Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible Rootkit Not Exactly Sure Atm...


  • This topic is locked This topic is locked
2 replies to this topic

#1 GamerGuy9000

GamerGuy9000

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:30 PM

Posted 21 May 2014 - 05:14 AM

Symptoms: After a fresh install, as soon as I take it online, even with windows and driver updates turned off, after about 30 seconds to a minute, my desktop blinks, computer makes a beep chime noise, the screen switches to black then this blueish purple curtain thing pops up, then my screen blinks again, and goes back to desktop.
Now, I had a friend connect remotely to one of my other pc, and when he connected that pc beeped, the screen did almost the same thing, and when he disconnected, my screen went back to desktop. Leaving me to believe something or someone is remotely accessing this pc at first run online.
Maybe a targeted attack, Rootkit, or worse code dropped on my bios, as this all started over a year ago when I got hit with a bad exploit toolkit while searching for information about the conficker.
I had just reinstalled my OS, because something was causing a conflict with x-trap driver, and I couldn't play my online game. I didn't update windows as I should have, although I did have Kaspersky Pure Installed.

My BIOS was not password protected, I was running 64-bit Intel-VTx Enabled, with a Virtual Box installed.
The VBox network was bridged
This has me worried as my machine was in a perfect state for a hypervisor rootkit, which could intercept, deny, or modify, hardware and software calls. With how advanced this infection was, it could be a possibility.

I clicked a google link that said something like, "Confiker Worm Updated to execute code on the bios". This peaked my interest as I like learning about things like this. Well, the link caused my browser to turn whiteish grey and freeze. I knew right away something bad was about to happen so I tried to cold shutdown the laptop by holding the power button. I thought it turned off but it only powered down. I turned it back on and when everything loaded back up, Kaspersky went crazy. This exploit toolkit downloaded at least 5 different worms, kido.up&down(confiker) WinWorm32.vbcs(or something like that) Worm32.irc (something like that) and a few others, It also downloaded trojan downloaders, and many other viruses. Kaspersky popped up with new virus name warnings about 12 times. I looked at the network monitor and seen my pc was being redirected to all kinds of websites downloading pictures and such, I downloaded some tools and got into some of the locations these pictures were being stored at. I was worried at first, when I seen it was downloading pictures that it would be some kind of bad porn(as one of the trojans was named Dracula), but when I gained access to the folders, all the pics looked like ad/normal people pics.

My computer ran perfectly fine. There was absolutely no sign of any infection, besides Kaspersky going into panic mode, and alerting me that these things were being downloaded and the traffic monitor showing me my pc was calling out to over 100 websites in a couple of seconds. My internet still worked, I had no visible redirects in my web browser, no pop ups on my desktop, no spam, nothing... Only thing visibly noticeable was I was being proxied which I could see :500 or :5000 at the end of my ip which was never there before. This toolkit was designed to be undetected once it infected the host. It wasn't like common malware, addware, or other rootkits that spam you to death or scare you. It just silently did it's tasks in the background. I could find nothing in the startup or run section in the registry, msconfig revealed nothing, taskmanager didn't show any process that was abnormal, I tried combofix, rkill, rougekiller, jrt, adwarecleaner, malware bytes, etc. Nothing could find or remove any of the viruses/worms. I came here and was told to diskpart sel disk [x] clean all... I did that but I noticed the weird, what seemed to be remote login at first online run.

I did a lot of research and checked the MMC logs, and noticed my bluetooth and other drivers were getting unexpected responses, didn't know how to handle the requests, I had lots of user logged into system, using impersonation, privileges escalated, etc...
I know services will use impersonation legitlly, what I'm not sure about is every antivirus I installed leaked protected registry keys to an unknown application. The antiviruses acted as if they were working correctly, updated, and completed scans with no detection. The only problem I have came across is with Kaspersky. Sometimes, after a fresh install, Kaspersky will pop up an error stating something like error: violation at [address something0x0000000] Product key has been corrupted. Unable to load virus definition database. Or something to this effect. This doesn't happen every time, just sometimes. Since 1st infection I have reformatted with diskpart at least 50 times, testing new ways to see if I can find something.

I really want to see if my bios is infected, if I'm being hypervisored by a unknown variant based of the bluepill concept of 2006, or if my RAM/ROM got infected. I doubt we will find anything with the standard tools I have tried before but I will try again.

I am pretty pc smart, just lazy at times. I have used Backtrack on other machines I own, to see what happens when web browsing on the hacked machine. How the browser reacts, noticable changes, etc. After migrating to the pid/service and hijacking the browser, I noticed sometimes on google search I will get a quick display of what looks like page source for a split second then the correct google page will load. This was interesting as the pc I'm using now does this at times. Leaving me even more suspicious. I also notice I drop from https to http. Almost like someone is using SSL strip, also I get an error at times when I drop from https to http and try to reconnect to https socket. Something along the lines of unable to establish a secured connection to the socket. Information sent over the network may be visible to for other to see. This raised a red flag with me and made me wonder if someone was using a MiTM.

