Jump to content

Random Audio in background


Recommended Posts

Hello, I've seen some other similar postings about this so I know I'm not alone. My girlfriend got excited about the opportunity to view some of her shows through some bootleg sites and this is what she gets. She must have clicked on the wrong link because now it's like we have a ghost in the computer in the form of random background audio that sounds like adverstisments and other weird stuff. I ran full Malware scan. I'm going to post my log results below. Please help!

 

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org

Database version: v2014.03.26.01

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Hilda :: CRAZYMONKEY [administrator]

Protection: Enabled

3/25/2014 8:45:08 PM
MBAM-log-2014-03-26 (05-54-25).txt

Scan type: Full scan (C:\|D:\|E:\|Q:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 471556
Time elapsed: 1 hour(s), 38 minute(s), 20 second(s)

Memory Processes Detected: 2
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> 2208 -> No action taken.
C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe (PUP.Optional.BrowserSafeGuard.A) -> 4400 -> No action taken.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 10
HKLM\SYSTEM\CurrentControlSet\Services\Level Quality Watcher (PUP.Optional.Savingsbull) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> No action taken.
HKCR\TypeLib\{03771AEF-400D-4A13-B712-25878EC4A3F5} (PUP.Optional.OutBrowse) -> No action taken.
HKCR\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} (PUP.Optional.OutBrowse) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Browsersafeguard (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
HKCU\Software\AppDataLow\Software\Crossrider (PUP.Optional.CrossRider.A) -> No action taken.
HKCU\Software\AppDataLow\Software\Savings Bull (PUP.Optional.SavingsBull.A) -> No action taken.
HKCU\SOFTWARE\SEARCHPROTECTINT (PUP.Optional.SearchProtect.A) -> No action taken.
HKLM\SOFTWARE\BROWSERSAFEGUARD (PUP.Optional.BrowserSafeGuard.A) -> No action taken.

Registry Values Detected: 3
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|BrowserSafeguard (PUP.Optional.BrowserSafeGuard.A) -> Data: "C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe" -> No action taken.
HKCU\Software\SearchProtectINT|Install (PUP.Optional.SearchProtect.A) -> Data: 1 -> No action taken.
HKLM\SOFTWARE\Browsersafeguard|sourceid (PUP.Optional.BrowserSafeGuard.A) -> Data: browsersafeguard-rockettab-revenyou -> No action taken.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 4
C:\Program Files (x86)\Browsersafeguard (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files\Level Quality Watcher\v1.01 (PUP.Optional.Adpeak) -> No action taken.
C:\Program Files\SavingsBull (PUP.Optional.SavingsBull.A) -> No action taken.

Files Detected: 34
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> No action taken.
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher32.exe (PUP.Optional.Savingsbull) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OTR6GFPA\ConvertFilesforFree[1].exe (PUP.Optional.FastFreeConverter.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OTR6GFPA\SearchProtectGeneric2[1].exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OTR6GFPA\spstub[1].exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QWJ2K3I8\cbs_savingsbull_BBA5481A-926B-4561-BD79-249F618495E6[1].exe (PUP.Optional.Savingsbull) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WQCLP5SE\setup.exe (PUP.Optional.Outbrowse) -> No action taken.
C:\Users\Hilda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WQCLP5SE\SPSetup[1].exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\InSetup1395022523.exe (PUP.Optional.OutBrowse) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse7C7C.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse8025.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse868E.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse8A37.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsg6756.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsgAEF4.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsgB339.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsl6B1E.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsrDDB5.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\SearchProtectINT.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsj45C2\SpSetup.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsl3F8A\SpSetup.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\ewebstorewrapper.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\makecert.exe (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\TrustedRoot.cer (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\uninstall.BrowserSafeguard.exe (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\certutil.exe (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\libnspr4.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\libplc4.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\libplds4.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\nss3.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\smime3.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files (x86)\Browsersafeguard\Resources\softokn3.dll (PUP.Optional.BrowserSafeGuard.A) -> No action taken.
C:\Program Files\SavingsBull\uninstaller.exe (PUP.Optional.SavingsBull.A) -> No action taken.

(end)

Link to post
Share on other sites

Welcome to the forum.

Please run a Quick Scan with Malwarebytes like this and post the log:

Open up Malwarebytes > Settings Tab > Scanner Settings > Under action for PUP > Select: Show in Results List and Check for removal.

Please Update and run a Quick Scan with Malwarebytes Anti-Malware, post the report.

Make sure that everything is checked, and click Remove Selected.

If you're using Malwarebytes 2.0, please run a Threat Scan

Then....please start HERE <--------

Post back the 2 logs here.....DDS.txt and Attach.txt

(please don't put logs in code or quotes and use the default font)

Don't forget to RogueKiller below

General P2P/Piracy Warning:

 

1. If you're using Peer 2 Peer software such uTorrent, BitTorrent or similar you must either fully uninstall it or completely disable it from running while being assisted here.

Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.

2. If you have illegal/cracked software, cracks, keygens, custom (Adobe) host file, etc. on the system, please remove or uninstall them now and read the policy on Piracy.

Failure to remove such software will result in your topic being closed and no further assistance being provided.

<====><====><====><====><====><====><====><====>

Next................

Please download and run RogueKiller 32 bit to your desktop.

RogueKiller<---use this one for 64 bit systems

Which system am I using?

Quit all running programs.

For Windows XP, double-click to start.

For Vista or Windows 7-8, do a right-click on the program, select Run as Administrator to start, & when prompted Allow to run.

Click Scan to scan the system.

When the scan completes > Close out the program > Don't Fix anything!

Don't run any other options, they're not all bad!!!!!!!

Post back the report which should be located on your desktop.

(please don't put logs in code or quotes and use the default font)

MrC

Note:

Please read all of my instructions completely including these.

Make sure system restore is turned on and running

Make sure you're subscribed to this topic: Click on the Follow This Topic Button (at the top right of this page), make sure that the Receive notification box is checked and that it is set to Instantly

Removing malware can be unpredictable...unlikely but things can go very wrong! Backup any files that cannot be replaced. You can copy them to a CD/DVD, external drive or a pen drive

<+>Please don't run any other scans, download, install or uninstall any programs while I'm working with you.

<+>The removal of malware isn't instantaneous, please be patient.

<+>When we are done, I'll give to instructions on how to cleanup all the tools and logs

<+>Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that.

