaitForVideoPortSync
Status: Not hooked
#: 116 Function Name: NtGdiDvpAcquireNotification
Status: Not hooked
#: 117 Function Name: NtGdiDvpReleaseNotification
Status: Not hooked
#: 118 Function Name: NtGdiDxgGenericThunk
Status: Not hooked
#: 119 Function Name: NtGdiDeleteClientObj
Status: Not hooked
#: 120 Function Name: NtGdiDeleteColorSpace
Status: Not hooked
#: 121 Function Name: NtGdiDeleteColorTransform
Status: Not hooked
#: 122 Function Name: NtGdiDeleteObjectApp
Status: Not hooked
#: 123 Function Name: NtGdiDescribePixelFormat
Status: Not hooked
#: 124 Function Name: NtGdiGetPerBandInfo
Status: Not hooked
#: 125 Function Name: NtGdiDoBanding
Status: Not hooked
#: 126 Function Name: NtGdiDoPalette
Status: Not hooked
#: 127 Function Name: NtGdiDrawEscape
Status: Not hooked
#: 128 Function Name: NtGdiEllipse
Status: Not hooked
#: 129 Function Name: NtGdiEnableEudc
Status: Not hooked
#: 130 Function Name: NtGdiEndDoc
Status: Not hooked
#: 131 Function Name: NtGdiEndPage
Status: Not hooked
#: 132 Function Name: NtGdiEndPath
Status: Not hooked
#: 133 Function Name: NtGdiEnumFontChunk
Status: Not hooked
#: 134 Function Name: NtGdiEnumFontClose
Status: Not hooked
#: 135 Function Name: NtGdiEnumFontOpen
Status: Not hooked
#: 136 Function Name: NtGdiEnumObjects
Status: Not hooked
#: 137 Function Name: NtGdiEqualRgn
Status: Not hooked
#: 138 Function Name: NtGdiEudcLoadUnloadLink
Status: Not hooked
#: 139 Function Name: NtGdiExcludeClipRect
Status: Not hooked
#: 140 Function Name: NtGdiExtCreatePen
Status: Not hooked
#: 141 Function Name: NtGdiExtCreateRegion
Status: Not hooked
#: 142 Function Name: NtGdiExtEscape
Status: Not hooked
#: 143 Function Name: NtGdiExtFloodFill
Status: Not hooked
#: 144 Function Name: NtGdiExtGetObjectW
Status: Not hooked
#: 145 Function Name: NtGdiExtSelectClipRgn
Status: Not hooked
#: 146 Function Name: NtGdiExtTextOutW
Status: Not hooked
#: 147 Function Name: NtGdiFillPath
Status: Not hooked
#: 148 Function Name: NtGdiFillRgn
Status: Not hooked
#: 149 Function Name: NtGdiFlattenPath
Status: Not hooked
#: 150 Function Name: NtGdiFlushUserBatch
Status: Not hooked
#: 151 Function Name: NtGdiFlush
Status: Not hooked
#: 152 Function Name: NtGdiForceUFIMapping
Status: Not hooked
#: 153 Function Name: NtGdiFrameRgn
Status: Not hooked
#: 154 Function Name: NtGdiFullscreenControl
Status: Not hooked
#: 155 Function Name: NtGdiGetAndSetDCDword
Status: Not hooked
#: 156 Function Name: NtGdiGetAppClipBox
Status: Not hooked
#: 157 Function Name: NtGdiGetBitmapBits
Status: Not hooked
#: 158 Function Name: NtGdiGetBitmapDimension
Status: Not hooked
#: 159 Function Name: NtGdiGetBoundsRect
Status: Not hooked
#: 160 Function Name: NtGdiGetCharABCWidthsW
Status: Not hooked
#: 161 Function Name: NtGdiGetCharacterPlacementW
Status: Not hooked
#: 162 Function Name: NtGdiGetCharSet
Status: Not hooked
#: 163 Function Name: NtGdiGetCharWidthW
Status: Not hooked
#: 164 Function Name: NtGdiGetCharWidthInfo
Status: Not hooked
#: 165 Function Name: NtGdiGetColorAdjustment
Status: Not hooked
#: 166 Function Name: NtGdiGetColorSpaceforBitmap
Status: Not hooked
#: 167 Function Name: NtGdiGetDCDword
Status: Not hooked
#: 168 Function Name: NtGdiGetDCforBitmap
Status: Not hooked
#: 169 Function Name: NtGdiGetDCObject
Status: Not hooked
#: 170 Function Name: NtGdiGetDCPoint
Status: Not hooked
#: 171 Function Name: NtGdiGetDeviceCaps
Status: Not hooked
#: 172 Function Name: NtGdiGetDeviceGammaRamp
Status: Not hooked
#: 173 Function Name: NtGdiGetDeviceCapsAll
Status: Not hooked
#: 174 Function Name: NtGdiGetDIBitsInternal
Status: Not hooked
#: 175 Function Name: NtGdiGetETM
Status: Not hooked
#: 176 Function Name: NtGdiGetEudcTimeStampEx
Status: Not hooked
#: 177 Function Name: NtGdiGetFontData
Status: Not hooked
#: 178 Function Name: NtGdiGetFontResourceInfoInternalW
Status: Not hooked
#: 179 Function Name: NtGdiGetGlyphIndicesW
Status: Not hooked
#: 180 Function Name: NtGdiGetGlyphIndicesWInternal
Status: Not hooked
#: 181 Function Name: NtGdiGetGlyphOutline
Status: Not hooked
#: 182 Function Name: NtGdiGetKerningPairs
Status: Not hooked
#: 183 Function Name: NtGdiGetLinkedUFIs
Status: Not hooked
#: 184 Function Name: NtGdiGetMiterLimit
Status: Not hooked
#: 185 Function Name: NtGdiGetMonitorID
Status: Not hooked
#: 186 Function Name: NtGdiGetNearestColor
Status: Not hooked
#: 187 Function Name: NtGdiGetNearestPaletteIndex
Status: Not hooked
#: 188 Function Name: NtGdiGetObjectBitmapHandle
Status: Not hooked
#: 189 Function Name: NtGdiGetOutlineTextMetricsInternalW
Status: Not hooked
#: 190 Function Name: NtGdiGetPath
Status: Not hooked
#: 191 Function Name: NtGdiGetPixel
Status: Not hooked
#: 192 Function Name: NtGdiGetRandomRgn
Status: Not hooked
#: 193 Function Name: NtGdiGetRasterizerCaps
Status: Not hooked
#: 194 Function Name: NtGdiGetRealizationInfo
Status: Not hooked
#: 195 Function Name: NtGdiGetRegionData
Status: Not hooked
#: 196 Function Name: NtGdiGetRgnBox
Status: Not hooked
#: 197 Function Name: NtGdiGetServerMetaFileBits
Status: Not hooked
#: 198 Function Name: NtGdiGetSpoolMessage
Status: Not hooked
#: 199 Function Name: NtGdiGetStats
Status: Not hooked
#: 200 Function Name: NtGdiGetStockObject
Status: Not hooked
#: 201 Function Name: NtGdiGetStringBitmapW
Status: Not hooked
#: 202 Function Name: NtGdiGetSystemPaletteUse
Status: Not hooked
#: 203 Function Name: NtGdiGetTextCharsetInfo
Status: Not hooked
#: 204 Function Name: NtGdiGetTextExtent
Status: Not hooked
#: 205 Function Name: NtGdiGetTextExtentExW
Status: Not hooked
#: 206 Function Name: NtGdiGetTextFaceW
Status: Not hooked
#: 207 Function Name: NtGdiGetTextMetricsW
Status: Not hooked
#: 208 Function Name: NtGdiGetTransform
Status: Not hooked
#: 209 Function Name: NtGdiGetUFI
Status: Not hooked
#: 210 Function Name: NtGdiGetEmbUFI
Status: Not hooked
#: 211 Function Name: NtGdiGetUFIPathname
Status: Not hooked
#: 212 Function Name: NtGdiGetEmbedFonts
Status: Not hooked
#: 213 Function Name: NtGdiChangeGhostFont
Status: Not hooked
#: 214 Function Name: NtGdiAddEmbFontToDC
Status: Not hooked
#: 215 Function Name: NtGdiGetFontUnicodeRanges
Status: Not hooked
#: 216 Function Name: NtGdiGetWidthTable
Status: Not hooked
#: 217 Function Name: NtGdiGradientFill
Status: Not hooked
#: 218 Function Name: NtGdiHfontCreate
Status: Not hooked
#: 219 Function Name: NtGdiIcmBrushInfo
Status: Not hooked
#: 220 Function Name: NtGdiInit
Status: Not hooked
#: 221 Function Name: NtGdiInitSpool
Status: Not hooked
#: 222 Function Name: NtGdiIntersectClipRect
Status: Not hooked
#: 223 Function Name: NtGdiInvertRgn
Status: Not hooked
#: 224 Function Name: NtGdiLineTo
Status: Not hooked
#: 225 Function Name: NtGdiMakeFontDir
Status: Not hooked
#: 226 Function Name: NtGdiMakeInfoDC
Status: Not hooked
#: 227 Function Name: NtGdiMaskBlt
Status: Not hooked
#: 228 Function Name: NtGdiModifyWorldTransform
Status: Not hooked
#: 229 Function Name: NtGdiMonoBitmap
Status: Not hooked
#: 230 Function Name: NtGdiMoveTo
Status: Not hooked
#: 231 Function Name: NtGdiOffsetClipRgn
Status: Not hooked
#: 232 Function Name: NtGdiOffsetRgn
Status: Not hooked
#: 233 Function Name: NtGdiOpenDCW
Status: Not hooked
#: 234 Function Name: NtGdiPatBlt
Status: Not hooked
#: 235 Function Name: NtGdiPolyPatBlt
Status: Not hooked
#: 236 Function Name: NtGdiPathToRegion
Status: Not hooked
#: 237 Function Name: NtGdiPlgBlt
Status: Not hooked
#: 238 Function Name: NtGdiPolyDraw
Status: Not hooked
#: 239 Function Name: NtGdiPolyPolyDraw
Status: Not hooked
#: 240 Function Name: NtGdiPolyTextOutW
Status: Not hooked
#: 241 Function Name: NtGdiPtInRegion
Status: Not hooked
#: 242 Function Name: NtGdiPtVisible
Status: Not hooked
#: 243 Function Name: NtGdiQueryFonts
Status: Not hooked
#: 244 Function Name: NtGdiQueryFontAssocInfo
Status: Not hooked
#: 245 Function Name: NtGdiRectangle
Status: Not hooked
#: 246 Function Name: NtGdiRectInRegion
Status: Not hooked
#: 247 Function Name: NtGdiRectVisible
Status: Not hooked
#: 248 Function Name: NtGdiRemoveFontResourceW
Status: Not hooked
#: 249 Function Name: NtGdiRemoveFontMemResourceEx
Status: Not hooked
#: 250 Function Name: NtGdiResetDC
Status: Not hooked
#: 251 Function Name: NtGdiResizePalette
Status: Not hooked
#: 252 Function Name: NtGdiRestoreDC
Status: Not hooked
#: 253 Function Name: NtGdiRoundRect
Status: Not hooked
#: 254 Function Name: NtGdiSaveDC
Status: Not hooked
#: 255 Function Name: NtGdiScaleViewportExtEx
Status: Not hooked
#: 256 Function Name: NtGdiScaleWindowExtEx
Status: Not hooked
#: 257 Function Name: NtGdiSelectBitmap
Status: Not hooked
#: 258 Function Name: NtGdiSelectBrush
Status: Not hooked
#: 259 Function Name: NtGdiSelectClipPath
Status: Not hooked
#: 260 Function Name: NtGdiSelectFont
Status: Not hooked
#: 261 Function Name: NtGdiSelectPen
Status: Not hooked
#: 262 Function Name: NtGdiSetBitmapAttributes
Status: Not hooked
#: 263 Function Name: NtGdiSetBitmapBits
Status: Not hooked
#: 264 Function Name: NtGdiSetBitmapDimension
Status: Not hooked
#: 265 Function Name: NtGdiSetBoundsRect
Status: Not hooked
#: 266 Function Name: NtGdiSetBrushAttributes
Status: Not hooked
#: 267 Function Name: NtGdiSetBrushOrg
Status: Not hooked
#: 268 Function Name: NtGdiSetColorAdjustment
Status: Not hooked
#: 269 Function Name: NtGdiSetColorSpace
Status: Not hooked
#: 270 Function Name: NtGdiSetDeviceGammaRamp
Status: Not hooked
#: 271 Function Name: NtGdiSetDIBitsToDeviceInternal
Status: Not hooked
#: 272 Function Name: NtGdiSetFontEnumeration
Status: Not hooked
#: 273 Function Name: NtGdiSetFontXform
Status: Not hooked
#: 274 Function Name: NtGdiSetIcmMode
Status: Not hooked
#: 275 Function Name: NtGdiSetLinkedUFIs
Status: Not hooked
#: 276 Function Name: NtGdiSetMagicColors
Status: Not hooked
#: 277 Function Name: NtGdiSetMetaRgn
Status: Not hooked
#: 278 Function Name: NtGdiSetMiterLimit
Status: Not hooked
#: 279 Function Name: NtGdiGetDeviceWidth
Status: Not hooked
#: 280 Function Name: NtGdiMirrorWindowOrg
Status: Not hooked
#: 281 Function Name: NtGdiSetLayout
Status: Not hooked
#: 282 Function Name: NtGdiSetPixel
Status: Not hooked
#: 283 Function Name: NtGdiSetPixelFormat
Status: Not hooked
#: 284 Function Name: NtGdiSetRectRgn
Status: Not hooked
#: 285 Function Name: NtGdiSetSystemPaletteUse
Status: Not hooked
#: 286 Function Name: NtGdiSetTextJustification
Status: Not hooked
#: 287 Function Name: NtGdiSetupPublicCFONT
Status: Not hooked
#: 288 Function Name: NtGdiSetVirtualResolution
Status: Not hooked
#: 289 Function Name: NtGdiSetSizeDevice
Status: Not hooked
#: 290 Function Name: NtGdiStartDoc
Status: Not hooked
#: 291 Function Name: NtGdiStartPage
Status: Not hooked
#: 292 Function Name: NtGdiStretchBlt
Status: Not hooked
#: 293 Function Name: NtGdiStretchDIBitsInternal
Status: Not hooked
#: 294 Function Name: NtGdiStrokeAndFillPath
Status: Not hooked
#: 295 Function Name: NtGdiStrokePath
Status: Not hooked
#: 296 Function Name: NtGdiSwapBuffers
Status: Not hooked
#: 297 Function Name: NtGdiTransformPoints
Status: Not hooked
#: 298 Function Name: NtGdiTransparentBlt
Status: Not hooked
#: 299 Function Name: NtGdiUnloadPrinterDriver
Status: Not hooked
#: 300 Function Name: NtGdiUnmapMemFont
Status: Not hooked
#: 301 Function Name: NtGdiUnrealizeObject
Status: Not hooked
#: 302 Function Name: NtGdiUpdateColors
Status: Not hooked
#: 303 Function Name: NtGdiWidenPath
Status: Not hooked
#: 304 Function Name: NtUserActivateKeyboardLayout