Here is the DDS log.

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 10.0.9200.16384
Run by nikka at 0:41:29 on 2014-05-21
Microsoft Windows 8 6.2.9200.0.1252.1.1033.18.8064.7138 [GMT -7:00]
.
AV: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\dwm.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\SysWow64\IntelCpHeciSvc.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\Windows\system32\taskhostex.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe
C:\Program Files (x86)\Common Files\Microsoft Shared\Ink\TabTip32.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
mWinlogon: Userinit = userinit.exe
TCP: NameServer = 172.20.10.1
TCP: Interfaces\{BF104591-554E-4B7E-9854-9CB8CBF7D217} : DHCPNameServer = 172.20.10.1
SSODL: WebCheck -
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "C:\Program Files (x86)\Google\Chrome\Application\34.0.1847.137\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
x64-Run: [IgfxTray] "C:\Windows\System32\igfxtray.exe"
x64-Run: [HotKeysCmds] "C:\Windows\System32\hkcmd.exe"
x64-Run: [Persistence] "C:\Windows\System32\igfxpers.exe"
x64-Run: [Logitech Download Assistant] C:\Windows\System32\rundll32.exe C:\Windows\System32\LogiLDA.dll,LogiFetch
x64-Notify: igfxcui - igfxdev.dll
x64-SSODL: WebCheck -
.
============= SERVICES / DRIVERS ===============
.
R3 RTL8168;Realtek 8168 NT Driver;C:\Windows\System32\Drivers\Rt630x64.sys [2012-6-2 589824]
.
=============== Created Last 30 ================
.
2014-05-20 10:18:51 9013136 ----a-w- C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{3A2641F5-5BE9-45C4-817D-9B5F24D4D7F9}\mpengine.dll
2014-05-20 04:53:08 -------- d-----w- C:\Windows\Panther
2014-05-20 04:10:40 64000 ----a-w- C:\Windows\System32\OpenCL.DLL
2014-05-20 04:10:40 60416 ----a-w- C:\Windows\SysWow64\OpenCL.DLL
2014-05-20 04:10:40 -------- d-----w- C:\Intel
2014-05-20 04:10:34 -------- d-----w- C:\Program Files (x86)\Common Files\Intel
2014-05-20 04:05:55 -------- d-----w- C:\Users\nikka\AppData\Local\Google
2014-05-20 04:01:00 -------- d-----r- C:\Users\nikka\Searches
2014-05-20 04:01:00 -------- d-----r- C:\Users\nikka\Contacts
.
==================== Find3M ====================
.
.
============= FINISH: 0:41:40.73 ===============

[color#=D12AC4] Here is the first log from RougeKiller [/color]