------->Your topic will be closed if you haven't replied within 3 days!<--------

(If I don't respond within 24 hours, please send me a PM)

Link to post
Share on other sites

Here's a couple symptoms (it's still early on the west coast) we're experiencing

 

AVG PC Tuneup desktop popups. I'm pretty sure this is a Fake AVG because the logo is differnent and this one is from the Netherlands it says.

Random audio in the background, already described.

 

Thanks! I'll be at work and look forward to doing some work on this tonight!

Link to post
Share on other sites

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org

Database version: v2014.03.26.07

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Hilda :: CRAZYMONKEY [administrator]

Protection: Enabled

3/26/2014 7:45:32 PM
MBAM-log-2014-03-26 (19-57-45).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | PUP | PUM
Scan options disabled: Heuristics/Extra | Heuristics/Shuriken | P2P
Objects scanned: 42495
Time elapsed: 8 minute(s), 30 second(s)

Memory Processes Detected: 1
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> 2208 -> No action taken.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 5
HKLM\SYSTEM\CurrentControlSet\Services\Level Quality Watcher (PUP.Optional.Savingsbull) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> No action taken.
HKCR\TypeLib\{03771AEF-400D-4A13-B712-25878EC4A3F5} (PUP.Optional.OutBrowse) -> No action taken.
HKCR\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} (PUP.Optional.OutBrowse) -> No action taken.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 20
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\InSetup1395022523.exe (PUP.Optional.OutBrowse) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse7C7C.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse8025.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse868E.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nse8A37.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsg6756.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsgAEF4.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsgB339.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsl6B1E.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsrDDB5.exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\SearchProtectINT.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsj45C2\SpSetup.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\AppData\Local\Temp\nsl3F8A\SpSetup.exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\ConvertFilesforFree[1].exe (PUP.Optional.FastFreeConverter.A) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\SearchProtectGeneric2[1].exe (PUP.Optional.SearchProtect.A) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\spstub[1].exe (PUP.Optional.Conduit.A) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\QWJ2K3I8\cbs_savingsbull_BBA5481A-926B-4561-BD79-249F618495E6[1].exe (PUP.Optional.Savingsbull) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\WQCLP5SE\setup.exe (PUP.Optional.Outbrowse) -> No action taken.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\WQCLP5SE\SPSetup[1].exe (PUP.Optional.Conduit.A) -> No action taken.

(end)

Link to post
Share on other sites

Here's the report AFTER I removed selected.

 

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org

Database version: v2014.03.26.07

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Hilda :: CRAZYMONKEY [administrator]

Protection: Enabled

3/26/2014 7:45:32 PM
mbam-log-2014-03-26 (19-45-32).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | PUP | PUM
Scan options disabled: Heuristics/Extra | Heuristics/Shuriken | P2P
Objects scanned: 42495
Time elapsed: 8 minute(s), 30 second(s)

Memory Processes Detected: 1
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> 2208 -> Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 5
HKLM\SYSTEM\CurrentControlSet\Services\Level Quality Watcher (PUP.Optional.Savingsbull) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{59A062A1-5ECA-4A1A-BC44-B2A9283A8ACB} (PUP.Optional.FreeFileConverter.A) -> Quarantined and deleted successfully.
HKCR\TypeLib\{03771AEF-400D-4A13-B712-25878EC4A3F5} (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.
HKCR\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534} (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 20
C:\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe (PUP.Optional.Savingsbull) -> Delete on reboot.
C:\Users\Hilda\AppData\Local\Temp\InSetup1395022523.exe (PUP.Optional.OutBrowse) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nse7C7C.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nse8025.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nse868E.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nse8A37.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsg6756.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsgAEF4.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsgB339.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsl6B1E.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsrDDB5.exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\SearchProtectINT.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsj45C2\SpSetup.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\AppData\Local\Temp\nsl3F8A\SpSetup.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\ConvertFilesforFree[1].exe (PUP.Optional.FastFreeConverter.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\SearchProtectGeneric2[1].exe (PUP.Optional.SearchProtect.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\OTR6GFPA\spstub[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\QWJ2K3I8\cbs_savingsbull_BBA5481A-926B-4561-BD79-249F618495E6[1].exe (PUP.Optional.Savingsbull) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\WQCLP5SE\setup.exe (PUP.Optional.Outbrowse) -> Quarantined and deleted successfully.
C:\Users\Hilda\Local Settings\Temporary Internet Files\Content.IE5\WQCLP5SE\SPSetup[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.

(end)

Link to post
Share on other sites

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 9.0.8112.16450  BrowserJavaVersion: 10.51.2
Run by Hilda at 20:10:41 on 2014-03-26
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.3836.1532 [GMT -7:00]
.
AV: AVG AntiVirus Free Edition 2013 *Enabled/Updated* {0E9420C4-06B3-7FA0-3AB1-6E49CB52ECD9}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: AVG AntiVirus Free Edition 2013 *Enabled/Updated* {B5F5C120-2089-702E-0001-553BB0D5A664}
.
============== Running Processes ===============
.
C:\PROGRA~2\AVG\AVG2013\avgrsa.exe
C:\Program Files (x86)\AVG\AVG2013\avgcsrva.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\SysWOW64\svchost.exe
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_14e7194c26fb7998\STacSV64.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Hpservice.exe
C:\Windows\system32\atieclxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_14e7194c26fb7998\AESTSr64.exe
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files (x86)\AVG\AVG2013\avgidsagent.exe
C:\Program Files (x86)\AVG\AVG2013\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe
C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe
C:\SPLASH.SYS\config\DVMExportService.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe
C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe
C:\Program Files (x86)\Comcast\Desktop Doctor\bin\sprtsvc.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files (x86)\AVG PC TuneUp 2014\TuneUpUtilitiesService64.exe
C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\18.0.5\ToolbarUpdater.exe
C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe
C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\18.0.5\loggingserver.exe
C:\Program Files (x86)\AVG\AVG2013\avgnsa.exe
C:\Program Files (x86)\AVG\AVG2013\avgemca.exe
C:\Program Files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\IDT\WDM\sttray64.exe
C:\Program Files (x86)\Skype\Phone\Skype.exe
C:\Users\Hilda\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe
C:\Program Files (x86)\Microsoft Office\Office12\ONENOTEM.EXE
C:\Program Files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVH.EXE
C:\Program Files (x86)\Comcast\Desktop Doctor\bin\sprtcmd.exe
C:\Program Files (x86)\AVG\AVG2013\avgui.exe
C:\Program Files (x86)\AVG Secure Search\vprot.exe
C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe
C:\Windows\system32\taskeng.exe
C:\Program Files (x86)\AVG PC TuneUp 2014\TuneUpUtilitiesApp64.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Windows\system32\taskeng.exe
c:\Program Files (x86)\Hewlett-Packard\TouchSmart\Media\Kernel\CLML\CLMLSvc.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_12_0_0_77_ActiveX.exe
C:\Program Files (x86)\Common Files\microsoft shared\virtualization handler\OfficeVirt.exe
C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.