Status: Not hooked
#: 305 Function Name: NtUserAlterWindowStyle
Status: Not hooked
#: 306 Function Name: NtUserAssociateInputContext
Status: Not hooked
#: 307 Function Name: NtUserAttachThreadInput
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca47c8
#: 308 Function Name: NtUserBeginPaint
Status: Not hooked
#: 309 Function Name: NtUserBitBltSysBmp
Status: Not hooked
#: 310 Function Name: NtUserBlockInput
Status: Not hooked
#: 311 Function Name: NtUserBuildHimcList
Status: Not hooked
#: 312 Function Name: NtUserBuildHwndList
Status: Not hooked
#: 313 Function Name: NtUserBuildNameList
Status: Not hooked
#: 314 Function Name: NtUserBuildPropList
Status: Not hooked
#: 315 Function Name: NtUserCallHwnd
Status: Not hooked
#: 316 Function Name: NtUserCallHwndLock
Status: Not hooked
#: 317 Function Name: NtUserCallHwndOpt
Status: Not hooked
#: 318 Function Name: NtUserCallHwndParam
Status: Not hooked
#: 319 Function Name: NtUserCallHwndParamLock
Status: Not hooked
#: 320 Function Name: NtUserCallMsgFilter
Status: Not hooked
#: 321 Function Name: NtUserCallNextHookEx
Status: Not hooked
#: 322 Function Name: NtUserCallNoParam
Status: Not hooked
#: 323 Function Name: NtUserCallOneParam
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4816
#: 324 Function Name: NtUserCallTwoParam
Status: Not hooked
#: 325 Function Name: NtUserChangeClipboardChain
Status: Not hooked
#: 326 Function Name: NtUserChangeDisplaySettings
Status: Not hooked
#: 327 Function Name: NtUserCheckImeHotKey
Status: Not hooked
#: 328 Function Name: NtUserCheckMenuItem
Status: Not hooked
#: 329 Function Name: NtUserChildWindowFromPointEx
Status: Not hooked
#: 330 Function Name: NtUserClipCursor
Status: Not hooked
#: 331 Function Name: NtUserCloseClipboard
Status: Not hooked
#: 332 Function Name: NtUserCloseDesktop
Status: Not hooked
#: 333 Function Name: NtUserCloseWindowStation
Status: Not hooked
#: 334 Function Name: NtUserConsoleControl
Status: Not hooked
#: 335 Function Name: NtUserConvertMemHandle
Status: Not hooked
#: 336 Function Name: NtUserCopyAcceleratorTable
Status: Not hooked
#: 337 Function Name: NtUserCountClipboardFormats
Status: Not hooked
#: 338 Function Name: NtUserCreateAcceleratorTable
Status: Not hooked
#: 339 Function Name: NtUserCreateCaret
Status: Not hooked
#: 340 Function Name: NtUserCreateDesktop
Status: Not hooked
#: 341 Function Name: NtUserCreateInputContext
Status: Not hooked
#: 342 Function Name: NtUserCreateLocalMemHandle
Status: Not hooked
#: 343 Function Name: NtUserCreateWindowEx
Status: Not hooked
#: 344 Function Name: NtUserCreateWindowStation
Status: Not hooked
#: 345 Function Name: NtUserDdeGetQualityOfService
Status: Not hooked
#: 346 Function Name: NtUserDdeInitialize
Status: Not hooked
#: 347 Function Name: NtUserDdeSetQualityOfService
Status: Not hooked
#: 348 Function Name: NtUserDeferWindowPos
Status: Not hooked
#: 349 Function Name: NtUserDefSetText
Status: Not hooked
#: 350 Function Name: NtUserDeleteMenu
Status: Not hooked
#: 351 Function Name: NtUserDestroyAcceleratorTable
Status: Not hooked
#: 352 Function Name: NtUserDestroyCursor
Status: Not hooked
#: 353 Function Name: NtUserDestroyInputContext
Status: Not hooked
#: 354 Function Name: NtUserDestroyMenu
Status: Not hooked
#: 355 Function Name: NtUserDestroyWindow
Status: Not hooked
#: 356 Function Name: NtUserDisableThreadIme
Status: Not hooked
#: 357 Function Name: NtUserDispatchMessage
Status: Not hooked
#: 358 Function Name: NtUserDragDetect
Status: Not hooked
#: 359 Function Name: NtUserDragObject
Status: Not hooked
#: 360 Function Name: NtUserDrawAnimatedRects
Status: Not hooked
#: 361 Function Name: NtUserDrawCaption
Status: Not hooked
#: 362 Function Name: NtUserDrawCaptionTemp
Status: Not hooked
#: 363 Function Name: NtUserDrawIconEx
Status: Not hooked
#: 364 Function Name: NtUserDrawMenuBarTemp
Status: Not hooked
#: 365 Function Name: NtUserEmptyClipboard
Status: Not hooked
#: 366 Function Name: NtUserEnableMenuItem
Status: Not hooked
#: 367 Function Name: NtUserEnableScrollBar
Status: Not hooked
#: 368 Function Name: NtUserEndDeferWindowPosEx
Status: Not hooked
#: 369 Function Name: NtUserEndMenu
Status: Not hooked
#: 370 Function Name: NtUserEndPaint
Status: Not hooked
#: 371 Function Name: NtUserEnumDisplayDevices
Status: Not hooked
#: 372 Function Name: NtUserEnumDisplayMonitors
Status: Not hooked
#: 373 Function Name: NtUserEnumDisplaySettings
Status: Not hooked
#: 374 Function Name: NtUserEvent
Status: Not hooked
#: 375 Function Name: NtUserExcludeUpdateRgn
Status: Not hooked
#: 376 Function Name: NtUserFillWindow
Status: Not hooked
#: 377 Function Name: NtUserFindExistingCursorIcon
Status: Not hooked
#: 378 Function Name: NtUserFindWindowEx
Status: Not hooked
#: 379 Function Name: NtUserFlashWindowEx
Status: Not hooked
#: 380 Function Name: NtUserGetAltTabInfo
Status: Not hooked
#: 381 Function Name: NtUserGetAncestor
Status: Not hooked
#: 382 Function Name: NtUserGetAppImeLevel
Status: Not hooked
#: 383 Function Name: NtUserGetAsyncKeyState
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4860
#: 384 Function Name: NtUserGetAtomName
Status: Not hooked
#: 385 Function Name: NtUserGetCaretBlinkTime
Status: Not hooked
#: 386 Function Name: NtUserGetCaretPos
Status: Not hooked
#: 387 Function Name: NtUserGetClassInfo
Status: Not hooked
#: 388 Function Name: NtUserGetClassName
Status: Not hooked
#: 389 Function Name: NtUserGetClipboardData
Status: Not hooked
#: 390 Function Name: NtUserGetClipboardFormatName
Status: Not hooked
#: 391 Function Name: NtUserGetClipboardOwner
Status: Not hooked
#: 392 Function Name: NtUserGetClipboardSequenceNumber
Status: Not hooked
#: 393 Function Name: NtUserGetClipboardViewer
Status: Not hooked
#: 394 Function Name: NtUserGetClipCursor
Status: Not hooked
#: 395 Function Name: NtUserGetComboBoxInfo
Status: Not hooked
#: 396 Function Name: NtUserGetControlBrush
Status: Not hooked
#: 397 Function Name: NtUserGetControlColor
Status: Not hooked
#: 398 Function Name: NtUserGetCPD
Status: Not hooked
#: 399 Function Name: NtUserGetCursorFrameInfo
Status: Not hooked
#: 400 Function Name: NtUserGetCursorInfo
Status: Not hooked
#: 401 Function Name: NtUserGetDC
Status: Not hooked
#: 402 Function Name: NtUserGetDCEx
Status: Not hooked
#: 403 Function Name: NtUserGetDoubleClickTime
Status: Not hooked
#: 404 Function Name: NtUserGetForegroundWindow
Status: Not hooked
#: 405 Function Name: NtUserGetGuiResources
Status: Not hooked
#: 406 Function Name: NtUserGetGUIThreadInfo
Status: Not hooked
#: 407 Function Name: NtUserGetIconInfo
Status: Not hooked
#: 408 Function Name: NtUserGetIconSize
Status: Not hooked
#: 409 Function Name: NtUserGetImeHotKey
Status: Not hooked
#: 410 Function Name: NtUserGetImeInfoEx
Status: Not hooked
#: 411 Function Name: NtUserGetInternalWindowPos
Status: Not hooked
#: 412 Function Name: NtUserGetKeyboardLayoutList
Status: Not hooked
#: 413 Function Name: NtUserGetKeyboardLayoutName
Status: Not hooked
#: 414 Function Name: NtUserGetKeyboardState
Status: Not hooked
#: 415 Function Name: NtUserGetKeyNameText
Status: Not hooked
#: 416 Function Name: NtUserGetKeyState
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca48aa
#: 417 Function Name: NtUserGetListBoxInfo
Status: Not hooked
#: 418 Function Name: NtUserGetMenuBarInfo
Status: Not hooked
#: 419 Function Name: NtUserGetMenuIndex
Status: Not hooked
#: 420 Function Name: NtUserGetMenuItemRect
Status: Not hooked
#: 421 Function Name: NtUserGetMessage
Status: Not hooked
#: 422 Function Name: NtUserGetMouseMovePointsEx
Status: Not hooked
#: 423 Function Name: NtUserGetObjectInformation
Status: Not hooked
#: 424 Function Name: NtUserGetOpenClipboardWindow
Status: Not hooked
#: 425 Function Name: NtUserGetPriorityClipboardFormat
Status: Not hooked
#: 426 Function Name: NtUserGetProcessWindowStation
Status: Not hooked
#: 427 Function Name: NtUserGetRawInputBuffer
Status: Not hooked
#: 428 Function Name: NtUserGetRawInputData
Status: Not hooked
#: 429 Function Name: NtUserGetRawInputDeviceInfo
Status: Not hooked
#: 430 Function Name: NtUserGetRawInputDeviceList
Status: Not hooked
#: 431 Function Name: NtUserGetRegisteredRawInputDevices
Status: Not hooked
#: 432 Function Name: NtUserGetScrollBarInfo
Status: Not hooked
#: 433 Function Name: NtUserGetSystemMenu
Status: Not hooked
#: 434 Function Name: NtUserGetThreadDesktop
Status: Not hooked
#: 435 Function Name: NtUserGetThreadState
Status: Not hooked
#: 436 Function Name: NtUserGetTitleBarInfo
Status: Not hooked
#: 437 Function Name: NtUserGetUpdateRect
Status: Not hooked
#: 438 Function Name: NtUserGetUpdateRgn
Status: Not hooked
#: 439 Function Name: NtUserGetWindowDC
Status: Not hooked
#: 440 Function Name: NtUserGetWindowPlacement
Status: Not hooked
#: 441 Function Name: NtUserGetWOWClass
Status: Not hooked
#: 442 Function Name: NtUserHardErrorControl
Status: Not hooked
#: 443 Function Name: NtUserHideCaret
Status: Not hooked
#: 444 Function Name: NtUserHiliteMenuItem
Status: Not hooked
#: 445 Function Name: NtUserImpersonateDdeClientWindow
Status: Not hooked
#: 446 Function Name: NtUserInitialize
Status: Not hooked
#: 447 Function Name: NtUserInitializeClientPfnArrays
Status: Not hooked
#: 448 Function Name: NtUserInitTask
Status: Not hooked
#: 449 Function Name: NtUserInternalGetWindowText
Status: Not hooked
#: 450 Function Name: NtUserInvalidateRect
Status: Not hooked
#: 451 Function Name: NtUserInvalidateRgn
Status: Not hooked
#: 452 Function Name: NtUserIsClipboardFormatAvailable
Status: Not hooked
#: 453 Function Name: NtUserKillTimer
Status: Not hooked
#: 454 Function Name: NtUserLoadKeyboardLayoutEx
Status: Not hooked
#: 455 Function Name: NtUserLockWindowStation
Status: Not hooked
#: 456 Function Name: NtUserLockWindowUpdate
Status: Not hooked
#: 457 Function Name: NtUserLockWorkStation
Status: Not hooked
#: 458 Function Name: NtUserMapVirtualKeyEx
Status: Not hooked
#: 459 Function Name: NtUserMenuItemFromPoint
Status: Not hooked
#: 460 Function Name: NtUserMessageCall
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca48f4
#: 461 Function Name: NtUserMinMaximize
Status: Not hooked
#: 462 Function Name: NtUserMNDragLeave
Status: Not hooked
#: 463 Function Name: NtUserMNDragOver
Status: Not hooked
#: 464 Function Name: NtUserModifyUserStartupInfoFlags
Status: Not hooked
#: 465 Function Name: NtUserMoveWindow
Status: Not hooked
#: 466 Function Name: NtUserNotifyIMEStatus
Status: Not hooked
#: 467 Function Name: NtUserNotifyProcessCreate
Status: Not hooked
#: 468 Function Name: NtUserNotifyWinEvent
Status: Not hooked
#: 469 Function Name: NtUserOpenClipboard
Status: Not hooked
#: 470 Function Name: NtUserOpenDesktop
Status: Not hooked
#: 471 Function Name: NtUserOpenInputDesktop
Status: Not hooked
#: 472 Function Name: NtUserOpenWindowStation
Status: Not hooked
#: 473 Function Name: NtUserPaintDesktop
Status: Not hooked
#: 474 Function Name: NtUserPeekMessage
Status: Not hooked
#: 475 Function Name: NtUserPostMessage
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4952
#: 476 Function Name: NtUserPostThreadMessage
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca49b0
#: 477 Function Name: NtUserPrintWindow
Status: Not hooked
#: 478 Function Name: NtUserProcessConnect
Status: Not hooked
#: 479 Function Name: NtUserQueryInformationThread
Status: Not hooked
#: 480 Function Name: NtUserQueryInputContext
Status: Not hooked
#: 481 Function Name: NtUserQuerySendMessage
Status: Not hooked