RogueKiller V8.8.15 [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 8 (6.2.9200 ) 64 bits version
Started in : Normal mode
User : nikka [Admin rights]
Mode : Scan -- Date : 05/19/2014 21:16:51
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @iexplore.exe (AssocCreate) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A671A6)
[Address] EAT @iexplore.exe (AssocGetPerceivedType) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6829F)
[Address] EAT @iexplore.exe (AssocIsDangerous) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A79DED)
[Address] EAT @iexplore.exe (AssocQueryKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7AFBF)
[Address] EAT @iexplore.exe (AssocQueryKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66F42)
[Address] EAT @iexplore.exe (AssocQueryStringA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B20C)
[Address] EAT @iexplore.exe (AssocQueryStringByKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B077)
[Address] EAT @iexplore.exe (AssocQueryStringByKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71980)
[Address] EAT @iexplore.exe (AssocQueryStringW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FBFF)
[Address] EAT @iexplore.exe (ChrCmpIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77137)
[Address] EAT @iexplore.exe (ChrCmpIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77126)
[Address] EAT @iexplore.exe (ColorAdjustLuma) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C3F3)
[Address] EAT @iexplore.exe (ColorHLSToRGB) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B787)
[Address] EAT @iexplore.exe (ColorRGBToHLS) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B6CD)
[Address] EAT @iexplore.exe (ConnectToConnectionPoint) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7180D)
[Address] EAT @iexplore.exe (DelayLoadFailureHook) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C56B)
[Address] EAT @iexplore.exe (DllGetClassObject) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8958F)
[Address] EAT @iexplore.exe (DllGetVersion) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73B1B)
[Address] EAT @iexplore.exe (GUIDFromStringW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A63EE2)
[Address] EAT @iexplore.exe (GetAcceptLanguagesA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A2D)
[Address] EAT @iexplore.exe (GetAcceptLanguagesW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71ECB)
[Address] EAT @iexplore.exe (GetMenuPosFromID) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71DCD)
[Address] EAT @iexplore.exe (HashData) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A1C)
[Address] EAT @iexplore.exe (IStream_Copy) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FE03)
[Address] EAT @iexplore.exe (IStream_Read) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A716F3)
[Address] EAT @iexplore.exe (IStream_ReadPidl) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6F70E)
[Address] EAT @iexplore.exe (IStream_ReadStr) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65E95)
[Address] EAT @iexplore.exe (IStream_Reset) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67DC3)
[Address] EAT @iexplore.exe (IStream_Size) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FDCC)
[Address] EAT @iexplore.exe (IStream_Write) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67DB2)
[Address] EAT @iexplore.exe (IStream_WritePidl) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8A935)
[Address] EAT @iexplore.exe (IStream_WriteStr) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A704EB)
[Address] EAT @iexplore.exe (IUnknown_AtomicRelease) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77197)
[Address] EAT @iexplore.exe (IUnknown_Exec) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68D8F)
[Address] EAT @iexplore.exe (IUnknown_GetSite) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71EDC)
[Address] EAT @iexplore.exe (IUnknown_GetWindow) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C9B)
[Address] EAT @iexplore.exe (IUnknown_QueryService) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D31)
[Address] EAT @iexplore.exe (IUnknown_QueryStatus) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A87DCD)
[Address] EAT @iexplore.exe (IUnknown_Set) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D7F)
[Address] EAT @iexplore.exe (IUnknown_SetSite) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D42)
[Address] EAT @iexplore.exe (IntlStrEqWorkerA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F28)
[Address] EAT @iexplore.exe (IntlStrEqWorkerW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F17)
[Address] EAT @iexplore.exe (IsCharSpaceA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B81)
[Address] EAT @iexplore.exe (IsCharSpaceW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D90)
[Address] EAT @iexplore.exe (IsInternetESCEnabled) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A11)
[Address] EAT @iexplore.exe (IsOS) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68C5D)
[Address] EAT @iexplore.exe (MLFreeLibrary) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A864B9)
[Address] EAT @iexplore.exe (MLLoadLibraryA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A864F5)
[Address] EAT @iexplore.exe (MLLoadLibraryW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8653D)
[Address] EAT @iexplore.exe (ParseURLA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A00)
[Address] EAT @iexplore.exe (ParseURLW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B8E9)
[Address] EAT @iexplore.exe (PathAddBackslashA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C09)
[Address] EAT @iexplore.exe (PathAddBackslashW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A677B0)
[Address] EAT @iexplore.exe (PathAddExtensionA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DA1)
[Address] EAT @iexplore.exe (PathAddExtensionW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67A9E)
[Address] EAT @iexplore.exe (PathAppendA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D90)
[Address] EAT @iexplore.exe (PathAppendW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67E3F)
[Address] EAT @iexplore.exe (PathBuildRootA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77159)
[Address] EAT @iexplore.exe (PathBuildRootW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7716A)
[Address] EAT @iexplore.exe (PathCanonicalizeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D7F)
[Address] EAT @iexplore.exe (PathCanonicalizeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68CBC)
[Address] EAT @iexplore.exe (PathCombineA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C3C)
[Address] EAT @iexplore.exe (PathCombineW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6779F)