uProxyServer = hxxp=127.0.0.1:49176;https=127.0.0.1:49176
uProxyOverride = <-loopback>
mWinlogon: Userinit = userinit.exe,
BHO: HP Print Enhancer: {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dll
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Java Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
BHO: AVG Security Toolbar: {95B7759C-8C7F-4BF1-B163-73684A933233} - C:\Program Files (x86)\AVG Secure Search\18.0.5.292\AVG Secure Search_toolbar.dll
BHO: Skype Browser Helper: {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
BHO: Microsoft Live Search Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\Program Files (x86)\MSN\Toolbar\3.0.0566.0\msneshellx.dll
BHO: Java Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll
BHO: HP Smart BHO Class: {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
TB: Microsoft Live Search Toolbar: {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - c:\Program Files (x86)\MSN\Toolbar\3.0.0566.0\msneshellx.dll
TB: AVG Security Toolbar: {95B7759C-8C7F-4BF1-B163-73684A933233} - C:\Program Files (x86)\AVG Secure Search\18.0.5.292\AVG Secure Search_toolbar.dll
EB: HP Smart Web Printing: {555D4D79-4BD2-4094-A395-CFC534424A05} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_bho.dll
EB: HP Smart Web Printing: {555D4D79-4BD2-4094-A395-CFC534424A05} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_bho.dll
uRun: [Download] "C:\Users\Hilda\AppData\Local\SupportSoft\ddoctorv2\Hilda\SSGet.exe" 120 "http://pcmctbc.cmc.motive.com/motivedocs/EasySolveInstaller.exe" "EasySolveInstaller.exe"
uRun: [skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun
uRun: [spotify] "C:\Users\Hilda\AppData\Roaming\Spotify\Spotify.exe" /uri spotify:autostart
uRun: [spotify Web Helper] "C:\Users\Hilda\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe"
uRun: [Google Update] "C:\Users\Hilda\AppData\Local\Google\Update\GoogleUpdate.exe" /c
mRun: [startCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun: [HPCam_Menu] "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam\MUITransfer\MUIStartMenu.exe" "c:\Program Files (x86)\Hewlett-Packard\Media\Webcam" UpdateWithCreateOnce "Software\Hewlett-Packard\Media\Webcam"
mRun: [ddoctorv2] "C:\Program Files (x86)\Comcast\Desktop Doctor\bin\sprtcmd.exe" /P ddoctorv2
mRun: [AVG_UI] "C:\Program Files (x86)\AVG\AVG2013\avgui.exe" /TRAYONLY
mRun: [vProt] "C:\Program Files (x86)\AVG Secure Search\vprot.exe"
mRun: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe"
mRun: [browserSafeguard] "C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe"
dRunOnce: [sPReview] "C:\Windows\System32\SPReview\SPReview.exe" /sp:1 /errorfwlink:"http://go.microsoft.com/fwlink/?LinkID=122915" /build:7601
StartupFolder: C:\Users\Hilda\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\ONENOT~1.LNK - C:\Program Files (x86)\Microsoft Office\Office12\ONENOTEM.EXE
StartupFolder: C:\Users\Hilda\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\ONENOT~2.LNK - C:\Program Files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVH.EXE
mPolicies-Explorer: NoActiveDesktop = dword:1
mPolicies-Explorer: NoActiveDesktopChanges = dword:1
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MICROS~4\Office12\EXCEL.EXE/3000
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - C:\Program Files (x86)\Microsoft Office\Office12\ONBttnIE.dll
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll

TCP: NameServer = 75.75.75.75 75.75.76.76
TCP: Interfaces\{E821A1A7-7387-48BA-978D-D40163A4B64F} : DHCPNameServer = 75.75.75.75 75.75.76.76
TCP: Interfaces\{E821A1A7-7387-48BA-978D-D40163A4B64F}\350796465627D4F6E6B65697 : DHCPNameServer = 75.75.75.75 75.75.76.76
TCP: Interfaces\{E821A1A7-7387-48BA-978D-D40163A4B64F}\C696E6B6379737 : DHCPNameServer = 75.75.75.75 75.75.76.76
TCP: Interfaces\{E878202B-407B-4356-9F27-D0387E19D122} : DHCPNameServer = 75.75.75.75 75.75.76.76
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll
Handler: viprotocol - {B658800C-F66E-4EF3-AB85-6C0C227862A9} - C:\Program Files (x86)\Common Files\AVG Secure Search\ViProtocolInstaller\18.0.5\ViProtocol.dll
SSODL: WebCheck - <orphaned>
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "C:\Program Files (x86)\Common Files\LightScribe\LSRunOnce.exe"
x64-BHO: Skype add-on for Internet Explorer: {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll
x64-BHO: Java Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
x64-Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
x64-Run: [sysTrayApp] C:\Program Files\IDT\WDM\sttray64.exe
x64-IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll



x64-Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer x64\skypeieplugin.dll
x64-Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - <orphaned>
x64-Handler: viprotocol - {B658800C-F66E-4EF3-AB85-6C0C227862A9} - <orphaned>
x64-SSODL: WebCheck - <orphaned>
.
============= SERVICES / DRIVERS ===============
.
R0 AVGIDSHA;AVGIDSHA;C:\Windows\System32\drivers\avgidsha.sys [2013-7-20 71480]
R0 Avgloga;AVG Logging Driver;C:\Windows\System32\drivers\avgloga.sys [2013-7-20 311608]
R0 Avgmfx64;AVG Mini-Filter Resident Anti-Virus Shield;C:\Windows\System32\drivers\avgmfx64.sys [2013-7-1 116536]
R0 Avgrkx64;AVG Anti-Rootkit Driver;C:\Windows\System32\drivers\avgrkx64.sys [2013-10-23 45880]
R1 AVGIDSDriver;AVGIDSDriver;C:\Windows\System32\drivers\avgidsdrivera.sys [2013-11-25 246072]
R1 Avgldx64;AVG AVI Loader Driver;C:\Windows\System32\drivers\avgldx64.sys [2013-7-20 206648]
R1 Avgtdia;AVG TDI Driver;C:\Windows\System32\drivers\avgtdia.sys [2013-3-21 240952]
R1 avgtp;avgtp;C:\Windows\System32\drivers\avgtpx64.sys [2012-10-7 49952]
R1 DVMIO;DVMIO;C:\SPLASH.SYS\config\dvmio.sys [2009-9-27 21624]
R2 AESTFilters;Andrea ST Filters Service;C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_14e7194c26fb7998\AESTSr64.exe [2010-1-12 89600]
R2 AMD External Events Utility;AMD External Events Utility;C:\Windows\System32\atiesrxx.exe [2009-8-4 203264]
R2 AVGIDSAgent;AVGIDSAgent;C:\Program Files (x86)\AVG\AVG2013\avgidsagent.exe [2013-7-4 4939312]
R2 avgwd;AVG WatchDog;C:\Program Files (x86)\AVG\AVG2013\avgwdsvc.exe [2013-11-20 283136]
R2 c2cautoupdatesvc;Skype Click to Call Updater;C:\Program Files (x86)\Skype\Toolbars\AutoUpdate\SkypeC2CAutoUpdateSvc.exe [2014-3-3 1363584]
R2 c2cpnrsvc;Skype Click to Call PNR Service;C:\Program Files (x86)\Skype\Toolbars\PNRSvc\SkypeC2CPNRSvc.exe [2014-3-3 1748608]
R2 cvhsvc;Client Virtualization Handler;C:\Program Files (x86)\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE [2012-1-4 822624]
R2 DvmMDES;DeviceVM Meta Data Export Service;C:\SPLASH.SYS\config\DVMExportService.exe [2009-7-8 323584]
R2 HP Support Assistant Service;HP Support Assistant Service;C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\HPSA_Service.exe [2013-11-4 92160]
R2 hpsrv;HP Service;C:\Windows\System32\hpservice.exe [2009-7-8 30520]
R2 MBAMScheduler;MBAMScheduler;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [2014-3-19 418376]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2014-3-19 701512]
R2 sftlist;Application Virtualization Client;C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe [2011-10-1 508776]
R2 TuneUp.UtilitiesSvc;AVG PC TuneUp Service;C:\Program Files (x86)\AVG PC TuneUp 2014\TuneUpUtilitiesService64.exe [2013-12-18 2102072]
R2 vToolbarUpdater18.0.5;vToolbarUpdater18.0.5;C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\18.0.5\ToolbarUpdater.exe [2014-3-20 1771032]
R3 enecir;ENE CIR Receiver;C:\Windows\System32\drivers\enecir.sys [2009-5-20 70656]
R3 MBAMProtector;MBAMProtector;C:\Windows\System32\drivers\mbam.sys [2014-3-19 25928]
R3 RTL8167;Realtek 8167 NT Driver;C:\Windows\System32\drivers\Rt64win7.sys [2010-1-12 215040]
R3 Sftfs;Sftfs;C:\Windows\System32\drivers\Sftfslh.sys [2011-10-1 764264]
R3 Sftplay;Sftplay;C:\Windows\System32\drivers\Sftplaylh.sys [2011-10-1 268648]
R3 Sftredir;Sftredir;C:\Windows\System32\drivers\Sftredirlh.sys [2011-10-1 25960]
R3 Sftvol;Sftvol;C:\Windows\System32\drivers\Sftvollh.sys [2011-10-1 22376]
R3 sftvsa;Application Virtualization Service Agent;C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe [2011-10-1 219496]
R3 TuneUpUtilitiesDrv;TuneUpUtilitiesDrv;C:\Program Files (x86)\AVG PC TuneUp 2014\TuneUpUtilitiesDriver64.sys [2013-9-18 14112]
R3 usbfilter;AMD USB Filter Driver;C:\Windows\System32\drivers\usbfilter.sys [2010-1-12 34872]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 SkypeUpdate;Skype Updater;C:\Program Files (x86)\Skype\Updater\Updater.exe [2013-2-28 161384]
S3 Com4QLBEx;Com4QLBEx;C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch Buttons\Com4QLBEx.exe [2009-11-5 227896]
S3 JMCR;JMCR;C:\Windows\System32\drivers\jmcr.sys [2009-7-28 140128]
S3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;C:\Windows\System32\drivers\netw5v64.sys [2009-6-10 5434368]
S3 SrvHsfHDA;SrvHsfHDA;C:\Windows\System32\drivers\VSTAZL6.SYS [2009-7-13 292864]
S3 SrvHsfV92;SrvHsfV92;C:\Windows\System32\drivers\VSTDPV6.SYS [2009-7-13 1485312]
S3 SrvHsfWinac;SrvHsfWinac;C:\Windows\System32\drivers\VSTCNXT6.SYS [2009-7-13 740864]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\System32\drivers\TsUsbFlt.sys [2011-6-22 59392]
S3 USBAAPL64;Apple Mobile USB Driver;C:\Windows\System32\drivers\usbaapl64.sys [2012-7-9 52736]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\System32\Wat\WatAdminSvc.exe [2010-6-25 1255736]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\System32\drivers\yk62x64.sys [2009-6-10 389120]
.
=============== Created Last 30 ================
.
2014-03-21 04:47:44 -------- d-----w- C:\ProgramData\AVG Secure Search
2014-03-20 02:58:15 -------- d-----w- C:\Users\Hilda\AppData\Roaming\Malwarebytes
2014-03-20 02:58:12 -------- d-----w- C:\ProgramData\Malwarebytes
2014-03-20 02:58:10 25928 ----a-w- C:\Windows\System32\drivers\mbam.sys
2014-03-20 02:58:10 -------- d-----w- C:\Program Files (x86)\Malwarebytes' Anti-Malware
2014-03-20 02:57:55 -------- d-----w- C:\Users\Hilda\AppData\Local\Programs
2014-03-18 23:57:31 -------- d-----w- C:\Program Files\SavingsBull
2014-03-17 23:56:18 -------- d-----w- C:\Users\Hilda\AppData\Local\Avg2014
2014-03-17 02:18:32 42808 ----a-w- C:\Windows\System32\uxtuneup.dll
2014-03-17 02:18:32 35640 ----a-w- C:\Windows\SysWow64\uxtuneup.dll
2014-03-17 02:17:07 -------- d-----w- C:\Program Files (x86)\VideoLAN
2014-03-17 02:16:37 -------- d-----w- C:\Program Files\Level Quality Watcher
2014-03-17 02:16:25 -------- d-----w- C:\Program Files (x86)\Browsersafeguard
2014-03-17 02:14:08 40248 ----a-w- C:\Windows\System32\TURegOpt.exe
2014-03-17 02:14:04 29496 ----a-w- C:\Windows\System32\authuitu.dll
2014-03-17 02:14:03 25400 ----a-w- C:\Windows\SysWow64\authuitu.dll
2014-03-17 02:13:41 -------- d-----w- C:\Users\Hilda\AppData\Roaming\AVG
2014-03-17 02:13:11 -------- d-----w- C:\Program Files (x86)\AVG PC TuneUp 2014
2014-03-17 02:12:32 -------- d-----w- C:\ProgramData\AVG
2014-03-17 02:12:26 -------- d-sh--w- C:\ProgramData\{01BD4FC9-2F86-4706-A62E-774BB7E9D308}
.
==================== Find3M  ====================
.
2014-03-21 04:47:33 49952 ----a-w- C:\Windows\System32\drivers\avgtpx64.sys
2014-03-12 19:14:33 71048 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2014-03-12 19:14:33 692616 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
.
============= FINISH: 20:12:25.50 ===============