#: 482 Function Name: NtUserQueryUserCounters
Status: Not hooked
#: 483 Function Name: NtUserQueryWindow
Status: Not hooked
#: 484 Function Name: NtUserRealChildWindowFromPoint
Status: Not hooked
#: 485 Function Name: NtUserRealInternalGetMessage
Status: Not hooked
#: 486 Function Name: NtUserRealWaitMessageEx
Status: Not hooked
#: 487 Function Name: NtUserRedrawWindow
Status: Not hooked
#: 488 Function Name: NtUserRegisterClassExWOW
Status: Not hooked
#: 489 Function Name: NtUserRegisterUserApiHook
Status: Not hooked
#: 490 Function Name: NtUserRegisterHotKey
Status: Not hooked
#: 491 Function Name: NtUserRegisterRawInputDevices
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4a0e
#: 492 Function Name: NtUserRegisterTasklist
Status: Not hooked
#: 493 Function Name: NtUserRegisterWindowMessage
Status: Not hooked
#: 494 Function Name: NtUserRemoveMenu
Status: Not hooked
#: 495 Function Name: NtUserRemoveProp
Status: Not hooked
#: 496 Function Name: NtUserResolveDesktop
Status: Not hooked
#: 497 Function Name: NtUserResolveDesktopForWOW
Status: Not hooked
#: 498 Function Name: NtUserSBGetParms
Status: Not hooked
#: 499 Function Name: NtUserScrollDC
Status: Not hooked
#: 500 Function Name: NtUserScrollWindowEx
Status: Not hooked
#: 501 Function Name: NtUserSelectPalette
Status: Not hooked
#: 502 Function Name: NtUserSendInput
Status: Not hooked
#: 503 Function Name: NtUserSetActiveWindow
Status: Not hooked
#: 504 Function Name: NtUserSetAppImeLevel
Status: Not hooked
#: 505 Function Name: NtUserSetCapture
Status: Not hooked
#: 506 Function Name: NtUserSetClassLong
Status: Not hooked
#: 507 Function Name: NtUserSetClassWord
Status: Not hooked
#: 508 Function Name: NtUserSetClipboardData
Status: Not hooked
#: 509 Function Name: NtUserSetClipboardViewer
Status: Not hooked
#: 510 Function Name: NtUserSetConsoleReserveKeys
Status: Not hooked
#: 511 Function Name: NtUserSetCursor
Status: Not hooked
#: 512 Function Name: NtUserSetCursorContents
Status: Not hooked
#: 513 Function Name: NtUserSetCursorIconData
Status: Not hooked
#: 514 Function Name: NtUserSetDbgTag
Status: Not hooked
#: 515 Function Name: NtUserSetFocus
Status: Not hooked
#: 516 Function Name: NtUserSetImeHotKey
Status: Not hooked
#: 517 Function Name: NtUserSetImeInfoEx
Status: Not hooked
#: 518 Function Name: NtUserSetImeOwnerWindow
Status: Not hooked
#: 519 Function Name: NtUserSetInformationProcess
Status: Not hooked
#: 520 Function Name: NtUserSetInformationThread
Status: Not hooked
#: 521 Function Name: NtUserSetInternalWindowPos
Status: Not hooked
#: 522 Function Name: NtUserSetKeyboardState
Status: Not hooked
#: 523 Function Name: NtUserSetLogonNotifyWindow
Status: Not hooked
#: 524 Function Name: NtUserSetMenu
Status: Not hooked
#: 525 Function Name: NtUserSetMenuContextHelpId
Status: Not hooked
#: 526 Function Name: NtUserSetMenuDefaultItem
Status: Not hooked
#: 527 Function Name: NtUserSetMenuFlagRtoL
Status: Not hooked
#: 528 Function Name: NtUserSetObjectInformation
Status: Not hooked
#: 529 Function Name: NtUserSetParent
Status: Not hooked
#: 530 Function Name: NtUserSetProcessWindowStation
Status: Not hooked
#: 531 Function Name: NtUserSetProp
Status: Not hooked
#: 532 Function Name: NtUserSetRipFlags
Status: Not hooked
#: 533 Function Name: NtUserSetScrollInfo
Status: Not hooked
#: 534 Function Name: NtUserSetShellWindowEx
Status: Not hooked
#: 535 Function Name: NtUserSetSysColors
Status: Not hooked
#: 536 Function Name: NtUserSetSystemCursor
Status: Not hooked
#: 537 Function Name: NtUserSetSystemMenu
Status: Not hooked
#: 538 Function Name: NtUserSetSystemTimer
Status: Not hooked
#: 539 Function Name: NtUserSetThreadDesktop
Status: Not hooked
#: 540 Function Name: NtUserSetThreadLayoutHandles
Status: Not hooked
#: 541 Function Name: NtUserSetThreadState
Status: Not hooked
#: 542 Function Name: NtUserSetTimer
Status: Not hooked
#: 543 Function Name: NtUserSetWindowFNID
Status: Not hooked
#: 544 Function Name: NtUserSetWindowLong
Status: Not hooked
#: 545 Function Name: NtUserSetWindowPlacement
Status: Not hooked
#: 546 Function Name: NtUserSetWindowPos
Status: Not hooked
#: 547 Function Name: NtUserSetWindowRgn
Status: Not hooked
#: 548 Function Name: NtUserSetWindowsHookAW
Status: Not hooked
#: 549 Function Name: NtUserSetWindowsHookEx
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4ab0
#: 550 Function Name: NtUserSetWindowStationUser
Status: Not hooked
#: 551 Function Name: NtUserSetWindowWord
Status: Not hooked
#: 552 Function Name: NtUserSetWinEventHook
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4a5c
#: 553 Function Name: NtUserShowCaret
Status: Not hooked
#: 554 Function Name: NtUserShowScrollBar
Status: Not hooked
#: 555 Function Name: NtUserShowWindow
Status: Not hooked
#: 556 Function Name: NtUserShowWindowAsync
Status: Not hooked
#: 557 Function Name: NtUserSoundSentry
Status: Not hooked
#: 558 Function Name: NtUserSwitchDesktop
Status: Not hooked
#: 559 Function Name: NtUserSystemParametersInfo
Status: Not hooked
#: 560 Function Name: NtUserTestForInteractiveUser
Status: Not hooked
#: 561 Function Name: NtUserThunkedMenuInfo
Status: Not hooked
#: 562 Function Name: NtUserThunkedMenuItemInfo
Status: Not hooked
#: 563 Function Name: NtUserToUnicodeEx
Status: Not hooked
#: 564 Function Name: NtUserTrackMouseEvent
Status: Not hooked
#: 565 Function Name: NtUserTrackPopupMenuEx
Status: Not hooked
#: 566 Function Name: NtUserCalcMenuBar
Status: Not hooked
#: 567 Function Name: NtUserPaintMenuBar
Status: Not hooked
#: 568 Function Name: NtUserTranslateAccelerator
Status: Not hooked
#: 569 Function Name: NtUserTranslateMessage
Status: Not hooked
#: 570 Function Name: NtUserUnhookWindowsHookEx
Status: Not hooked
#: 571 Function Name: NtUserUnhookWinEvent
Status: Not hooked
#: 572 Function Name: NtUserUnloadKeyboardLayout
Status: Not hooked
#: 573 Function Name: NtUserUnlockWindowStation
Status: Not hooked
#: 574 Function Name: NtUserUnregisterClass
Status: Not hooked
#: 575 Function Name: NtUserUnregisterUserApiHook
Status: Not hooked
#: 576 Function Name: NtUserUnregisterHotKey
Status: Not hooked
#: 577 Function Name: NtUserUpdateInputContext
Status: Not hooked
#: 578 Function Name: NtUserUpdateInstance
Status: Not hooked
#: 579 Function Name: NtUserUpdateLayeredWindow
Status: Not hooked
#: 580 Function Name: NtUserGetLayeredWindowAttributes
Status: Not hooked
#: 581 Function Name: NtUserSetLayeredWindowAttributes
Status: Not hooked
#: 582 Function Name: NtUserUpdatePerUserSystemParameters
Status: Not hooked
#: 583 Function Name: NtUserUserHandleGrantAccess
Status: Not hooked
#: 584 Function Name: NtUserValidateHandleSecure
Status: Not hooked
#: 585 Function Name: NtUserValidateRect
Status: Not hooked
#: 586 Function Name: NtUserValidateTimerCallback
Status: Not hooked
#: 587 Function Name: NtUserVkKeyScanEx
Status: Not hooked
#: 588 Function Name: NtUserWaitForInputIdle
Status: Not hooked
#: 589 Function Name: NtUserWaitForMsgAndEvent
Status: Not hooked
#: 590 Function Name: NtUserWaitMessage
Status: Not hooked
#: 591 Function Name: NtUserWin32PoolAllocationStats
Status: Not hooked
#: 592 Function Name: NtUserWindowFromPoint
Status: Not hooked
#: 593 Function Name: NtUserYieldTask
Status: Not hooked
#: 594 Function Name: NtUserRemoteConnect
Status: Not hooked
#: 595 Function Name: NtUserRemoteRedrawRectangle
Status: Not hooked
#: 596 Function Name: NtUserRemoteRedrawScreen
Status: Not hooked
#: 597 Function Name: NtUserRemoteStopScreenUpdates
Status: Not hooked
#: 598 Function Name: NtUserCtxDisplayIOCtl
Status: Not hooked
#: 599 Function Name: NtGdiEngAssociateSurface
Status: Not hooked
#: 600 Function Name: NtGdiEngCreateBitmap
Status: Not hooked
#: 601 Function Name: NtGdiEngCreateDeviceSurface
Status: Not hooked
#: 602 Function Name: NtGdiEngCreateDeviceBitmap
Status: Not hooked
#: 603 Function Name: NtGdiEngCreatePalette
Status: Not hooked
#: 604 Function Name: NtGdiEngComputeGlyphSet
Status: Not hooked
#: 605 Function Name: NtGdiEngCopyBits
Status: Not hooked
#: 606 Function Name: NtGdiEngDeletePalette
Status: Not hooked
#: 607 Function Name: NtGdiEngDeleteSurface
Status: Not hooked
#: 608 Function Name: NtGdiEngEraseSurface
Status: Not hooked
#: 609 Function Name: NtGdiEngUnlockSurface
Status: Not hooked
#: 610 Function Name: NtGdiEngLockSurface
Status: Not hooked
#: 611 Function Name: NtGdiEngBitBlt
Status: Not hooked
#: 612 Function Name: NtGdiEngStretchBlt
Status: Not hooked
#: 613 Function Name: NtGdiEngPlgBlt
Status: Not hooked
#: 614 Function Name: NtGdiEngMarkBandingSurface
Status: Not hooked
#: 615 Function Name: NtGdiEngStrokePath
Status: Not hooked
#: 616 Function Name: NtGdiEngFillPath
Status: Not hooked
#: 617 Function Name: NtGdiEngStrokeAndFillPath
Status: Not hooked
#: 618 Function Name: NtGdiEngPaint
Status: Not hooked
#: 619 Function Name: NtGdiEngLineTo
Status: Not hooked
#: 620 Function Name: NtGdiEngAlphaBlend
Status: Not hooked
#: 621 Function Name: NtGdiEngGradientFill
Status: Not hooked
#: 622 Function Name: NtGdiEngTransparentBlt
Status: Not hooked
#: 623 Function Name: NtGdiEngTextOut
Status: Not hooked
#: 624 Function Name: NtGdiEngStretchBltROP
Status: Not hooked
#: 625 Function Name: NtGdiXLATEOBJ_cGetPalette
Status: Not hooked
#: 626 Function Name: NtGdiXLATEOBJ_iXlate
Status: Not hooked
#: 627 Function Name: NtGdiXLATEOBJ_hGetColorTransform
Status: Not hooked
#: 628 Function Name: NtGdiCLIPOBJ_bEnum
Status: Not hooked
#: 629 Function Name: NtGdiCLIPOBJ_cEnumStart
Status: Not hooked
#: 630 Function Name: NtGdiCLIPOBJ_ppoGetPath
Status: Not hooked
#: 631 Function Name: NtGdiEngDeletePath
Status: Not hooked
#: 632 Function Name: NtGdiEngCreateClip
Status: Not hooked
#: 633 Function Name: NtGdiEngDeleteClip
Status: Not hooked
#: 634 Function Name: NtGdiBRUSHOBJ_ulGetBrushColor
Status: Not hooked
#: 635 Function Name: NtGdiBRUSHOBJ_pvAllocRbrush
Status: Not hooked
#: 636 Function Name: NtGdiBRUSHOBJ_pvGetRbrush
Status: Not hooked
#: 637 Function Name: NtGdiBRUSHOBJ_hGetColorTransform
Status: Not hooked
#: 638 Function Name: NtGdiXFORMOBJ_bApplyXform
Status: Not hooked
#: 639 Function Name: NtGdiXFORMOBJ_iGetXform
Status: Not hooked
#: 640 Function Name: NtGdiFONTOBJ_vGetInfo
Status: Not hooked
#: 641 Function Name: NtGdiFONTOBJ_pxoGetXform
Status: Not hooked
#: 642 Function Name: NtGdiFONTOBJ_cGetGlyphs
Status: Not hooked
#: 643 Function Name: NtGdiFONTOBJ_pifi
Status: Not hooked
#: 644 Function Name: NtGdiFONTOBJ_pfdg
Status: Not hooked
#: 645 Function Name: NtGdiFONTOBJ_pQueryGlyphAttrs
Status: Not hooked
#: 646 Function Name: NtGdiFONTOBJ_pvTrueTypeFontFile
Status: Not hooked
#: 647 Function Name: NtGdiFONTOBJ_cGetAllGlyphHandles
Status: Not hooked
#: 648 Function Name: NtGdiSTROBJ_bEnum
Status: Not hooked
#: 649 Function Name: NtGdiSTROBJ_bEnumPositionsOnly
Status: Not hooked
#: 650 Function Name: NtGdiSTROBJ_bGetAdvanceWidths
Status: Not hooked
#: 651 Function Name: NtGdiSTROBJ_vEnumStart
Status: Not hooked
#: 652 Function Name: NtGdiSTROBJ_dwGetCodePage
Status: Not hooked
#: 653 Function Name: NtGdiPATHOBJ_vGetBounds
Status: Not hooked
#: 654 Function Name: NtGdiPATHOBJ_bEnum
Status: Not hooked
#: 655 Function Name: NtGdiPATHOBJ_vEnumStart
Status: Not hooked
#: 656 Function Name: NtGdiPATHOBJ_vEnumStartClipLines
Status: Not hooked
#: 657 Function Name: NtGdiPATHOBJ_bEnumClipLines
Status: Not hooked
#: 658 Function Name: NtGdiGetDhpdev
Status: Not hooked
#: 659 Function Name: NtGdiEngCheckAbort