[Address] EAT @iexplore.exe (PathCommonPrefixA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E8F)
[Address] EAT @iexplore.exe (PathCommonPrefixW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E7E)
[Address] EAT @iexplore.exe (PathCompactPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77DEA)
[Address] EAT @iexplore.exe (PathCompactPathExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77C40)
[Address] EAT @iexplore.exe (PathCompactPathExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70448)
[Address] EAT @iexplore.exe (PathCompactPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B6CC)
[Address] EAT @iexplore.exe (PathCreateFromUrlA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A769EF)
[Address] EAT @iexplore.exe (PathCreateFromUrlAlloc) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A769DE)
[Address] EAT @iexplore.exe (PathCreateFromUrlW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E0B)
[Address] EAT @iexplore.exe (PathFileExistsA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CE6)
[Address] EAT @iexplore.exe (PathFileExistsAndAttributesW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67AC0)
[Address] EAT @iexplore.exe (PathFileExistsW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66F20)
[Address] EAT @iexplore.exe (PathFindExtensionA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D19)
[Address] EAT @iexplore.exe (PathFindExtensionW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A657C8)
[Address] EAT @iexplore.exe (PathFindFileNameA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CD5)
[Address] EAT @iexplore.exe (PathFindFileNameW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A657B7)
[Address] EAT @iexplore.exe (PathFindNextComponentA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76BE7)
[Address] EAT @iexplore.exe (PathFindNextComponentW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67E61)
[Address] EAT @iexplore.exe (PathFindOnPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7846C)
[Address] EAT @iexplore.exe (PathFindOnPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70775)
[Address] EAT @iexplore.exe (PathFindSuffixArrayA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A783B7)
[Address] EAT @iexplore.exe (PathFindSuffixArrayW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68D11)
[Address] EAT @iexplore.exe (PathGetArgsA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7688B)
[Address] EAT @iexplore.exe (PathGetArgsW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73B0A)
[Address] EAT @iexplore.exe (PathGetCharTypeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A768AC)
[Address] EAT @iexplore.exe (PathGetCharTypeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65ED2)
[Address] EAT @iexplore.exe (PathGetDriveNumberA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E3A)
[Address] EAT @iexplore.exe (PathGetDriveNumberW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65795)
[Address] EAT @iexplore.exe (PathIsContentTypeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77AA9)
[Address] EAT @iexplore.exe (PathIsContentTypeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FE28)
[Address] EAT @iexplore.exe (PathIsDirectoryA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A78279)
[Address] EAT @iexplore.exe (PathIsDirectoryEmptyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A78187)
[Address] EAT @iexplore.exe (PathIsDirectoryEmptyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7BA25)
[Address] EAT @iexplore.exe (PathIsDirectoryW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67851)
[Address] EAT @iexplore.exe (PathIsFileSpecA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E4B)
[Address] EAT @iexplore.exe (PathIsFileSpecW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67AAF)
[Address] EAT @iexplore.exe (PathIsLFNFileSpecA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DD4)
[Address] EAT @iexplore.exe (PathIsLFNFileSpecW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DC3)
[Address] EAT @iexplore.exe (PathIsNetworkPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7717B)
[Address] EAT @iexplore.exe (PathIsNetworkPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67C86)
[Address] EAT @iexplore.exe (PathIsPrefixA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E6D)
[Address] EAT @iexplore.exe (PathIsPrefixW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E5C)
[Address] EAT @iexplore.exe (PathIsRelativeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E29)
[Address] EAT @iexplore.exe (PathIsRelativeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66F31)
[Address] EAT @iexplore.exe (PathIsRootA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D6E)
[Address] EAT @iexplore.exe (PathIsRootW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68CAB)
[Address] EAT @iexplore.exe (PathIsSameRootA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DF6)
[Address] EAT @iexplore.exe (PathIsSameRootW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DE5)
[Address] EAT @iexplore.exe (PathIsSystemFolderA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A777A6)
[Address] EAT @iexplore.exe (PathIsSystemFolderW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B549)
[Address] EAT @iexplore.exe (PathIsUNCA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C1A)
[Address] EAT @iexplore.exe (PathIsUNCServerA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CF7)
[Address] EAT @iexplore.exe (PathIsUNCServerShareA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D08)
[Address] EAT @iexplore.exe (PathIsUNCServerShareW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67B7A)
[Address] EAT @iexplore.exe (PathIsUNCServerW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67B69)
[Address] EAT @iexplore.exe (PathIsUNCW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65784)
[Address] EAT @iexplore.exe (PathIsURLA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A769CD)
[Address] EAT @iexplore.exe (PathIsURLW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66DFA)
[Address] EAT @iexplore.exe (PathMakePrettyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A78B6E)
[Address] EAT @iexplore.exe (PathMakePrettyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FF0A)
[Address] EAT @iexplore.exe (PathMakeSystemFolderA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77822)
[Address] EAT @iexplore.exe (PathMakeSystemFolderW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66059)
[Address] EAT @iexplore.exe (PathMatchSpecA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C80)
[Address] EAT @iexplore.exe (PathMatchSpecExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C5E)
[Address] EAT @iexplore.exe (PathMatchSpecExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70645)