Link to post
Share on other sites

.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2012-11-20.01)
.
Microsoft Windows 7 Home Premium
Boot Device: \Device\HarddiskVolume1
Install Date: 6/22/2010 1:10:30 AM
System Uptime: 3/26/2014 8:04:48 PM (0 hours ago)
.
Motherboard: Hewlett-Packard |  | 3642
Processor: AMD Turion II Dual-Core Mobile M520 | Socket S1G3 | 2300/200mhz
.
==== Disk Partitions =========================
.
C: is FIXED (NTFS) - 283 GiB total, 186.918 GiB free.
D: is FIXED (NTFS) - 15 GiB total, 2.508 GiB free.
E: is FIXED (FAT32) - 0 GiB total, 0.093 GiB free.
F: is CDROM ()
.
==== Disabled Device Manager Items =============
.
==== System Restore Points ===================
.
RP268: 2/11/2014 5:31:02 PM - Installed SlimDX Runtime .NET 4.0 x86 (January 2012)
RP269: 2/12/2014 5:34:08 PM - Installed Java 7 Update 51
RP270: 2/21/2014 8:18:29 PM - Scheduled Checkpoint
RP271: 3/3/2014 8:40:13 PM - Scheduled Checkpoint
RP272: 3/12/2014 6:21:34 PM - Scheduled Checkpoint
RP273: 3/19/2014 9:03:55 PM - Restore Operation
.
==== Installed Programs ======================
.
 Update for Microsoft Office 2007 (KB2508958)
Acrobat.com
Adobe AIR
Adobe Flash Player 12 ActiveX
Adobe Reader 9.2 MUI
Adobe Shockwave Player
Alps Touch Pad Driver
AMD USB Filter Driver
Apple Application Support
Apple Mobile Device Support
Apple Software Update
Atheros Driver Installation Program
ATI Catalyst Install Manager
AVG 2013
AVG PC TuneUp 2014
AVG PC TuneUp 2014 (en-US)
AVG Security Toolbar
Bonjour
BrowserSafeguard with Rockettab
Catalyst Control Center - Branding
Catalyst Control Center Core Implementation
Catalyst Control Center Graphics Full Existing
Catalyst Control Center Graphics Full New
Catalyst Control Center Graphics Light
Catalyst Control Center Graphics Previews Common
Catalyst Control Center Graphics Previews Vista
Catalyst Control Center InstallProxy
Catalyst Control Center Localization All
ccc-core-static
ccc-utility64
CCC Help Chinese Standard
CCC Help Chinese Traditional
CCC Help Czech
CCC Help Danish
CCC Help Dutch
CCC Help English
CCC Help Finnish
CCC Help French
CCC Help German
CCC Help Greek
CCC Help Hungarian
CCC Help Italian
CCC Help Japanese
CCC Help Korean
CCC Help Norwegian
CCC Help Polish
CCC Help Portuguese
CCC Help Russian
CCC Help Spanish
CCC Help Swedish
CCC Help Thai
CCC Help Turkish
Cisco EAP-FAST Module
Cisco LEAP Module
Cisco PEAP Module
Compatibility Pack for the 2007 Office system
CyberLink DVD Suite
Desktop Doctor
DVD Menu Pack for HP MediaSmart Video
ENE CIR Receiver Driver
Google Chrome
Google Earth Plug-in
Google Update Helper
HP 3D DriveGuard
HP Advisor
HP Customer Experience Enhancements
HP Games
HP MediaSmart DVD
HP MediaSmart Internet TV
HP MediaSmart Live TV
HP MediaSmart Music/Photo/Video
HP MediaSmart SlingPlayer
HP MediaSmart SmartMenu
HP MediaSmart Software Notebook Demo
HP MediaSmart Webcam
HP MediaSmart/TouchSmart Netflix
HP Quick Launch Buttons
HP QuickWeb
HP Setup
HP Smart Web Printing 4.60
HP Support Assistant
HP Update
HP User Guides 0146
HP Wireless Assistant
Hulu Desktop
IDT Audio
iTunes
Java 7 Update 51
Java Auto Updater
Java 6 Update 15 (64-bit)
Java SE Development Kit 6 Update 15 (64-bit)
JMicron Flash Media Controller Driver
Juniper Networks Setup Client
Juniper Networks Setup Client Activex Control
Junk Mail filter update
KODAK Gallery Upload Software
LabelPrint
LightScribe System Software
Malwarebytes Anti-Malware version 1.75.0.1300
Microsoft .NET Framework 4 Client Profile
Microsoft .NET Framework 4 Extended
Microsoft Application Error Reporting
Microsoft Choice Guard
Microsoft Live Search Toolbar
Microsoft Office 2007 Service Pack 3 (SP3)
Microsoft Office Click-to-Run 2010
Microsoft Office Excel MUI (English) 2007
Microsoft Office Home and Student 2007
Microsoft Office Home and Student 2010 - English
Microsoft Office Office 64-bit Components 2007
Microsoft Office OneNote MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office PowerPoint Viewer 2007 (English)
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3)
Microsoft Office Shared 64-bit MUI (English) 2007
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Suite Activation Assistant
Microsoft Office Word MUI (English) 2007
Microsoft Silverlight
Microsoft SQL Server 2005 Compact Edition [ENU]
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2005 Redistributable (x64)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219
Microsoft Works
Movie Theme Pack for HP MediaSmart Video
MSVCRT
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
Power2Go
PowerDirector
QLBCASL
QuickTime
Realtek 8136 8168 8169 Ethernet Driver
Recovery Manager
SavingsBull
Security Update for Microsoft .NET Framework 4 Client Profile (KB2160841)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
Security Update for Microsoft Office 2007 suites (KB2596615) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596672) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596744) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596754) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596785) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596792) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596856) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596871) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596880) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597162) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597969) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687441) 32-Bit Edition
Security Update for Microsoft Office Excel 2007 (KB2597161) 32-Bit Edition
Security Update for Microsoft Office InfoPath 2007 (KB2596786) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596764) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596912) 32-Bit Edition
Security Update for Microsoft Office Word 2007 (KB2596917) 32-Bit Edition
Skype Click to Call
Skype™ 6.3
SlimDX Runtime .NET 4.0 x86 (January 2012)
SmartWebPrinting
Spotify
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217)
Update for Microsoft Office 2007 Help for Common Features (KB963673)
Update for Microsoft Office Excel 2007 Help (KB963678)
Update for Microsoft Office OneNote 2007 Help (KB963670)
Update for Microsoft Office Powerpoint 2007 Help (KB963669)
Update for Microsoft Office Script Editor Help (KB963671)
Update for Microsoft Office Word 2007 Help (KB963665)
Visual Studio 2010 x64 Redistributables
Windows Live Call
Windows Live Communications Platform
Windows Live Essentials
Windows Live Mail
Windows Live Messenger
Windows Live Photo Gallery
Windows Live Sign-in Assistant
Windows Live Sync
Windows Live Upload Tool
Windows Live Writer
.
==== Event Viewer Messages From Past Week ========
.
3/26/2014 8:05:35 PM, Error: Service Control Manager [7006]  - The ScRegSetValueExW call failed for FailureActions with the following error:  Access is denied.
3/26/2014 8:05:23 PM, Error: atikmdag [52236]  - CPLIB :: General - Invalid Parameter
3/25/2014 10:04:08 PM, Error: Schannel [36888]  - The following fatal alert was generated: 40. The internal error state is 107.
3/25/2014 10:04:08 PM, Error: Schannel [36874]  - An SSL 3.0 connection request was received from a remote client application, but none of the cipher suites supported by the client application are supported by the server. The SSL connection request has failed.
3/19/2014 9:09:26 PM, Error: Ntfs [55]  - The file system structure on the disk is corrupt and unusable. Please run the chkdsk utility on the volume \Device\HarddiskVolumeShadowCopy8.
3/19/2014 8:58:33 PM, Error: Service Control Manager [7023]  - The Power service terminated with the following error:  The WMI request could not be completed and should be retried.
.
==== End Of File ===========================
 