Status: Not hooked
#: 660 Function Name: NtGdiHT_Get8BPPFormatPalette
Status: Not hooked
#: 661 Function Name: NtGdiHT_Get8BPPMaskPalette
Status: Not hooked
#: 662 Function Name: NtGdiUpdateTransform
Status: Not hooked
#: 663 Function Name: NtGdiSetPUMPDOBJ
Status: Not hooked
#: 664 Function Name: NtGdiBRUSHOBJ_DeleteRbrush
Status: Not hooked
#: 665 Function Name: NtGdiUnmapMemFont
Status: Not hooked
#: 666 Function Name: NtGdiDrawStream
Status: Not hooked
tady poslední část logu
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/12/12 13:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Shadow SSDT
-------------------
#: 000 Function Name: NtGdiAbortDoc
Status: Not hooked
#: 001 Function Name: NtGdiAbortPath
Status: Not hooked
#: 002 Function Name: NtGdiAddFontResourceW
Status: Not hooked
#: 003 Function Name: NtGdiAddRemoteFontToDC
Status: Not hooked
#: 004 Function Name: NtGdiAddFontMemResourceEx
Status: Not hooked
#: 005 Function Name: NtGdiRemoveMergeFont
Status: Not hooked
#: 006 Function Name: NtGdiAddRemoteMMInstanceToDC
Status: Not hooked
#: 007 Function Name: NtGdiAlphaBlend
Status: Not hooked
#: 008 Function Name: NtGdiAngleArc
Status: Not hooked
#: 009 Function Name: NtGdiAnyLinkedFonts
Status: Not hooked
#: 010 Function Name: NtGdiFontIsLinked
Status: Not hooked
#: 011 Function Name: NtGdiArcInternal
Status: Not hooked
#: 012 Function Name: NtGdiBeginPath
Status: Not hooked
#: 013 Function Name: NtGdiBitBlt
Status: Not hooked
#: 014 Function Name: NtGdiCancelDC
Status: Not hooked
#: 015 Function Name: NtGdiCheckBitmapBits
Status: Not hooked
#: 016 Function Name: NtGdiCloseFigure
Status: Not hooked
#: 017 Function Name: NtGdiClearBitmapAttributes
Status: Not hooked
#: 018 Function Name: NtGdiClearBrushAttributes
Status: Not hooked
#: 019 Function Name: NtGdiColorCorrectPalette
Status: Not hooked
#: 020 Function Name: NtGdiCombineRgn
Status: Not hooked
#: 021 Function Name: NtGdiCombineTransform
Status: Not hooked
#: 022 Function Name: NtGdiComputeXformCoefficients
Status: Not hooked
#: 023 Function Name: NtGdiConsoleTextOut
Status: Not hooked
#: 024 Function Name: NtGdiConvertMetafileRect
Status: Not hooked
#: 025 Function Name: NtGdiCreateBitmap
Status: Not hooked
#: 026 Function Name: NtGdiCreateClientObj
Status: Not hooked
#: 027 Function Name: NtGdiCreateColorSpace
Status: Not hooked
#: 028 Function Name: NtGdiCreateColorTransform
Status: Not hooked
#: 029 Function Name: NtGdiCreateCompatibleBitmap
Status: Not hooked
#: 030 Function Name: NtGdiCreateCompatibleDC
Status: Not hooked
#: 031 Function Name: NtGdiCreateDIBBrush
Status: Not hooked
#: 032 Function Name: NtGdiCreateDIBitmapInternal
Status: Not hooked
#: 033 Function Name: NtGdiCreateDIBSection
Status: Not hooked
#: 034 Function Name: NtGdiCreateEllipticRgn
Status: Not hooked
#: 035 Function Name: NtGdiCreateHalftonePalette
Status: Not hooked
#: 036 Function Name: NtGdiCreateHatchBrushInternal
Status: Not hooked
#: 037 Function Name: NtGdiCreateMetafileDC
Status: Not hooked
#: 038 Function Name: NtGdiCreatePaletteInternal
Status: Not hooked
#: 039 Function Name: NtGdiCreatePatternBrushInternal
Status: Not hooked
#: 040 Function Name: NtGdiCreatePen
Status: Not hooked
#: 041 Function Name: NtGdiCreateRectRgn
Status: Not hooked
#: 042 Function Name: NtGdiCreateRoundRectRgn
Status: Not hooked
#: 043 Function Name: NtGdiCreateServerMetaFile
Status: Not hooked
#: 044 Function Name: NtGdiCreateSolidBrush
Status: Not hooked
#: 045 Function Name: NtGdiD3dContextCreate
Status: Not hooked
#: 046 Function Name: NtGdiD3dContextDestroy
Status: Not hooked
#: 047 Function Name: NtGdiD3dContextDestroyAll
Status: Not hooked
#: 048 Function Name: NtGdiD3dValidateTextureStageState
Status: Not hooked
#: 049 Function Name: NtGdiD3dDrawPrimitives2
Status: Not hooked
#: 050 Function Name: NtGdiDdGetDriverState
Status: Not hooked
#: 051 Function Name: NtGdiDdAddAttachedSurface
Status: Not hooked
#: 052 Function Name: NtGdiDdAlphaBlt
Status: Not hooked
#: 053 Function Name: NtGdiDdAttachSurface
Status: Not hooked
#: 054 Function Name: NtGdiDdBeginMoCompFrame
Status: Not hooked
#: 055 Function Name: NtGdiDdBlt
Status: Not hooked
#: 056 Function Name: NtGdiDdCanCreateSurface
Status: Not hooked
#: 057 Function Name: NtGdiDdCanCreateD3DBuffer
Status: Not hooked
#: 058 Function Name: NtGdiDdColorControl
Status: Not hooked
#: 059 Function Name: NtGdiDdCreateDirectDrawObject
Status: Not hooked
#: 060 Function Name: NtGdiDdCreateSurface
Status: Not hooked
#: 061 Function Name: NtGdiDdCreateD3DBuffer
Status: Not hooked
#: 062 Function Name: NtGdiDdCreateMoComp
Status: Not hooked
#: 063 Function Name: NtGdiDdCreateSurfaceObject
Status: Not hooked
#: 064 Function Name: NtGdiDdDeleteDirectDrawObject
Status: Not hooked
#: 065 Function Name: NtGdiDdDeleteSurfaceObject
Status: Not hooked
#: 066 Function Name: NtGdiDdDestroyMoComp
Status: Not hooked
#: 067 Function Name: NtGdiDdDestroySurface
Status: Not hooked
#: 068 Function Name: NtGdiDdDestroyD3DBuffer
Status: Not hooked
#: 069 Function Name: NtGdiDdEndMoCompFrame
Status: Not hooked
#: 070 Function Name: NtGdiDdFlip
Status: Not hooked
#: 071 Function Name: NtGdiDdFlipToGDISurface
Status: Not hooked
#: 072 Function Name: NtGdiDdGetAvailDriverMemory
Status: Not hooked
#: 073 Function Name: NtGdiDdGetBltStatus
Status: Not hooked
#: 074 Function Name: NtGdiDdGetDC
Status: Not hooked
#: 075 Function Name: NtGdiDdGetDriverInfo
Status: Not hooked
#: 076 Function Name: NtGdiDdGetDxHandle
Status: Not hooked
#: 077 Function Name: NtGdiDdGetFlipStatus
Status: Not hooked
#: 078 Function Name: NtGdiDdGetInternalMoCompInfo
Status: Not hooked
#: 079 Function Name: NtGdiDdGetMoCompBuffInfo
Status: Not hooked
#: 080 Function Name: NtGdiDdGetMoCompGuids
Status: Not hooked
#: 081 Function Name: NtGdiDdGetMoCompFormats
Status: Not hooked
#: 082 Function Name: NtGdiDdGetScanLine
Status: Not hooked
#: 083 Function Name: NtGdiDdLock
Status: Not hooked
#: 084 Function Name: NtGdiDdLockD3D
Status: Not hooked
#: 085 Function Name: NtGdiDdQueryDirectDrawObject
Status: Not hooked
#: 086 Function Name: NtGdiDdQueryMoCompStatus
Status: Not hooked
#: 087 Function Name: NtGdiDdReenableDirectDrawObject
Status: Not hooked
#: 088 Function Name: NtGdiDdReleaseDC
Status: Not hooked
#: 089 Function Name: NtGdiDdRenderMoComp
Status: Not hooked
#: 090 Function Name: NtGdiDdResetVisrgn
Status: Not hooked
#: 091 Function Name: NtGdiDdSetColorKey
Status: Not hooked
#: 092 Function Name: NtGdiDdSetExclusiveMode
Status: Not hooked
#: 093 Function Name: NtGdiDdSetGammaRamp
Status: Not hooked
#: 094 Function Name: NtGdiDdCreateSurfaceEx
Status: Not hooked
#: 095 Function Name: NtGdiDdSetOverlayPosition
Status: Not hooked
#: 096 Function Name: NtGdiDdUnattachSurface
Status: Not hooked
#: 097 Function Name: NtGdiDdUnlock
Status: Not hooked
#: 098 Function Name: NtGdiDdUnlockD3D
Status: Not hooked
#: 099 Function Name: NtGdiDdUpdateOverlay
Status: Not hooked
#: 100 Function Name: NtGdiDdWaitForVerticalBlank
Status: Not hooked
#: 101 Function Name: NtGdiDvpCanCreateVideoPort
Status: Not hooked
#: 102 Function Name: NtGdiDvpColorControl
Status: Not hooked
#: 103 Function Name: NtGdiDvpCreateVideoPort
Status: Not hooked
#: 104 Function Name: NtGdiDvpDestroyVideoPort
Status: Not hooked
#: 105 Function Name: NtGdiDvpFlipVideoPort
Status: Not hooked
#: 106 Function Name: NtGdiDvpGetVideoPortBandwidth
Status: Not hooked
#: 107 Function Name: NtGdiDvpGetVideoPortField
Status: Not hooked
#: 108 Function Name: NtGdiDvpGetVideoPortFlipStatus
Status: Not hooked
#: 109 Function Name: NtGdiDvpGetVideoPortInputFormats
Status: Not hooked
#: 110 Function Name: NtGdiDvpGetVideoPortLine
Status: Not hooked
#: 111 Function Name: NtGdiDvpGetVideoPortOutputFormats
Status: Not hooked
#: 112 Function Name: NtGdiDvpGetVideoPortConnectInfo
Status: Not hooked
#: 113 Function Name: NtGdiDvpGetVideoSignalStatus
Status: Not hooked
#: 114 Function Name: NtGdiDvpUpdateVideoPort
Status: Not hooked
#: 115 Function Name: NtGdiDvpWaitForVideoPortSync
Status: Not hooked
#: 116 Function Name: NtGdiDvpAcquireNotification
Status: Not hooked
#: 117 Function Name: NtGdiDvpReleaseNotification
Status: Not hooked
#: 118 Function Name: NtGdiDxgGenericThunk
Status: Not hooked
#: 119 Function Name: NtGdiDeleteClientObj
Status: Not hooked
#: 120 Function Name: NtGdiDeleteColorSpace
Status: Not hooked
#: 121 Function Name: NtGdiDeleteColorTransform
Status: Not hooked
#: 122 Function Name: NtGdiDeleteObjectApp
Status: Not hooked
#: 123 Function Name: NtGdiDescribePixelFormat
Status: Not hooked
#: 124 Function Name: NtGdiGetPerBandInfo
Status: Not hooked
#: 125 Function Name: NtGdiDoBanding
Status: Not hooked
#: 126 Function Name: NtGdiDoPalette
Status: Not hooked
#: 127 Function Name: NtGdiDrawEscape
Status: Not hooked
#: 128 Function Name: NtGdiEllipse
Status: Not hooked
#: 129 Function Name: NtGdiEnableEudc
Status: Not hooked
#: 130 Function Name: NtGdiEndDoc
Status: Not hooked
#: 131 Function Name: NtGdiEndPage
Status: Not hooked
#: 132 Function Name: NtGdiEndPath
Status: Not hooked
#: 133 Function Name: NtGdiEnumFontChunk
Status: Not hooked
#: 134 Function Name: NtGdiEnumFontClose
Status: Not hooked
#: 135 Function Name: NtGdiEnumFontOpen
Status: Not hooked
#: 136 Function Name: NtGdiEnumObjects
Status: Not hooked
#: 137 Function Name: NtGdiEqualRgn
Status: Not hooked
#: 138 Function Name: NtGdiEudcLoadUnloadLink
Status: Not hooked
#: 139 Function Name: NtGdiExcludeClipRect
Status: Not hooked
#: 140 Function Name: NtGdiExtCreatePen
Status: Not hooked
#: 141 Function Name: NtGdiExtCreateRegion
Status: Not hooked
#: 142 Function Name: NtGdiExtEscape
Status: Not hooked
#: 143 Function Name: NtGdiExtFloodFill
Status: Not hooked
#: 144 Function Name: NtGdiExtGetObjectW
Status: Not hooked
#: 145 Function Name: NtGdiExtSelectClipRgn
Status: Not hooked
#: 146 Function Name: NtGdiExtTextOutW
Status: Not hooked
#: 147 Function Name: NtGdiFillPath
Status: Not hooked
#: 148 Function Name: NtGdiFillRgn
Status: Not hooked
#: 149 Function Name: NtGdiFlattenPath
Status: Not hooked
#: 150 Function Name: NtGdiFlushUserBatch
Status: Not hooked
#: 151 Function Name: NtGdiFlush
Status: Not hooked
#: 152 Function Name: NtGdiForceUFIMapping
Status: Not hooked
#: 153 Function Name: NtGdiFrameRgn
Status: Not hooked
#: 154 Function Name: NtGdiFullscreenControl
Status: Not hooked
#: 155 Function Name: NtGdiGetAndSetDCDword
Status: Not hooked
#: 156 Function Name: NtGdiGetAppClipBox
Status: Not hooked
#: 157 Function Name: NtGdiGetBitmapBits
Status: Not hooked
#: 158 Function Name: NtGdiGetBitmapDimension
Status: Not hooked
#: 159 Function Name: NtGdiGetBoundsRect
Status: Not hooked
#: 160 Function Name: NtGdiGetCharABCWidthsW
Status: Not hooked
#: 161 Function Name: NtGdiGetCharacterPlacementW
Status: Not hooked
#: 162 Function Name: NtGdiGetCharSet
Status: Not hooked
#: 163 Function Name: NtGdiGetCharWidthW
Status: Not hooked
#: 164 Function Name: NtGdiGetCharWidthInfo
Status: Not hooked
#: 165 Function Name: NtGdiGetColorAdjustment
Status: Not hooked
#: 166 Function Name: NtGdiGetColorSpaceforBitmap
Status: Not hooked
#: 167 Function Name: NtGdiGetDCDword
Status: Not hooked
#: 168 Function Name: NtGdiGetDCforBitmap
Status: Not hooked
#: 169 Function Name: NtGdiGetDCObject
Status: Not hooked
#: 170 Function Name: NtGdiGetDCPoint
Status: Not hooked
#: 171 Function Name: NtGdiGetDeviceCaps
Status: Not hooked