[Address] EAT @iexplore.exe (PathMatchSpecW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C6F)
[Address] EAT @iexplore.exe (PathParseIconLocationA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CC4)
[Address] EAT @iexplore.exe (PathParseIconLocationW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67BF5)
[Address] EAT @iexplore.exe (PathQuoteSpacesA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CA2)
[Address] EAT @iexplore.exe (PathQuoteSpacesW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68D5B)
[Address] EAT @iexplore.exe (PathRelativePathToA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76BF8)
[Address] EAT @iexplore.exe (PathRelativePathToW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73AC6)
[Address] EAT @iexplore.exe (PathRemoveArgsA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A78B40)
[Address] EAT @iexplore.exe (PathRemoveArgsW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6A4F7)
[Address] EAT @iexplore.exe (PathRemoveBackslashA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76DB2)
[Address] EAT @iexplore.exe (PathRemoveBackslashW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E4F)
[Address] EAT @iexplore.exe (PathRemoveBlanksA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C91)
[Address] EAT @iexplore.exe (PathRemoveBlanksW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6776C)
[Address] EAT @iexplore.exe (PathRemoveExtensionA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D5D)
[Address] EAT @iexplore.exe (PathRemoveExtensionW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67CED)
[Address] EAT @iexplore.exe (PathRemoveFileSpecA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C2B)
[Address] EAT @iexplore.exe (PathRemoveFileSpecW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C1B)
[Address] EAT @iexplore.exe (PathRenameExtensionA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D4C)
[Address] EAT @iexplore.exe (PathRenameExtensionW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D3B)
[Address] EAT @iexplore.exe (PathSearchAndQualifyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7687A)
[Address] EAT @iexplore.exe (PathSearchAndQualifyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71AE9)
[Address] EAT @iexplore.exe (PathSetDlgItemPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77B3D)
[Address] EAT @iexplore.exe (PathSetDlgItemPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B5C7)
[Address] EAT @iexplore.exe (PathSkipRootA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E07)
[Address] EAT @iexplore.exe (PathSkipRootW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67E50)
[Address] EAT @iexplore.exe (PathStripPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76E18)
[Address] EAT @iexplore.exe (PathStripPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67B8B)
[Address] EAT @iexplore.exe (PathStripToRootA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76D2A)
[Address] EAT @iexplore.exe (PathStripToRootW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67CFE)
[Address] EAT @iexplore.exe (PathUnExpandEnvStringsA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76C4D)
[Address] EAT @iexplore.exe (PathUnExpandEnvStringsW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71AD8)
[Address] EAT @iexplore.exe (PathUndecorateA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A776F8)
[Address] EAT @iexplore.exe (PathUndecorateW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65EFE)
[Address] EAT @iexplore.exe (PathUnmakeSystemFolderA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A777E4)
[Address] EAT @iexplore.exe (PathUnmakeSystemFolderW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7B588)
[Address] EAT @iexplore.exe (PathUnquoteSpacesA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76CB3)
[Address] EAT @iexplore.exe (PathUnquoteSpacesW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6777D)
[Address] EAT @iexplore.exe (QISearch) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6566B)
[Address] EAT @iexplore.exe (SHAllocShared) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71BF8)
[Address] EAT @iexplore.exe (SHAnsiToAnsi) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7731E)
[Address] EAT @iexplore.exe (SHAnsiToUnicode) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7004B)
[Address] EAT @iexplore.exe (SHAutoComplete) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6EDC7)
[Address] EAT @iexplore.exe (SHCopyKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772FC)
[Address] EAT @iexplore.exe (SHCopyKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70097)
[Address] EAT @iexplore.exe (SHCreateMemStream) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D97)
[Address] EAT @iexplore.exe (SHCreateShellPalette) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71B15)
[Address] EAT @iexplore.exe (SHCreateStreamOnFileA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771DB)
[Address] EAT @iexplore.exe (SHCreateStreamOnFileEx) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71EB0)
[Address] EAT @iexplore.exe (SHCreateStreamOnFileW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65EE3)
[Address] EAT @iexplore.exe (SHCreateStreamWrapper) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A63EEE)
[Address] EAT @iexplore.exe (SHCreateThread) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7153E)
[Address] EAT @iexplore.exe (SHCreateThreadRef) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67A6D)
[Address] EAT @iexplore.exe (SHCreateThreadWithHandle) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67C06)
[Address] EAT @iexplore.exe (SHDeleteEmptyKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771FD)
[Address] EAT @iexplore.exe (SHDeleteEmptyKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771EC)
[Address] EAT @iexplore.exe (SHDeleteKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FE7F)
[Address] EAT @iexplore.exe (SHDeleteKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68C86)
[Address] EAT @iexplore.exe (SHDeleteOrphanKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8A7A5)
[Address] EAT @iexplore.exe (SHDeleteOrphanKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8A755)
[Address] EAT @iexplore.exe (SHDeleteValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7720E)
[Address] EAT @iexplore.exe (SHDeleteValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68D00)
[Address] EAT @iexplore.exe (SHEnumKeyExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772DA)
[Address] EAT @iexplore.exe (SHEnumKeyExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772C9)
[Address] EAT @iexplore.exe (SHEnumValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772B8)
[Address] EAT @iexplore.exe (SHEnumValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6FDE8)
