GMER 2.1.19357 - http://www.gmer.net Rootkit scan 2014-10-25 18:54:37 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-2 SAMSUNG_HD502HJ rev.1AJ100E4 465,76GB Running: qb6zl7ng.exe; Driver: C:\Users\Boginie\AppData\Local\Temp\axdiyfod.sys ---- Kernel code sections - GMER 2.1 ---- INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 528 fffff80002db8000 63 bytes [00, 00, 0D, 02, 43, 63, 42, ...] INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 592 fffff80002db8040 6 bytes [B3, E0, 40, 8A, 01, 00] ---- Processes - GMER 2.1 ---- Library C:\Program Files\Internet Explorer\ieproxy.dll (*** suspicious ***) @ C:\Windows\Explorer.EXE [1192] (IE ActiveX Interface Marshaling Library/Microsoft Corporation)(2014-10-15 05:06:13) 000007fef0540000 ---- EOF - GMER 2.1 ----