#: 172 Function Name: NtGdiGetDeviceGammaRamp
Status: Not hooked
#: 173 Function Name: NtGdiGetDeviceCapsAll
Status: Not hooked
#: 174 Function Name: NtGdiGetDIBitsInternal
Status: Not hooked
#: 175 Function Name: NtGdiGetETM
Status: Not hooked
#: 176 Function Name: NtGdiGetEudcTimeStampEx
Status: Not hooked
#: 177 Function Name: NtGdiGetFontData
Status: Not hooked
#: 178 Function Name: NtGdiGetFontResourceInfoInternalW
Status: Not hooked
#: 179 Function Name: NtGdiGetGlyphIndicesW
Status: Not hooked
#: 180 Function Name: NtGdiGetGlyphIndicesWInternal
Status: Not hooked
#: 181 Function Name: NtGdiGetGlyphOutline
Status: Not hooked
#: 182 Function Name: NtGdiGetKerningPairs
Status: Not hooked
#: 183 Function Name: NtGdiGetLinkedUFIs
Status: Not hooked
#: 184 Function Name: NtGdiGetMiterLimit
Status: Not hooked
#: 185 Function Name: NtGdiGetMonitorID
Status: Not hooked
#: 186 Function Name: NtGdiGetNearestColor
Status: Not hooked
#: 187 Function Name: NtGdiGetNearestPaletteIndex
Status: Not hooked
#: 188 Function Name: NtGdiGetObjectBitmapHandle
Status: Not hooked
#: 189 Function Name: NtGdiGetOutlineTextMetricsInternalW
Status: Not hooked
#: 190 Function Name: NtGdiGetPath
Status: Not hooked
#: 191 Function Name: NtGdiGetPixel
Status: Not hooked
#: 192 Function Name: NtGdiGetRandomRgn
Status: Not hooked
#: 193 Function Name: NtGdiGetRasterizerCaps
Status: Not hooked
#: 194 Function Name: NtGdiGetRealizationInfo
Status: Not hooked
#: 195 Function Name: NtGdiGetRegionData
Status: Not hooked
#: 196 Function Name: NtGdiGetRgnBox
Status: Not hooked
#: 197 Function Name: NtGdiGetServerMetaFileBits
Status: Not hooked
#: 198 Function Name: NtGdiGetSpoolMessage
Status: Not hooked
#: 199 Function Name: NtGdiGetStats
Status: Not hooked
#: 200 Function Name: NtGdiGetStockObject
Status: Not hooked
#: 201 Function Name: NtGdiGetStringBitmapW
Status: Not hooked
#: 202 Function Name: NtGdiGetSystemPaletteUse
Status: Not hooked
#: 203 Function Name: NtGdiGetTextCharsetInfo
Status: Not hooked
#: 204 Function Name: NtGdiGetTextExtent
Status: Not hooked
#: 205 Function Name: NtGdiGetTextExtentExW
Status: Not hooked
#: 206 Function Name: NtGdiGetTextFaceW
Status: Not hooked
#: 207 Function Name: NtGdiGetTextMetricsW
Status: Not hooked
#: 208 Function Name: NtGdiGetTransform
Status: Not hooked
#: 209 Function Name: NtGdiGetUFI
Status: Not hooked
#: 210 Function Name: NtGdiGetEmbUFI
Status: Not hooked
#: 211 Function Name: NtGdiGetUFIPathname
Status: Not hooked
#: 212 Function Name: NtGdiGetEmbedFonts
Status: Not hooked
#: 213 Function Name: NtGdiChangeGhostFont
Status: Not hooked
#: 214 Function Name: NtGdiAddEmbFontToDC
Status: Not hooked
#: 215 Function Name: NtGdiGetFontUnicodeRanges
Status: Not hooked
#: 216 Function Name: NtGdiGetWidthTable
Status: Not hooked
#: 217 Function Name: NtGdiGradientFill
Status: Not hooked
#: 218 Function Name: NtGdiHfontCreate
Status: Not hooked
#: 219 Function Name: NtGdiIcmBrushInfo
Status: Not hooked
#: 220 Function Name: NtGdiInit
Status: Not hooked
#: 221 Function Name: NtGdiInitSpool
Status: Not hooked
#: 222 Function Name: NtGdiIntersectClipRect
Status: Not hooked
#: 223 Function Name: NtGdiInvertRgn
Status: Not hooked
#: 224 Function Name: NtGdiLineTo
Status: Not hooked
#: 225 Function Name: NtGdiMakeFontDir
Status: Not hooked
#: 226 Function Name: NtGdiMakeInfoDC
Status: Not hooked
#: 227 Function Name: NtGdiMaskBlt
Status: Not hooked
#: 228 Function Name: NtGdiModifyWorldTransform
Status: Not hooked
#: 229 Function Name: NtGdiMonoBitmap
Status: Not hooked
#: 230 Function Name: NtGdiMoveTo
Status: Not hooked
#: 231 Function Name: NtGdiOffsetClipRgn
Status: Not hooked
#: 232 Function Name: NtGdiOffsetRgn
Status: Not hooked
#: 233 Function Name: NtGdiOpenDCW
Status: Not hooked
#: 234 Function Name: NtGdiPatBlt
Status: Not hooked
#: 235 Function Name: NtGdiPolyPatBlt
Status: Not hooked
#: 236 Function Name: NtGdiPathToRegion
Status: Not hooked
#: 237 Function Name: NtGdiPlgBlt
Status: Not hooked
#: 238 Function Name: NtGdiPolyDraw
Status: Not hooked
#: 239 Function Name: NtGdiPolyPolyDraw
Status: Not hooked
#: 240 Function Name: NtGdiPolyTextOutW
Status: Not hooked
#: 241 Function Name: NtGdiPtInRegion
Status: Not hooked
#: 242 Function Name: NtGdiPtVisible
Status: Not hooked
#: 243 Function Name: NtGdiQueryFonts
Status: Not hooked
#: 244 Function Name: NtGdiQueryFontAssocInfo
Status: Not hooked
#: 245 Function Name: NtGdiRectangle
Status: Not hooked
#: 246 Function Name: NtGdiRectInRegion
Status: Not hooked
#: 247 Function Name: NtGdiRectVisible
Status: Not hooked
#: 248 Function Name: NtGdiRemoveFontResourceW
Status: Not hooked
#: 249 Function Name: NtGdiRemoveFontMemResourceEx
Status: Not hooked
#: 250 Function Name: NtGdiResetDC
Status: Not hooked
#: 251 Function Name: NtGdiResizePalette
Status: Not hooked
#: 252 Function Name: NtGdiRestoreDC
Status: Not hooked
#: 253 Function Name: NtGdiRoundRect
Status: Not hooked
#: 254 Function Name: NtGdiSaveDC
Status: Not hooked
#: 255 Function Name: NtGdiScaleViewportExtEx
Status: Not hooked
#: 256 Function Name: NtGdiScaleWindowExtEx
Status: Not hooked
#: 257 Function Name: NtGdiSelectBitmap
Status: Not hooked
#: 258 Function Name: NtGdiSelectBrush
Status: Not hooked
#: 259 Function Name: NtGdiSelectClipPath
Status: Not hooked
#: 260 Function Name: NtGdiSelectFont
Status: Not hooked
#: 261 Function Name: NtGdiSelectPen
Status: Not hooked
#: 262 Function Name: NtGdiSetBitmapAttributes
Status: Not hooked
#: 263 Function Name: NtGdiSetBitmapBits
Status: Not hooked
#: 264 Function Name: NtGdiSetBitmapDimension
Status: Not hooked
#: 265 Function Name: NtGdiSetBoundsRect
Status: Not hooked
#: 266 Function Name: NtGdiSetBrushAttributes
Status: Not hooked
#: 267 Function Name: NtGdiSetBrushOrg
Status: Not hooked
#: 268 Function Name: NtGdiSetColorAdjustment
Status: Not hooked
#: 269 Function Name: NtGdiSetColorSpace
Status: Not hooked
#: 270 Function Name: NtGdiSetDeviceGammaRamp
Status: Not hooked
#: 271 Function Name: NtGdiSetDIBitsToDeviceInternal
Status: Not hooked
#: 272 Function Name: NtGdiSetFontEnumeration
Status: Not hooked
#: 273 Function Name: NtGdiSetFontXform
Status: Not hooked
#: 274 Function Name: NtGdiSetIcmMode
Status: Not hooked
#: 275 Function Name: NtGdiSetLinkedUFIs
Status: Not hooked
#: 276 Function Name: NtGdiSetMagicColors
Status: Not hooked
#: 277 Function Name: NtGdiSetMetaRgn
Status: Not hooked
#: 278 Function Name: NtGdiSetMiterLimit
Status: Not hooked
#: 279 Function Name: NtGdiGetDeviceWidth
Status: Not hooked
#: 280 Function Name: NtGdiMirrorWindowOrg
Status: Not hooked
#: 281 Function Name: NtGdiSetLayout
Status: Not hooked
#: 282 Function Name: NtGdiSetPixel
Status: Not hooked
#: 283 Function Name: NtGdiSetPixelFormat
Status: Not hooked
#: 284 Function Name: NtGdiSetRectRgn
Status: Not hooked
#: 285 Function Name: NtGdiSetSystemPaletteUse
Status: Not hooked
#: 286 Function Name: NtGdiSetTextJustification
Status: Not hooked
#: 287 Function Name: NtGdiSetupPublicCFONT
Status: Not hooked
#: 288 Function Name: NtGdiSetVirtualResolution
Status: Not hooked
#: 289 Function Name: NtGdiSetSizeDevice
Status: Not hooked
#: 290 Function Name: NtGdiStartDoc
Status: Not hooked
#: 291 Function Name: NtGdiStartPage
Status: Not hooked
#: 292 Function Name: NtGdiStretchBlt
Status: Not hooked
#: 293 Function Name: NtGdiStretchDIBitsInternal
Status: Not hooked
#: 294 Function Name: NtGdiStrokeAndFillPath
Status: Not hooked
#: 295 Function Name: NtGdiStrokePath
Status: Not hooked
#: 296 Function Name: NtGdiSwapBuffers
Status: Not hooked
#: 297 Function Name: NtGdiTransformPoints
Status: Not hooked
#: 298 Function Name: NtGdiTransparentBlt
Status: Not hooked
#: 299 Function Name: NtGdiUnloadPrinterDriver
Status: Not hooked
#: 300 Function Name: NtGdiUnmapMemFont
Status: Not hooked
#: 301 Function Name: NtGdiUnrealizeObject
Status: Not hooked
#: 302 Function Name: NtGdiUpdateColors
Status: Not hooked
#: 303 Function Name: NtGdiWidenPath
Status: Not hooked
#: 304 Function Name: NtUserActivateKeyboardLayout
Status: Not hooked
#: 305 Function Name: NtUserAlterWindowStyle
Status: Not hooked
#: 306 Function Name: NtUserAssociateInputContext
Status: Not hooked
#: 307 Function Name: NtUserAttachThreadInput
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca47c8
#: 308 Function Name: NtUserBeginPaint
Status: Not hooked
#: 309 Function Name: NtUserBitBltSysBmp
Status: Not hooked
#: 310 Function Name: NtUserBlockInput
Status: Not hooked
#: 311 Function Name: NtUserBuildHimcList
Status: Not hooked
#: 312 Function Name: NtUserBuildHwndList
Status: Not hooked
#: 313 Function Name: NtUserBuildNameList
Status: Not hooked
#: 314 Function Name: NtUserBuildPropList
Status: Not hooked
#: 315 Function Name: NtUserCallHwnd
Status: Not hooked
#: 316 Function Name: NtUserCallHwndLock
Status: Not hooked
#: 317 Function Name: NtUserCallHwndOpt
Status: Not hooked
#: 318 Function Name: NtUserCallHwndParam
Status: Not hooked
#: 319 Function Name: NtUserCallHwndParamLock
Status: Not hooked
#: 320 Function Name: NtUserCallMsgFilter
Status: Not hooked
#: 321 Function Name: NtUserCallNextHookEx
Status: Not hooked
#: 322 Function Name: NtUserCallNoParam
Status: Not hooked
#: 323 Function Name: NtUserCallOneParam
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4816
#: 324 Function Name: NtUserCallTwoParam
Status: Not hooked
#: 325 Function Name: NtUserChangeClipboardChain
Status: Not hooked
#: 326 Function Name: NtUserChangeDisplaySettings
Status: Not hooked
#: 327 Function Name: NtUserCheckImeHotKey
Status: Not hooked
#: 328 Function Name: NtUserCheckMenuItem
Status: Not hooked
#: 329 Function Name: NtUserChildWindowFromPointEx
Status: Not hooked
#: 330 Function Name: NtUserClipCursor
Status: Not hooked
#: 331 Function Name: NtUserCloseClipboard
Status: Not hooked
#: 332 Function Name: NtUserCloseDesktop
Status: Not hooked
#: 333 Function Name: NtUserCloseWindowStation
Status: Not hooked
#: 334 Function Name: NtUserConsoleControl
Status: Not hooked
#: 335 Function Name: NtUserConvertMemHandle
Status: Not hooked
#: 336 Function Name: NtUserCopyAcceleratorTable
Status: Not hooked
#: 337 Function Name: NtUserCountClipboardFormats
Status: Not hooked
#: 338 Function Name: NtUserCreateAcceleratorTable
Status: Not hooked
#: 339 Function Name: NtUserCreateCaret
Status: Not hooked
#: 340 Function Name: NtUserCreateDesktop
Status: Not hooked
#: 341 Function Name: NtUserCreateInputContext
Status: Not hooked
#: 342 Function Name: NtUserCreateLocalMemHandle
Status: Not hooked
#: 343 Function Name: NtUserCreateWindowEx
Status: Not hooked
#: 344 Function Name: NtUserCreateWindowStation
Status: Not hooked
#: 345 Function Name: NtUserDdeGetQualityOfService
Status: Not hooked
#: 346 Function Name: NtUserDdeInitialize
Status: Not hooked
#: 347 Function Name: NtUserDdeSetQualityOfService
Status: Not hooked
#: 348 Function Name: NtUserDeferWindowPos
Status: Not hooked
#: 349 Function Name: NtUserDefSetText
Status: Not hooked
#: 350 Function Name: NtUserDeleteMenu
Status: Not hooked
#: 351 Function Name: NtUserDestroyAcceleratorTable
Status: Not hooked
#: 352 Function Name: NtUserDestroyCursor
Status: Not hooked
#: 353 Function Name: NtUserDestroyInputContext
Status: Not hooked
#: 354 Function Name: NtUserDestroyMenu
Status: Not hooked
#: 355 Function Name: NtUserDestroyWindow
Status: Not hooked
#: 356 Function Name: NtUserDisableThreadIme
Status: Not hooked
#: 357 Function Name: NtUserDispatchMessage
Status: Not hooked