[Address] EAT @iexplore.exe (SHFormatDateTimeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7BCC7)
[Address] EAT @iexplore.exe (SHFormatDateTimeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7BD3F)
[Address] EAT @iexplore.exe (SHFreeShared) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71C09)
[Address] EAT @iexplore.exe (SHGetInverseCMAP) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7D3B5)
[Address] EAT @iexplore.exe (SHGetThreadRef) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70591)
[Address] EAT @iexplore.exe (SHGetValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71BDD)
[Address] EAT @iexplore.exe (SHGetValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67CBA)
[Address] EAT @iexplore.exe (SHGetViewStatePropertyBag) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A69323)
[Address] EAT @iexplore.exe (SHIsChildOrSelf) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6590A)
[Address] EAT @iexplore.exe (SHIsLowMemoryMachine) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A87E50)
[Address] EAT @iexplore.exe (SHLoadIndirectString) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D0F)
[Address] EAT @iexplore.exe (SHLockShared) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8AEC2)
[Address] EAT @iexplore.exe (SHMessageBoxCheckA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A87258)
[Address] EAT @iexplore.exe (SHMessageBoxCheckW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A87387)
[Address] EAT @iexplore.exe (SHOpenRegStream2A) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771A8)
[Address] EAT @iexplore.exe (SHOpenRegStream2W) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A71AFA)
[Address] EAT @iexplore.exe (SHOpenRegStreamA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771CA)
[Address] EAT @iexplore.exe (SHOpenRegStreamW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A771B9)
[Address] EAT @iexplore.exe (SHPackDispParamsV) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A69F0E)
[Address] EAT @iexplore.exe (SHPropertyBag_ReadStrAlloc) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8C2A1)
[Address] EAT @iexplore.exe (SHPropertyBag_WriteBSTR) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8C229)
[Address] EAT @iexplore.exe (SHQueryInfoKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772A7)
[Address] EAT @iexplore.exe (SHQueryInfoKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77296)
[Address] EAT @iexplore.exe (SHQueryValueExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7721F)
[Address] EAT @iexplore.exe (SHQueryValueExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67DD4)
[Address] EAT @iexplore.exe (SHRegCloseUSKey) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B70)
[Address] EAT @iexplore.exe (SHRegCreateUSKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B5F)
[Address] EAT @iexplore.exe (SHRegCreateUSKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D4C)
[Address] EAT @iexplore.exe (SHRegDeleteEmptyUSKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B4E)
[Address] EAT @iexplore.exe (SHRegDeleteEmptyUSKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B3D)
[Address] EAT @iexplore.exe (SHRegDeleteUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B2C)
[Address] EAT @iexplore.exe (SHRegDeleteUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B1B)
[Address] EAT @iexplore.exe (SHRegDuplicateHKey) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77285)
[Address] EAT @iexplore.exe (SHRegEnumUSKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76B0A)
[Address] EAT @iexplore.exe (SHRegEnumUSKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AF9)
[Address] EAT @iexplore.exe (SHRegEnumUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AE8)
[Address] EAT @iexplore.exe (SHRegEnumUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D19)
[Address] EAT @iexplore.exe (SHRegGetBoolUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AD7)
[Address] EAT @iexplore.exe (SHRegGetBoolUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B9D9)
[Address] EAT @iexplore.exe (SHRegGetBoolValueFromHKCUHKLM) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D78)
[Address] EAT @iexplore.exe (SHRegGetIntW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77274)
[Address] EAT @iexplore.exe (SHRegGetPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77263)
[Address] EAT @iexplore.exe (SHRegGetPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73AD7)
[Address] EAT @iexplore.exe (SHRegGetUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AC6)
[Address] EAT @iexplore.exe (SHRegGetUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70634)
[Address] EAT @iexplore.exe (SHRegGetValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A772EB)
[Address] EAT @iexplore.exe (SHRegGetValueFromHKCUHKLM) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6978F)
[Address] EAT @iexplore.exe (SHRegGetValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C66)
[Address] EAT @iexplore.exe (SHRegOpenUSKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AB5)
[Address] EAT @iexplore.exe (SHRegOpenUSKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76AA4)
[Address] EAT @iexplore.exe (SHRegQueryInfoUSKeyA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A93)
[Address] EAT @iexplore.exe (SHRegQueryInfoUSKeyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D3B)
[Address] EAT @iexplore.exe (SHRegQueryUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A82)
[Address] EAT @iexplore.exe (SHRegQueryUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A71)
[Address] EAT @iexplore.exe (SHRegSetPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77252)
[Address] EAT @iexplore.exe (SHRegSetPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77241)
[Address] EAT @iexplore.exe (SHRegSetUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A60)
[Address] EAT @iexplore.exe (SHRegSetUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A4F)
[Address] EAT @iexplore.exe (SHRegWriteUSValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76A3E)
[Address] EAT @iexplore.exe (SHRegWriteUSValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D2A)
[Address] EAT @iexplore.exe (SHRegisterValidateTemplate) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8FE52)
[Address] EAT @iexplore.exe (SHReleaseThreadRef) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7718C)
[Address] EAT @iexplore.exe (SHRunIndirectRegClientCommand) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A798C2)
[Address] EAT @iexplore.exe (SHSendMessageBroadcastA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A86833)
[Address] EAT @iexplore.exe (SHSendMessageBroadcastW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68CCD)