Link to post
Share on other sites

RogueKiller V8.8.14 _x64_ [Mar 26 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Hilda [Admin rights]
Mode : Scan -- Date : 03/26/2014 20:23:52
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[sVCHOST] svchost.exe -- C:\Windows\SysWOW64\svchost.exe [7] -> KILLED [TermProc]

¤¤¤ Registry Entries : 6 ¤¤¤


[PROXY IE][PUM] HKCU\[...]\Internet Settings : ProxyServer (hxxp=127.0.0.1:49176;hxxps=127.0.0.1:49176 [Country: (Private Address) (XX), City: (Private Address)]) -> FOUND
[PROXY IE][PUM] HKCU\[...]\Internet Settings : ProxyEnable (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤
[Root.Zekos][File] rpcss.dll : C:\Windows\System32\rpcss.dll [-] --> FOUND

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @iexplore.exe (CtfImmAppCompatEnableIMEonProtectedCode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53EC)
[Address] EAT @iexplore.exe (CtfImmCoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3065)
[Address] EAT @iexplore.exe (CtfImmDispatchDefImeMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D163C)
[Address] EAT @iexplore.exe (CtfImmEnterCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EA1)
[Address] EAT @iexplore.exe (CtfImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB41D)
[Address] EAT @iexplore.exe (CtfImmGetCompatibleKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53DC)
[Address] EAT @iexplore.exe (CtfImmGetGuidAtom) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E51A8)
[Address] EAT @iexplore.exe (CtfImmGetIMEFileName) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5412)
[Address] EAT @iexplore.exe (CtfImmGetTMAEFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D238D)
[Address] EAT @iexplore.exe (CtfImmHideToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E514B)
[Address] EAT @iexplore.exe (CtfImmIsCiceroEnabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53A2)
[Address] EAT @iexplore.exe (CtfImmIsCiceroStartedInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A07)
[Address] EAT @iexplore.exe (CtfImmIsGuidMapEnable) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5227)
[Address] EAT @iexplore.exe (CtfImmIsTextFrameServiceDisabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3018)
[Address] EAT @iexplore.exe (CtfImmLastEnabledWndDestroy) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D33B9)
[Address] EAT @iexplore.exe (CtfImmLeaveCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EBA)
[Address] EAT @iexplore.exe (CtfImmNotify) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D15D0)
[Address] EAT @iexplore.exe (CtfImmRestoreToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5114)
[Address] EAT @iexplore.exe (CtfImmSetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D34D9)
[Address] EAT @iexplore.exe (CtfImmSetCiceroStartInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21CD)
[Address] EAT @iexplore.exe (CtfImmSetDefaultRemoteKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53CC)
[Address] EAT @iexplore.exe (CtfImmTIMActivate) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1888)
[Address] EAT @iexplore.exe (GetKeyboardLayoutCP) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB123)
[Address] EAT @iexplore.exe (ImmActivateLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8DF5)
[Address] EAT @iexplore.exe (ImmAssociateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3540)
[Address] EAT @iexplore.exe (ImmAssociateContextEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D608F)
[Address] EAT @iexplore.exe (ImmCallImeConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4326)
[Address] EAT @iexplore.exe (ImmConfigureIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8F67)
[Address] EAT @iexplore.exe (ImmConfigureIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D913F)
[Address] EAT @iexplore.exe (ImmCreateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3D4C)
[Address] EAT @iexplore.exe (ImmCreateIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D28A1)
[Address] EAT @iexplore.exe (ImmCreateSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DEF46)
[Address] EAT @iexplore.exe (ImmDestroyContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3CCE)
[Address] EAT @iexplore.exe (ImmDestroyIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D30F2)
[Address] EAT @iexplore.exe (ImmDestroySoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0D6)
[Address] EAT @iexplore.exe (ImmDisableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableIme) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableTextFrameService) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (ImmEnumInputContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D31DD)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBEF9)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DC057)
[Address] EAT @iexplore.exe (ImmEscapeA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9327)
[Address] EAT @iexplore.exe (ImmEscapeW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D95A9)
[Address] EAT @iexplore.exe (ImmFreeLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D97EF)
[Address] EAT @iexplore.exe (ImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB2A7)
[Address] EAT @iexplore.exe (ImmGetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2D6A)
[Address] EAT @iexplore.exe (ImmGetCandidateListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8320)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D82EA)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8305)
[Address] EAT @iexplore.exe (ImmGetCandidateListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8341)
[Address] EAT @iexplore.exe (ImmGetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2EBC)
[Address] EAT @iexplore.exe (ImmGetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D682C)
[Address] EAT @iexplore.exe (ImmGetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D68C8)
[Address] EAT @iexplore.exe (ImmGetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7A37)
[Address] EAT @iexplore.exe (ImmGetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D420C)
[Address] EAT @iexplore.exe (ImmGetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2E79)
[Address] EAT @iexplore.exe (ImmGetContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2084)
[Address] EAT @iexplore.exe (ImmGetConversionListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7214)
[Address] EAT @iexplore.exe (ImmGetConversionListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7364)
[Address] EAT @iexplore.exe (ImmGetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D24E9)
[Address] EAT @iexplore.exe (ImmGetDefaultIMEWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F9D)
[Address] EAT @iexplore.exe (ImmGetDescriptionA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA031)
[Address] EAT @iexplore.exe (ImmGetDescriptionW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA467)
[Address] EAT @iexplore.exe (ImmGetGuideLineA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8362)
[Address] EAT @iexplore.exe (ImmGetGuideLineW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8383)
[Address] EAT @iexplore.exe (ImmGetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8410)
[Address] EAT @iexplore.exe (ImmGetIMCCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0BA)
[Address] EAT @iexplore.exe (ImmGetIMCCSize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB106)
[Address] EAT @iexplore.exe (ImmGetIMCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB268)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA659)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA50A)