#: 358 Function Name: NtUserDragDetect
Status: Not hooked
#: 359 Function Name: NtUserDragObject
Status: Not hooked
#: 360 Function Name: NtUserDrawAnimatedRects
Status: Not hooked
#: 361 Function Name: NtUserDrawCaption
Status: Not hooked
#: 362 Function Name: NtUserDrawCaptionTemp
Status: Not hooked
#: 363 Function Name: NtUserDrawIconEx
Status: Not hooked
#: 364 Function Name: NtUserDrawMenuBarTemp
Status: Not hooked
#: 365 Function Name: NtUserEmptyClipboard
Status: Not hooked
#: 366 Function Name: NtUserEnableMenuItem
Status: Not hooked
#: 367 Function Name: NtUserEnableScrollBar
Status: Not hooked
#: 368 Function Name: NtUserEndDeferWindowPosEx
Status: Not hooked
#: 369 Function Name: NtUserEndMenu
Status: Not hooked
#: 370 Function Name: NtUserEndPaint
Status: Not hooked
#: 371 Function Name: NtUserEnumDisplayDevices
Status: Not hooked
#: 372 Function Name: NtUserEnumDisplayMonitors
Status: Not hooked
#: 373 Function Name: NtUserEnumDisplaySettings
Status: Not hooked
#: 374 Function Name: NtUserEvent
Status: Not hooked
#: 375 Function Name: NtUserExcludeUpdateRgn
Status: Not hooked
#: 376 Function Name: NtUserFillWindow
Status: Not hooked
#: 377 Function Name: NtUserFindExistingCursorIcon
Status: Not hooked
#: 378 Function Name: NtUserFindWindowEx
Status: Not hooked
#: 379 Function Name: NtUserFlashWindowEx
Status: Not hooked
#: 380 Function Name: NtUserGetAltTabInfo
Status: Not hooked
#: 381 Function Name: NtUserGetAncestor
Status: Not hooked
#: 382 Function Name: NtUserGetAppImeLevel
Status: Not hooked
#: 383 Function Name: NtUserGetAsyncKeyState
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4860
#: 384 Function Name: NtUserGetAtomName
Status: Not hooked
#: 385 Function Name: NtUserGetCaretBlinkTime
Status: Not hooked
#: 386 Function Name: NtUserGetCaretPos
Status: Not hooked
#: 387 Function Name: NtUserGetClassInfo
Status: Not hooked
#: 388 Function Name: NtUserGetClassName
Status: Not hooked
#: 389 Function Name: NtUserGetClipboardData
Status: Not hooked
#: 390 Function Name: NtUserGetClipboardFormatName
Status: Not hooked
#: 391 Function Name: NtUserGetClipboardOwner
Status: Not hooked
#: 392 Function Name: NtUserGetClipboardSequenceNumber
Status: Not hooked
#: 393 Function Name: NtUserGetClipboardViewer
Status: Not hooked
#: 394 Function Name: NtUserGetClipCursor
Status: Not hooked
#: 395 Function Name: NtUserGetComboBoxInfo
Status: Not hooked
#: 396 Function Name: NtUserGetControlBrush
Status: Not hooked
#: 397 Function Name: NtUserGetControlColor
Status: Not hooked
#: 398 Function Name: NtUserGetCPD
Status: Not hooked
#: 399 Function Name: NtUserGetCursorFrameInfo
Status: Not hooked
#: 400 Function Name: NtUserGetCursorInfo
Status: Not hooked
#: 401 Function Name: NtUserGetDC
Status: Not hooked
#: 402 Function Name: NtUserGetDCEx
Status: Not hooked
#: 403 Function Name: NtUserGetDoubleClickTime
Status: Not hooked
#: 404 Function Name: NtUserGetForegroundWindow
Status: Not hooked
#: 405 Function Name: NtUserGetGuiResources
Status: Not hooked
#: 406 Function Name: NtUserGetGUIThreadInfo
Status: Not hooked
#: 407 Function Name: NtUserGetIconInfo
Status: Not hooked
#: 408 Function Name: NtUserGetIconSize
Status: Not hooked
#: 409 Function Name: NtUserGetImeHotKey
Status: Not hooked
#: 410 Function Name: NtUserGetImeInfoEx
Status: Not hooked
#: 411 Function Name: NtUserGetInternalWindowPos
Status: Not hooked
#: 412 Function Name: NtUserGetKeyboardLayoutList
Status: Not hooked
#: 413 Function Name: NtUserGetKeyboardLayoutName
Status: Not hooked
#: 414 Function Name: NtUserGetKeyboardState
Status: Not hooked
#: 415 Function Name: NtUserGetKeyNameText
Status: Not hooked
#: 416 Function Name: NtUserGetKeyState
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca48aa
#: 417 Function Name: NtUserGetListBoxInfo
Status: Not hooked
#: 418 Function Name: NtUserGetMenuBarInfo
Status: Not hooked
#: 419 Function Name: NtUserGetMenuIndex
Status: Not hooked
#: 420 Function Name: NtUserGetMenuItemRect
Status: Not hooked
#: 421 Function Name: NtUserGetMessage
Status: Not hooked
#: 422 Function Name: NtUserGetMouseMovePointsEx
Status: Not hooked
#: 423 Function Name: NtUserGetObjectInformation
Status: Not hooked
#: 424 Function Name: NtUserGetOpenClipboardWindow
Status: Not hooked
#: 425 Function Name: NtUserGetPriorityClipboardFormat
Status: Not hooked
#: 426 Function Name: NtUserGetProcessWindowStation
Status: Not hooked
#: 427 Function Name: NtUserGetRawInputBuffer
Status: Not hooked
#: 428 Function Name: NtUserGetRawInputData
Status: Not hooked
#: 429 Function Name: NtUserGetRawInputDeviceInfo
Status: Not hooked
#: 430 Function Name: NtUserGetRawInputDeviceList
Status: Not hooked
#: 431 Function Name: NtUserGetRegisteredRawInputDevices
Status: Not hooked
#: 432 Function Name: NtUserGetScrollBarInfo
Status: Not hooked
#: 433 Function Name: NtUserGetSystemMenu
Status: Not hooked
#: 434 Function Name: NtUserGetThreadDesktop
Status: Not hooked
#: 435 Function Name: NtUserGetThreadState
Status: Not hooked
#: 436 Function Name: NtUserGetTitleBarInfo
Status: Not hooked
#: 437 Function Name: NtUserGetUpdateRect
Status: Not hooked
#: 438 Function Name: NtUserGetUpdateRgn
Status: Not hooked
#: 439 Function Name: NtUserGetWindowDC
Status: Not hooked
#: 440 Function Name: NtUserGetWindowPlacement
Status: Not hooked
#: 441 Function Name: NtUserGetWOWClass
Status: Not hooked
#: 442 Function Name: NtUserHardErrorControl
Status: Not hooked
#: 443 Function Name: NtUserHideCaret
Status: Not hooked
#: 444 Function Name: NtUserHiliteMenuItem
Status: Not hooked
#: 445 Function Name: NtUserImpersonateDdeClientWindow
Status: Not hooked
#: 446 Function Name: NtUserInitialize
Status: Not hooked
#: 447 Function Name: NtUserInitializeClientPfnArrays
Status: Not hooked
#: 448 Function Name: NtUserInitTask
Status: Not hooked
#: 449 Function Name: NtUserInternalGetWindowText
Status: Not hooked
#: 450 Function Name: NtUserInvalidateRect
Status: Not hooked
#: 451 Function Name: NtUserInvalidateRgn
Status: Not hooked
#: 452 Function Name: NtUserIsClipboardFormatAvailable
Status: Not hooked
#: 453 Function Name: NtUserKillTimer
Status: Not hooked
#: 454 Function Name: NtUserLoadKeyboardLayoutEx
Status: Not hooked
#: 455 Function Name: NtUserLockWindowStation
Status: Not hooked
#: 456 Function Name: NtUserLockWindowUpdate
Status: Not hooked
#: 457 Function Name: NtUserLockWorkStation
Status: Not hooked
#: 458 Function Name: NtUserMapVirtualKeyEx
Status: Not hooked
#: 459 Function Name: NtUserMenuItemFromPoint
Status: Not hooked
#: 460 Function Name: NtUserMessageCall
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca48f4
#: 461 Function Name: NtUserMinMaximize
Status: Not hooked
#: 462 Function Name: NtUserMNDragLeave
Status: Not hooked
#: 463 Function Name: NtUserMNDragOver
Status: Not hooked
#: 464 Function Name: NtUserModifyUserStartupInfoFlags
Status: Not hooked
#: 465 Function Name: NtUserMoveWindow
Status: Not hooked
#: 466 Function Name: NtUserNotifyIMEStatus
Status: Not hooked
#: 467 Function Name: NtUserNotifyProcessCreate
Status: Not hooked
#: 468 Function Name: NtUserNotifyWinEvent
Status: Not hooked
#: 469 Function Name: NtUserOpenClipboard
Status: Not hooked
#: 470 Function Name: NtUserOpenDesktop
Status: Not hooked
#: 471 Function Name: NtUserOpenInputDesktop
Status: Not hooked
#: 472 Function Name: NtUserOpenWindowStation
Status: Not hooked
#: 473 Function Name: NtUserPaintDesktop
Status: Not hooked
#: 474 Function Name: NtUserPeekMessage
Status: Not hooked
#: 475 Function Name: NtUserPostMessage
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4952
#: 476 Function Name: NtUserPostThreadMessage
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca49b0
#: 477 Function Name: NtUserPrintWindow
Status: Not hooked
#: 478 Function Name: NtUserProcessConnect
Status: Not hooked
#: 479 Function Name: NtUserQueryInformationThread
Status: Not hooked
#: 480 Function Name: NtUserQueryInputContext
Status: Not hooked
#: 481 Function Name: NtUserQuerySendMessage
Status: Not hooked
#: 482 Function Name: NtUserQueryUserCounters
Status: Not hooked
#: 483 Function Name: NtUserQueryWindow
Status: Not hooked
#: 484 Function Name: NtUserRealChildWindowFromPoint
Status: Not hooked
#: 485 Function Name: NtUserRealInternalGetMessage
Status: Not hooked
#: 486 Function Name: NtUserRealWaitMessageEx
Status: Not hooked
#: 487 Function Name: NtUserRedrawWindow
Status: Not hooked
#: 488 Function Name: NtUserRegisterClassExWOW
Status: Not hooked
#: 489 Function Name: NtUserRegisterUserApiHook
Status: Not hooked
#: 490 Function Name: NtUserRegisterHotKey
Status: Not hooked
#: 491 Function Name: NtUserRegisterRawInputDevices
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4a0e
#: 492 Function Name: NtUserRegisterTasklist
Status: Not hooked
#: 493 Function Name: NtUserRegisterWindowMessage
Status: Not hooked
#: 494 Function Name: NtUserRemoveMenu
Status: Not hooked
#: 495 Function Name: NtUserRemoveProp
Status: Not hooked
#: 496 Function Name: NtUserResolveDesktop
Status: Not hooked
#: 497 Function Name: NtUserResolveDesktopForWOW
Status: Not hooked
#: 498 Function Name: NtUserSBGetParms
Status: Not hooked
#: 499 Function Name: NtUserScrollDC
Status: Not hooked
#: 500 Function Name: NtUserScrollWindowEx
Status: Not hooked
#: 501 Function Name: NtUserSelectPalette
Status: Not hooked
#: 502 Function Name: NtUserSendInput
Status: Not hooked
#: 503 Function Name: NtUserSetActiveWindow
Status: Not hooked
#: 504 Function Name: NtUserSetAppImeLevel
Status: Not hooked
#: 505 Function Name: NtUserSetCapture
Status: Not hooked
#: 506 Function Name: NtUserSetClassLong
Status: Not hooked
#: 507 Function Name: NtUserSetClassWord
Status: Not hooked
#: 508 Function Name: NtUserSetClipboardData
Status: Not hooked
#: 509 Function Name: NtUserSetClipboardViewer
Status: Not hooked
#: 510 Function Name: NtUserSetConsoleReserveKeys
Status: Not hooked
#: 511 Function Name: NtUserSetCursor
Status: Not hooked
#: 512 Function Name: NtUserSetCursorContents
Status: Not hooked
#: 513 Function Name: NtUserSetCursorIconData
Status: Not hooked
#: 514 Function Name: NtUserSetDbgTag
Status: Not hooked
#: 515 Function Name: NtUserSetFocus
Status: Not hooked
#: 516 Function Name: NtUserSetImeHotKey
Status: Not hooked
#: 517 Function Name: NtUserSetImeInfoEx
Status: Not hooked
#: 518 Function Name: NtUserSetImeOwnerWindow
Status: Not hooked
#: 519 Function Name: NtUserSetInformationProcess
Status: Not hooked
#: 520 Function Name: NtUserSetInformationThread
Status: Not hooked
#: 521 Function Name: NtUserSetInternalWindowPos
Status: Not hooked
#: 522 Function Name: NtUserSetKeyboardState
Status: Not hooked
#: 523 Function Name: NtUserSetLogonNotifyWindow
Status: Not hooked
#: 524 Function Name: NtUserSetMenu
Status: Not hooked
#: 525 Function Name: NtUserSetMenuContextHelpId
Status: Not hooked
#: 526 Function Name: NtUserSetMenuDefaultItem
Status: Not hooked
#: 527 Function Name: NtUserSetMenuFlagRtoL
Status: Not hooked
#: 528 Function Name: NtUserSetObjectInformation
Status: Not hooked
#: 529 Function Name: NtUserSetParent
Status: Not hooked
#: 530 Function Name: NtUserSetProcessWindowStation
Status: Not hooked
#: 531 Function Name: NtUserSetProp
Status: Not hooked
#: 532 Function Name: NtUserSetRipFlags
Status: Not hooked
#: 533 Function Name: NtUserSetScrollInfo
Status: Not hooked
#: 534 Function Name: NtUserSetShellWindowEx
Status: Not hooked
#: 535 Function Name: NtUserSetSysColors