[Address] EAT @iexplore.exe (SHSetThreadRef) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67A52)
[Address] EAT @iexplore.exe (SHSetValueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77230)
[Address] EAT @iexplore.exe (SHSetValueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A69111)
[Address] EAT @iexplore.exe (SHSkipJunction) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65DC7)
[Address] EAT @iexplore.exe (SHStrDupA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73AE8)
[Address] EAT @iexplore.exe (SHStrDupW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65BE1)
[Address] EAT @iexplore.exe (SHStripMneumonicA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A86D51)
[Address] EAT @iexplore.exe (SHStripMneumonicW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65E69)
[Address] EAT @iexplore.exe (SHUnicodeToAnsi) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D20)
[Address] EAT @iexplore.exe (SHUnicodeToAnsiCP) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A63F15)
[Address] EAT @iexplore.exe (SHUnicodeToUnicode) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7730D)
[Address] EAT @iexplore.exe (SHUnlockShared) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A8AEA0)
[Address] EAT @iexplore.exe (ShellMessageBoxA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7952B)
[Address] EAT @iexplore.exe (ShellMessageBoxW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C193)
[Address] EAT @iexplore.exe (StrCSpnA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76FD2)
[Address] EAT @iexplore.exe (StrCSpnIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76FC1)
[Address] EAT @iexplore.exe (StrCSpnIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76FB0)
[Address] EAT @iexplore.exe (StrCSpnW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70623)
[Address] EAT @iexplore.exe (StrCatBuffA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A770D1)
[Address] EAT @iexplore.exe (StrCatBuffW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A770E2)
[Address] EAT @iexplore.exe (StrCatChainW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76EB1)
[Address] EAT @iexplore.exe (StrCatW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C947)
[Address] EAT @iexplore.exe (StrChrA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A770C0)
[Address] EAT @iexplore.exe (StrChrIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7708D)
[Address] EAT @iexplore.exe (StrChrIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65773)
[Address] EAT @iexplore.exe (StrChrNIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7707C)
[Address] EAT @iexplore.exe (StrChrNW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A770AF)
[Address] EAT @iexplore.exe (StrChrW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A657A6)
[Address] EAT @iexplore.exe (StrCmpCA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76ED3)
[Address] EAT @iexplore.exe (StrCmpCW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A68CEF)
[Address] EAT @iexplore.exe (StrCmpICA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6567C)
[Address] EAT @iexplore.exe (StrCmpICW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D5D)
[Address] EAT @iexplore.exe (StrCmpIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C33)
[Address] EAT @iexplore.exe (StrCmpLogicalW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76EC2)
[Address] EAT @iexplore.exe (StrCmpNA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70690)
[Address] EAT @iexplore.exe (StrCmpNCA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76EF5)
[Address] EAT @iexplore.exe (StrCmpNCW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76EE4)
[Address] EAT @iexplore.exe (StrCmpNIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F9F)
[Address] EAT @iexplore.exe (StrCmpNICA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A70656)
[Address] EAT @iexplore.exe (StrCmpNICW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A716E2)
[Address] EAT @iexplore.exe (StrCmpNIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C55)
[Address] EAT @iexplore.exe (StrCmpNW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E93)
[Address] EAT @iexplore.exe (StrCmpW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A657D9)
[Address] EAT @iexplore.exe (StrCpyNW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A770F3)
[Address] EAT @iexplore.exe (StrCpyW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C98E)
[Address] EAT @iexplore.exe (StrDupA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F39)
[Address] EAT @iexplore.exe (StrDupW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67CCB)
[Address] EAT @iexplore.exe (StrFormatByteSize64A) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C86B)
[Address] EAT @iexplore.exe (StrFormatByteSizeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C84D)
[Address] EAT @iexplore.exe (StrFormatByteSizeEx) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67E1C)
[Address] EAT @iexplore.exe (StrFormatByteSizeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C8B9)
[Address] EAT @iexplore.exe (StrFormatKBSizeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C7D6)
[Address] EAT @iexplore.exe (StrFormatKBSizeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C82D)
[Address] EAT @iexplore.exe (StrFromTimeIntervalA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A85623)
[Address] EAT @iexplore.exe (StrFromTimeIntervalW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A855B0)
[Address] EAT @iexplore.exe (StrIsIntlEqualA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F28)
[Address] EAT @iexplore.exe (StrIsIntlEqualW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F17)
[Address] EAT @iexplore.exe (StrNCatA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C913)
[Address] EAT @iexplore.exe (StrNCatW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C8D9)
[Address] EAT @iexplore.exe (StrPBrkA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77049)
[Address] EAT @iexplore.exe (StrPBrkW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6AE4F)
[Address] EAT @iexplore.exe (StrRChrA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7709E)
[Address] EAT @iexplore.exe (StrRChrIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7706B)
[Address] EAT @iexplore.exe (StrRChrIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7705A)
[Address] EAT @iexplore.exe (StrRChrW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A699BE)
[Address] EAT @iexplore.exe (StrRStrIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F8E)
[Address] EAT @iexplore.exe (StrRStrIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F7D)
[Address] EAT @iexplore.exe (StrRetToBSTR) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A73AF9)
[Address] EAT @iexplore.exe (StrRetToBufA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C688)