[Address] EAT @iexplore.exe (ImmGetImeInfoEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D14D8)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E48)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E6F)
[Address] EAT @iexplore.exe (ImmGetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3DCF)
[Address] EAT @iexplore.exe (ImmGetProperty) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3BB8)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBCF3)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBDFA)
[Address] EAT @iexplore.exe (ImmGetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D63BE)
[Address] EAT @iexplore.exe (ImmGetVirtualKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB553)
[Address] EAT @iexplore.exe (ImmIMPGetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB99)
[Address] EAT @iexplore.exe (ImmIMPGetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB65)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFAD6)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF9CA)
[Address] EAT @iexplore.exe (ImmIMPSetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF86E)
[Address] EAT @iexplore.exe (ImmIMPSetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF746)
[Address] EAT @iexplore.exe (ImmInstallIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAF74)
[Address] EAT @iexplore.exe (ImmInstallIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAC89)
[Address] EAT @iexplore.exe (ImmIsIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2FC7)
[Address] EAT @iexplore.exe (ImmIsUIMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB226)
[Address] EAT @iexplore.exe (ImmIsUIMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB247)
[Address] EAT @iexplore.exe (ImmLoadIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D197A)
[Address] EAT @iexplore.exe (ImmLoadLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9E79)
[Address] EAT @iexplore.exe (ImmLockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1D30)
[Address] EAT @iexplore.exe (ImmLockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E7D)
[Address] EAT @iexplore.exe (ImmLockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F67)
[Address] EAT @iexplore.exe (ImmLockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2025)
[Address] EAT @iexplore.exe (ImmNotifyIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3C6C)
[Address] EAT @iexplore.exe (ImmProcessKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A3C)
[Address] EAT @iexplore.exe (ImmPutImeMenuItemsIntoMappedFile) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E96)
[Address] EAT @iexplore.exe (ImmReSizeIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0E0)
[Address] EAT @iexplore.exe (ImmRegisterClient) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1346)
[Address] EAT @iexplore.exe (ImmRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB59E)
[Address] EAT @iexplore.exe (ImmRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB6DB)
[Address] EAT @iexplore.exe (ImmReleaseContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21A2)
[Address] EAT @iexplore.exe (ImmRequestMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83A4)
[Address] EAT @iexplore.exe (ImmRequestMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D4079)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF907)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF8EC)
[Address] EAT @iexplore.exe (ImmSetActiveContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2246)
[Address] EAT @iexplore.exe (ImmSetActiveContextConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4487)
[Address] EAT @iexplore.exe (ImmSetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3E02)
[Address] EAT @iexplore.exe (ImmSetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6964)
[Address] EAT @iexplore.exe (ImmSetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3938)
[Address] EAT @iexplore.exe (ImmSetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83C2)
[Address] EAT @iexplore.exe (ImmSetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83E9)
[Address] EAT @iexplore.exe (ImmSetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D38AA)
[Address] EAT @iexplore.exe (ImmSetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EE6)
[Address] EAT @iexplore.exe (ImmSetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D132A)
[Address] EAT @iexplore.exe (ImmSetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3FF3)
[Address] EAT @iexplore.exe (ImmSetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6A7C)
[Address] EAT @iexplore.exe (ImmShowSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0E7)
[Address] EAT @iexplore.exe (ImmSimulateHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D88A8)
[Address] EAT @iexplore.exe (ImmSystemHandler) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB1CF)
[Address] EAT @iexplore.exe (ImmTranslateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF27F)
[Address] EAT @iexplore.exe (ImmUnlockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1DA0)
[Address] EAT @iexplore.exe (ImmUnlockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E95)
[Address] EAT @iexplore.exe (ImmUnlockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F82)
[Address] EAT @iexplore.exe (ImmUnlockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1FD8)
[Address] EAT @iexplore.exe (ImmUnregisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB82A)
[Address] EAT @iexplore.exe (ImmUnregisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB967)
[Address] EAT @iexplore.exe (ImmWINNLSEnableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF637)
[Address] EAT @iexplore.exe (ImmWINNLSGetEnableStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF65E)
[Address] EAT @iexplore.exe (ImmWINNLSGetIMEHotkey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] IAT @iexplore.exe (SHGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744927)
[Address] IAT @iexplore.exe (SHRegGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744984)
[Address] IAT @iexplore.exe (SHSetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B762B62)
[Address] IAT @iexplore.exe (PathIsURLW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B74FA79)
[Address] EAT @iexplore.exe (CtfImmAppCompatEnableIMEonProtectedCode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53EC)
[Address] EAT @iexplore.exe (CtfImmCoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3065)
[Address] EAT @iexplore.exe (CtfImmDispatchDefImeMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D163C)
[Address] EAT @iexplore.exe (CtfImmEnterCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EA1)
[Address] EAT @iexplore.exe (CtfImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB41D)
[Address] EAT @iexplore.exe (CtfImmGetCompatibleKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53DC)
[Address] EAT @iexplore.exe (CtfImmGetGuidAtom) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E51A8)
[Address] EAT @iexplore.exe (CtfImmGetIMEFileName) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5412)
[Address] EAT @iexplore.exe (CtfImmGetTMAEFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D238D)
[Address] EAT @iexplore.exe (CtfImmHideToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E514B)
[Address] EAT @iexplore.exe (CtfImmIsCiceroEnabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53A2)
[Address] EAT @iexplore.exe (CtfImmIsCiceroStartedInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A07)
[Address] EAT @iexplore.exe (CtfImmIsGuidMapEnable) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5227)
[Address] EAT @iexplore.exe (CtfImmIsTextFrameServiceDisabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3018)