Status: Not hooked
#: 536 Function Name: NtUserSetSystemCursor
Status: Not hooked
#: 537 Function Name: NtUserSetSystemMenu
Status: Not hooked
#: 538 Function Name: NtUserSetSystemTimer
Status: Not hooked
#: 539 Function Name: NtUserSetThreadDesktop
Status: Not hooked
#: 540 Function Name: NtUserSetThreadLayoutHandles
Status: Not hooked
#: 541 Function Name: NtUserSetThreadState
Status: Not hooked
#: 542 Function Name: NtUserSetTimer
Status: Not hooked
#: 543 Function Name: NtUserSetWindowFNID
Status: Not hooked
#: 544 Function Name: NtUserSetWindowLong
Status: Not hooked
#: 545 Function Name: NtUserSetWindowPlacement
Status: Not hooked
#: 546 Function Name: NtUserSetWindowPos
Status: Not hooked
#: 547 Function Name: NtUserSetWindowRgn
Status: Not hooked
#: 548 Function Name: NtUserSetWindowsHookAW
Status: Not hooked
#: 549 Function Name: NtUserSetWindowsHookEx
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4ab0
#: 550 Function Name: NtUserSetWindowStationUser
Status: Not hooked
#: 551 Function Name: NtUserSetWindowWord
Status: Not hooked
#: 552 Function Name: NtUserSetWinEventHook
Status: Hooked by "C:\WINDOWS\system32\drivers\PCTAppEvent.sys" at address 0xb7ca4a5c
#: 553 Function Name: NtUserShowCaret
Status: Not hooked
#: 554 Function Name: NtUserShowScrollBar
Status: Not hooked
#: 555 Function Name: NtUserShowWindow
Status: Not hooked
#: 556 Function Name: NtUserShowWindowAsync
Status: Not hooked
#: 557 Function Name: NtUserSoundSentry
Status: Not hooked
#: 558 Function Name: NtUserSwitchDesktop
Status: Not hooked
#: 559 Function Name: NtUserSystemParametersInfo
Status: Not hooked
#: 560 Function Name: NtUserTestForInteractiveUser
Status: Not hooked
#: 561 Function Name: NtUserThunkedMenuInfo
Status: Not hooked
#: 562 Function Name: NtUserThunkedMenuItemInfo
Status: Not hooked
#: 563 Function Name: NtUserToUnicodeEx
Status: Not hooked
#: 564 Function Name: NtUserTrackMouseEvent
Status: Not hooked
#: 565 Function Name: NtUserTrackPopupMenuEx
Status: Not hooked
#: 566 Function Name: NtUserCalcMenuBar
Status: Not hooked
#: 567 Function Name: NtUserPaintMenuBar
Status: Not hooked
#: 568 Function Name: NtUserTranslateAccelerator
Status: Not hooked
#: 569 Function Name: NtUserTranslateMessage
Status: Not hooked
#: 570 Function Name: NtUserUnhookWindowsHookEx
Status: Not hooked
#: 571 Function Name: NtUserUnhookWinEvent
Status: Not hooked
#: 572 Function Name: NtUserUnloadKeyboardLayout
Status: Not hooked
#: 573 Function Name: NtUserUnlockWindowStation
Status: Not hooked
#: 574 Function Name: NtUserUnregisterClass
Status: Not hooked
#: 575 Function Name: NtUserUnregisterUserApiHook
Status: Not hooked
#: 576 Function Name: NtUserUnregisterHotKey
Status: Not hooked
#: 577 Function Name: NtUserUpdateInputContext
Status: Not hooked
#: 578 Function Name: NtUserUpdateInstance
Status: Not hooked
#: 579 Function Name: NtUserUpdateLayeredWindow
Status: Not hooked
#: 580 Function Name: NtUserGetLayeredWindowAttributes
Status: Not hooked
#: 581 Function Name: NtUserSetLayeredWindowAttributes
Status: Not hooked
#: 582 Function Name: NtUserUpdatePerUserSystemParameters
Status: Not hooked
#: 583 Function Name: NtUserUserHandleGrantAccess
Status: Not hooked
#: 584 Function Name: NtUserValidateHandleSecure
Status: Not hooked
#: 585 Function Name: NtUserValidateRect
Status: Not hooked
#: 586 Function Name: NtUserValidateTimerCallback
Status: Not hooked
#: 587 Function Name: NtUserVkKeyScanEx
Status: Not hooked
#: 588 Function Name: NtUserWaitForInputIdle
Status: Not hooked
#: 589 Function Name: NtUserWaitForMsgAndEvent
Status: Not hooked
#: 590 Function Name: NtUserWaitMessage
Status: Not hooked
#: 591 Function Name: NtUserWin32PoolAllocationStats
Status: Not hooked
#: 592 Function Name: NtUserWindowFromPoint
Status: Not hooked
#: 593 Function Name: NtUserYieldTask
Status: Not hooked
#: 594 Function Name: NtUserRemoteConnect
Status: Not hooked
#: 595 Function Name: NtUserRemoteRedrawRectangle
Status: Not hooked
#: 596 Function Name: NtUserRemoteRedrawScreen
Status: Not hooked
#: 597 Function Name: NtUserRemoteStopScreenUpdates
Status: Not hooked
#: 598 Function Name: NtUserCtxDisplayIOCtl
Status: Not hooked
#: 599 Function Name: NtGdiEngAssociateSurface
Status: Not hooked
#: 600 Function Name: NtGdiEngCreateBitmap
Status: Not hooked
#: 601 Function Name: NtGdiEngCreateDeviceSurface
Status: Not hooked
#: 602 Function Name: NtGdiEngCreateDeviceBitmap
Status: Not hooked
#: 603 Function Name: NtGdiEngCreatePalette
Status: Not hooked
#: 604 Function Name: NtGdiEngComputeGlyphSet
Status: Not hooked
#: 605 Function Name: NtGdiEngCopyBits
Status: Not hooked
#: 606 Function Name: NtGdiEngDeletePalette
Status: Not hooked
#: 607 Function Name: NtGdiEngDeleteSurface
Status: Not hooked
#: 608 Function Name: NtGdiEngEraseSurface
Status: Not hooked
#: 609 Function Name: NtGdiEngUnlockSurface
Status: Not hooked
#: 610 Function Name: NtGdiEngLockSurface
Status: Not hooked
#: 611 Function Name: NtGdiEngBitBlt
Status: Not hooked
#: 612 Function Name: NtGdiEngStretchBlt
Status: Not hooked
#: 613 Function Name: NtGdiEngPlgBlt
Status: Not hooked
#: 614 Function Name: NtGdiEngMarkBandingSurface
Status: Not hooked
#: 615 Function Name: NtGdiEngStrokePath
Status: Not hooked
#: 616 Function Name: NtGdiEngFillPath
Status: Not hooked
#: 617 Function Name: NtGdiEngStrokeAndFillPath
Status: Not hooked
#: 618 Function Name: NtGdiEngPaint
Status: Not hooked
#: 619 Function Name: NtGdiEngLineTo
Status: Not hooked
#: 620 Function Name: NtGdiEngAlphaBlend
Status: Not hooked
#: 621 Function Name: NtGdiEngGradientFill
Status: Not hooked
#: 622 Function Name: NtGdiEngTransparentBlt
Status: Not hooked
#: 623 Function Name: NtGdiEngTextOut
Status: Not hooked
#: 624 Function Name: NtGdiEngStretchBltROP
Status: Not hooked
#: 625 Function Name: NtGdiXLATEOBJ_cGetPalette
Status: Not hooked
#: 626 Function Name: NtGdiXLATEOBJ_iXlate
Status: Not hooked
#: 627 Function Name: NtGdiXLATEOBJ_hGetColorTransform
Status: Not hooked
#: 628 Function Name: NtGdiCLIPOBJ_bEnum
Status: Not hooked
#: 629 Function Name: NtGdiCLIPOBJ_cEnumStart
Status: Not hooked
#: 630 Function Name: NtGdiCLIPOBJ_ppoGetPath
Status: Not hooked
#: 631 Function Name: NtGdiEngDeletePath
Status: Not hooked
#: 632 Function Name: NtGdiEngCreateClip
Status: Not hooked
#: 633 Function Name: NtGdiEngDeleteClip
Status: Not hooked
#: 634 Function Name: NtGdiBRUSHOBJ_ulGetBrushColor
Status: Not hooked
#: 635 Function Name: NtGdiBRUSHOBJ_pvAllocRbrush
Status: Not hooked
#: 636 Function Name: NtGdiBRUSHOBJ_pvGetRbrush
Status: Not hooked
#: 637 Function Name: NtGdiBRUSHOBJ_hGetColorTransform
Status: Not hooked
#: 638 Function Name: NtGdiXFORMOBJ_bApplyXform
Status: Not hooked
#: 639 Function Name: NtGdiXFORMOBJ_iGetXform
Status: Not hooked
#: 640 Function Name: NtGdiFONTOBJ_vGetInfo
Status: Not hooked
#: 641 Function Name: NtGdiFONTOBJ_pxoGetXform
Status: Not hooked
#: 642 Function Name: NtGdiFONTOBJ_cGetGlyphs
Status: Not hooked
#: 643 Function Name: NtGdiFONTOBJ_pifi
Status: Not hooked
#: 644 Function Name: NtGdiFONTOBJ_pfdg
Status: Not hooked
#: 645 Function Name: NtGdiFONTOBJ_pQueryGlyphAttrs
Status: Not hooked
#: 646 Function Name: NtGdiFONTOBJ_pvTrueTypeFontFile
Status: Not hooked
#: 647 Function Name: NtGdiFONTOBJ_cGetAllGlyphHandles
Status: Not hooked
#: 648 Function Name: NtGdiSTROBJ_bEnum
Status: Not hooked
#: 649 Function Name: NtGdiSTROBJ_bEnumPositionsOnly
Status: Not hooked
#: 650 Function Name: NtGdiSTROBJ_bGetAdvanceWidths
Status: Not hooked
#: 651 Function Name: NtGdiSTROBJ_vEnumStart
Status: Not hooked
#: 652 Function Name: NtGdiSTROBJ_dwGetCodePage
Status: Not hooked
#: 653 Function Name: NtGdiPATHOBJ_vGetBounds
Status: Not hooked
#: 654 Function Name: NtGdiPATHOBJ_bEnum
Status: Not hooked
#: 655 Function Name: NtGdiPATHOBJ_vEnumStart
Status: Not hooked
#: 656 Function Name: NtGdiPATHOBJ_vEnumStartClipLines
Status: Not hooked
#: 657 Function Name: NtGdiPATHOBJ_bEnumClipLines
Status: Not hooked
#: 658 Function Name: NtGdiGetDhpdev
Status: Not hooked
#: 659 Function Name: NtGdiEngCheckAbort
Status: Not hooked
#: 660 Function Name: NtGdiHT_Get8BPPFormatPalette
Status: Not hooked
#: 661 Function Name: NtGdiHT_Get8BPPMaskPalette
Status: Not hooked
#: 662 Function Name: NtGdiUpdateTransform
Status: Not hooked
#: 663 Function Name: NtGdiSetPUMPDOBJ
Status: Not hooked
#: 664 Function Name: NtGdiBRUSHOBJ_DeleteRbrush
Status: Not hooked
#: 665 Function Name: NtGdiUnmapMemFont
Status: Not hooked
#: 666 Function Name: NtGdiDrawStream
Status: Not hooked
Nikdy není možné dobře zabezpečit svůj systém .............
Re: prosím o kontrolu logu


-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
sken se dělá až bude kompletně hotový zašlu sem log
Nikdy není možné dobře zabezpečit svůj systém .............
Re: prosím o kontrolu logu
Dobra tedy, budu jej vyhlizet 

-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
po dlouhých útrapách se mi to povedlo a tady je log
ale jsou to emaily které byly zablokovany pres zonealarm,ale uz jsem je vymazal
Automatická kontrola: zastaveno před 2 dní (události: 2, objekty: 246564, čas: 02:17:53)
13.12.2010 21:43:23 Úloha byla zastavena
13.12.2010 19:25:29 Úloha byla spuštěna
Automatická kontrola: zastaveno před 2 dní (události: 14, objekty: 490322, čas: 05:16:47)
14.12.2010 21:10:16 Úloha byla zastavena
14.12.2010 19:09:20 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:09:12 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:09:08 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:09:04 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:09:00 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:56 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:45 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:41 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:25 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:12 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 18:42:13 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 15:53:28 Úloha byla spuštěna
Automatická kontrola: dokončeno před 58 min. (události: 150, objekty: 938106, čas: 04:37:33)
16.12.2010 15:47:23 Úloha byla spuštěna
16.12.2010 15:50:42 Zjištěno: Password-protected-EXE C:\Documents and Settings\Admin\Dokumenty\pinfect.zip/MBR.exe
16.12.2010 15:55:12 Odstraněno: Password-protected-EXE C:\Documents and Settings\Admin\Dokumenty\pinfect.zip
16.12.2010 17:23:01 Zjištěno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf
16.12.2010 18:43:39 Neošetřeno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 18:43:42 Zjištěno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf
16.12.2010 18:45:04 Neošetřeno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 18:47:40 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:49:31 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:49:31 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:50:10 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:50:12 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:51:55 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:56:55 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:36 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:57:46 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:51 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:57:54 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:57 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:01 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:05 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:06 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:10 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:11 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:11 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:13 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:13 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:15 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:15 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:17 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:17 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:18 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:19 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 18:58:21 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:21 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 18:58:22 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:22 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 19:01:55 Zjištěno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf
16.12.2010 19:06:23 Neošetřeno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 19:06:23 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:23 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:06:24 Zjištěno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf
16.12.2010 19:06:24 Neošetřeno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 19:06:24 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:24 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:06:26 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:26 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Podle hodnoty hash
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Podle hodnoty hash
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Přeskočeno uživatelem
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:18:03 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:03 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:51 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:51 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:51 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:51 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:56 Úloha byla dokončena
ale jsou to emaily které byly zablokovany pres zonealarm,ale uz jsem je vymazal
Automatická kontrola: zastaveno před 2 dní (události: 2, objekty: 246564, čas: 02:17:53)
13.12.2010 21:43:23 Úloha byla zastavena
13.12.2010 19:25:29 Úloha byla spuštěna
Automatická kontrola: zastaveno před 2 dní (události: 14, objekty: 490322, čas: 05:16:47)
14.12.2010 21:10:16 Úloha byla zastavena
14.12.2010 19:09:20 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:09:12 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:09:08 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:09:04 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:09:00 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:56 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:45 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:41 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 19:08:25 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 19:08:12 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
14.12.2010 18:42:13 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
14.12.2010 15:53:28 Úloha byla spuštěna
Automatická kontrola: dokončeno před 58 min. (události: 150, objekty: 938106, čas: 04:37:33)
16.12.2010 15:47:23 Úloha byla spuštěna
16.12.2010 15:50:42 Zjištěno: Password-protected-EXE C:\Documents and Settings\Admin\Dokumenty\pinfect.zip/MBR.exe
16.12.2010 15:55:12 Odstraněno: Password-protected-EXE C:\Documents and Settings\Admin\Dokumenty\pinfect.zip
16.12.2010 17:23:01 Zjištěno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf
16.12.2010 18:43:39 Neošetřeno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 18:43:42 Zjištěno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf
16.12.2010 18:45:04 Neošetřeno: Trojan-Spy.HTML.Citifraud.an C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Smith Barney][Subject:Smith Barney: Urgent Security Notice For CIient Of The Bank [Mon, 11 Oct 2004 01:45:26 +0400]][Time:2004/10/10 22:47:26]/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 18:47:40 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:49:31 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:49:31 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:50:10 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:50:12 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 18:51:55 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Simr][Subject:Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 18:56:55 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:36 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:57:46 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:51 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:57:54 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:57:57 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:01 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:05 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:06 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:10 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:11 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:11 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:13 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:13 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:15 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:15 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:17 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 18:58:17 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 18:58:18 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:19 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 18:58:21 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:21 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 18:58:22 Zjištěno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 18:58:22 Neošetřeno: Email-Worm.Win32.Zafi.b C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 19:01:55 Zjištěno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf
16.12.2010 19:06:23 Neošetřeno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 19:06:23 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:23 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:06:24 Zjištěno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf
16.12.2010 19:06:24 Neošetřeno: Exploit.HTML.Iframe.FileDownload C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/RichBody//Html2Rtf Přeskočeno uživatelem
16.12.2010 19:06:24 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:24 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:06:26 Zjištěno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 19:06:26 Neošetřeno: Email-Worm.Win32.NetSky.r C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Podle hodnoty hash
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Přeskočeno uživatelem
16.12.2010 19:08:08 Zjištěno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Podle hodnoty hash
16.12.2010 19:08:08 Neošetřeno: Email-Worm.Win32.Bagle.o C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Incoming message][Time:2004/03/16 16:20:14]/Details.zip Přeskočeno uživatelem
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:18:50 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:18:50 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:26 Zjištěno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 19:19:26 Neošetřeno: Email-Worm.Win32.NetSky.q C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 19:19:28 Zjištěno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 19:19:28 Neošetřeno: Email-Worm.Win32.Bagle.z C:\Documents and Settings\Admin\Dokumenty\Soubory aplikace Outlook\Outlook.pst/Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:18:03 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:03 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/06/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:04 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:04 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Miroslav Marek][Subject:Message is infected : Elektronicka pohlednice!][Time:2004/01/13 23:00:00]/link.seznam.cz.pohlednice.index.php2Avf3.zlo Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:05 Zjištěno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9
16.12.2010 20:18:05 Neošetřeno: Email-Worm.Win32.Zafi.b Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Hanka][Subject:Message is infected : Hanka][Time:2004/01/13 23:00:00]/MDACReadme.zl9 Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:24 Zjištěno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif
16.12.2010 20:18:24 Neošetřeno: Email-Worm.Win32.NetSky.r Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:Mail Delivery Service][Subject:Message is infected : Delivery Status Notification][Time:2004/04/19 09:38:35]/Delivered Message (mach.jr@tiscali.cz) (29,9 kB)/message.pif Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:18:38 Zjištěno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe
16.12.2010 20:18:38 Neošetřeno: Email-Worm.Win32.Bagle.o Outlook\Outlook\Vrchol osobních složek\Doručená pošta\[From:reva-lbc@volny.cz][Subject:Message is infected : Incoming message][Time:2004/03/16 16:20:14]/Details.zip/ytukfyka.exe Přeskočeno uživatelem
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:50 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:50 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:51 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:51 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:23:51 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:23:51 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:30 Zjištěno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64
16.12.2010 20:24:30 Neošetřeno: Email-Worm.Win32.NetSky.q Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:freeze.JC.avi][Subject:Message is infected : AP][Time:2005/06/09 06:34:05]/PlainBody//base64 Zápis není podporován
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:33 Zjištěno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta
16.12.2010 20:24:33 Neošetřeno: Email-Worm.Win32.Bagle.z Outlook\Outlook\Vrchol osobních složek\Odstraněná pošta\[From:Simr][Subject:Message is infected : Re: Document][Time:2004/08/18 12:24:02]/Details.hta Přeskočeno uživatelem
16.12.2010 20:24:56 Úloha byla dokončena
Nikdy není možné dobře zabezpečit svůj systém .............
Re: prosím o kontrolu logu
Zkuste jeste CureIt http://www.viry.cz/forum/viewtopic.php?f=29&t=47721
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
bdupdateservice.dll C:\DOCUME~1\Admin\LOCALS~1\Temp Trojan.Siggen2.6721 Smazán.
bdupdateservice.dll C:\DOCUME~1\Admin\LOCALS~1\Temp\AVCBack Trojan.Siggen2.6721 Smazán.
to nasel Dr.Web
bdupdateservice.dll C:\DOCUME~1\Admin\LOCALS~1\Temp\AVCBack Trojan.Siggen2.6721 Smazán.
to nasel Dr.Web
Nikdy není možné dobře zabezpečit svůj systém .............
-
- 1. Stupeň Varování
- Příspěvky: 65
- Registrován: 15 úno 2006 22:55
- Bydliště: Karlovy Vary
- Kontaktovat uživatele:
Re: prosím o kontrolu logu
Ale od provereni systemu Combofixem jsem nechal zapnutou obnovu systemu ale nezda se mi, ze by system byl stabilni
Nikdy není možné dobře zabezpečit svůj systém .............