[Address] EAT @iexplore.exe (StrRetToBufW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65D6E)
[Address] EAT @iexplore.exe (StrRetToStrA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7C70A)
[Address] EAT @iexplore.exe (StrRetToStrW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67D67)
[Address] EAT @iexplore.exe (StrSpnA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76FF4)
[Address] EAT @iexplore.exe (StrSpnW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76FE3)
[Address] EAT @iexplore.exe (StrStrA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F6C)
[Address] EAT @iexplore.exe (StrStrIA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65EC1)
[Address] EAT @iexplore.exe (StrStrIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65762)
[Address] EAT @iexplore.exe (StrStrNIW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F4A)
[Address] EAT @iexplore.exe (StrStrNW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F5B)
[Address] EAT @iexplore.exe (StrStrW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65C44)
[Address] EAT @iexplore.exe (StrToInt64ExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77016)
[Address] EAT @iexplore.exe (StrToInt64ExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77027)
[Address] EAT @iexplore.exe (StrToIntA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77038)
[Address] EAT @iexplore.exe (StrToIntExA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A77005)
[Address] EAT @iexplore.exe (StrToIntExW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6AE60)
[Address] EAT @iexplore.exe (StrToIntW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A657EA)
[Address] EAT @iexplore.exe (StrTrimA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76F06)
[Address] EAT @iexplore.exe (StrTrimW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A67CDC)
[Address] EAT @iexplore.exe (UrlApplySchemeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A769BC)
[Address] EAT @iexplore.exe (UrlApplySchemeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A769AB)
[Address] EAT @iexplore.exe (UrlCanonicalizeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A7699A)
[Address] EAT @iexplore.exe (UrlCanonicalizeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E3E)
[Address] EAT @iexplore.exe (UrlCombineA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76989)
[Address] EAT @iexplore.exe (UrlCombineW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E71)
[Address] EAT @iexplore.exe (UrlCompareA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76978)
[Address] EAT @iexplore.exe (UrlCompareW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76967)
[Address] EAT @iexplore.exe (UrlCreateFromPathA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76956)
[Address] EAT @iexplore.exe (UrlCreateFromPathW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6778E)
[Address] EAT @iexplore.exe (UrlEscapeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76945)
[Address] EAT @iexplore.exe (UrlEscapeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E60)
[Address] EAT @iexplore.exe (UrlFixupW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76934)
[Address] EAT @iexplore.exe (UrlGetLocationA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76923)
[Address] EAT @iexplore.exe (UrlGetLocationW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76912)
[Address] EAT @iexplore.exe (UrlGetPartA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76901)
[Address] EAT @iexplore.exe (UrlGetPartW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E82)
[Address] EAT @iexplore.exe (UrlHashA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A768F0)
[Address] EAT @iexplore.exe (UrlHashW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A768DF)
[Address] EAT @iexplore.exe (UrlIsA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A768CE)
[Address] EAT @iexplore.exe (UrlIsNoHistoryA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76847)
[Address] EAT @iexplore.exe (UrlIsNoHistoryW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A65EB0)
[Address] EAT @iexplore.exe (UrlIsOpaqueA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76869)
[Address] EAT @iexplore.exe (UrlIsOpaqueW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A76858)
[Address] EAT @iexplore.exe (UrlIsW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E2D)
[Address] EAT @iexplore.exe (UrlUnescapeA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A768BD)
[Address] EAT @iexplore.exe (UrlUnescapeW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A66E1C)
[Address] EAT @iexplore.exe (WhichPlatform) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A86B96)
[Address] EAT @iexplore.exe (wnsprintfA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B420)
[Address] EAT @iexplore.exe (wnsprintfW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B184)
[Address] EAT @iexplore.exe (wvnsprintfA) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B3E1)
[Address] EAT @iexplore.exe (wvnsprintfW) : ADVAPI32.dll -> HOOKED (C:\Windows\SYSTEM32\SHLWAPI.dll @ 0x75A6B226)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts




¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD10JPVT-55A1YT0 +++++
--- User ---
[MBR] f2ce64701ad9a3032a157432ecfb46e2
[BSP] 7dfbadcc9be858b035aba065cdda01f1 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 718848 | Size: 953517 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : >


.

[color=#D12AC4] Here is the 2nd log from RougeKiller. I only scanned I didn't clean anything [/color]

It is much different.

RogueKiller V8.8.15 [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 8 (6.2.9200 ) 64 bits version
Started in : Normal mode
User : nikka [Admin rights]
Mode : Scan -- Date : 05/20/2014 00:50:42
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts




¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD10JPVT-55A1YT0 +++++
--- User ---
[MBR] f2ce64701ad9a3032a157432ecfb46e2
[BSP] 7dfbadcc9be858b035aba065cdda01f1 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 350 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 718848 | Size: 953517 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : >
RKreport[0]_S_05192014_211651.txt

I have also attached the attach.7z file.

Edited by GamerGuy9000, 21 May 2014 - 07:19 AM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,703 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:30 PM

Posted 26 May 2014 - 05:15 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/535043 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,703 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:30 PM

Posted 31 May 2014 - 05:20 AM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users