[Address] EAT @iexplore.exe (CtfImmLastEnabledWndDestroy) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D33B9)
[Address] EAT @iexplore.exe (CtfImmLeaveCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EBA)
[Address] EAT @iexplore.exe (CtfImmNotify) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D15D0)
[Address] EAT @iexplore.exe (CtfImmRestoreToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5114)
[Address] EAT @iexplore.exe (CtfImmSetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D34D9)
[Address] EAT @iexplore.exe (CtfImmSetCiceroStartInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21CD)
[Address] EAT @iexplore.exe (CtfImmSetDefaultRemoteKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53CC)
[Address] EAT @iexplore.exe (CtfImmTIMActivate) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1888)
[Address] EAT @iexplore.exe (GetKeyboardLayoutCP) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB123)
[Address] EAT @iexplore.exe (ImmActivateLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8DF5)
[Address] EAT @iexplore.exe (ImmAssociateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3540)
[Address] EAT @iexplore.exe (ImmAssociateContextEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D608F)
[Address] EAT @iexplore.exe (ImmCallImeConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4326)
[Address] EAT @iexplore.exe (ImmConfigureIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8F67)
[Address] EAT @iexplore.exe (ImmConfigureIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D913F)
[Address] EAT @iexplore.exe (ImmCreateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3D4C)
[Address] EAT @iexplore.exe (ImmCreateIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D28A1)
[Address] EAT @iexplore.exe (ImmCreateSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DEF46)
[Address] EAT @iexplore.exe (ImmDestroyContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3CCE)
[Address] EAT @iexplore.exe (ImmDestroyIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D30F2)
[Address] EAT @iexplore.exe (ImmDestroySoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0D6)
[Address] EAT @iexplore.exe (ImmDisableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableIme) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableTextFrameService) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (ImmEnumInputContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D31DD)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBEF9)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DC057)
[Address] EAT @iexplore.exe (ImmEscapeA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9327)
[Address] EAT @iexplore.exe (ImmEscapeW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D95A9)
[Address] EAT @iexplore.exe (ImmFreeLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D97EF)
[Address] EAT @iexplore.exe (ImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB2A7)
[Address] EAT @iexplore.exe (ImmGetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2D6A)
[Address] EAT @iexplore.exe (ImmGetCandidateListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8320)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D82EA)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8305)
[Address] EAT @iexplore.exe (ImmGetCandidateListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8341)
[Address] EAT @iexplore.exe (ImmGetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2EBC)
[Address] EAT @iexplore.exe (ImmGetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D682C)
[Address] EAT @iexplore.exe (ImmGetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D68C8)
[Address] EAT @iexplore.exe (ImmGetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7A37)
[Address] EAT @iexplore.exe (ImmGetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D420C)
[Address] EAT @iexplore.exe (ImmGetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2E79)
[Address] EAT @iexplore.exe (ImmGetContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2084)
[Address] EAT @iexplore.exe (ImmGetConversionListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7214)
[Address] EAT @iexplore.exe (ImmGetConversionListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7364)
[Address] EAT @iexplore.exe (ImmGetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D24E9)
[Address] EAT @iexplore.exe (ImmGetDefaultIMEWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F9D)
[Address] EAT @iexplore.exe (ImmGetDescriptionA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA031)
[Address] EAT @iexplore.exe (ImmGetDescriptionW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA467)
[Address] EAT @iexplore.exe (ImmGetGuideLineA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8362)
[Address] EAT @iexplore.exe (ImmGetGuideLineW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8383)
[Address] EAT @iexplore.exe (ImmGetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8410)
[Address] EAT @iexplore.exe (ImmGetIMCCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0BA)
[Address] EAT @iexplore.exe (ImmGetIMCCSize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB106)
[Address] EAT @iexplore.exe (ImmGetIMCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB268)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA659)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA50A)
[Address] EAT @iexplore.exe (ImmGetImeInfoEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D14D8)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E48)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E6F)
[Address] EAT @iexplore.exe (ImmGetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3DCF)
[Address] EAT @iexplore.exe (ImmGetProperty) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3BB8)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBCF3)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBDFA)
[Address] EAT @iexplore.exe (ImmGetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D63BE)
[Address] EAT @iexplore.exe (ImmGetVirtualKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB553)
[Address] EAT @iexplore.exe (ImmIMPGetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB99)
[Address] EAT @iexplore.exe (ImmIMPGetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB65)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFAD6)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF9CA)
[Address] EAT @iexplore.exe (ImmIMPSetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF86E)
[Address] EAT @iexplore.exe (ImmIMPSetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF746)
[Address] EAT @iexplore.exe (ImmInstallIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAF74)
[Address] EAT @iexplore.exe (ImmInstallIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAC89)
[Address] EAT @iexplore.exe (ImmIsIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2FC7)
[Address] EAT @iexplore.exe (ImmIsUIMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB226)
[Address] EAT @iexplore.exe (ImmIsUIMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB247)
[Address] EAT @iexplore.exe (ImmLoadIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D197A)
[Address] EAT @iexplore.exe (ImmLoadLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9E79)
[Address] EAT @iexplore.exe (ImmLockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1D30)
[Address] EAT @iexplore.exe (ImmLockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E7D)
[Address] EAT @iexplore.exe (ImmLockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F67)
[Address] EAT @iexplore.exe (ImmLockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2025)
[Address] EAT @iexplore.exe (ImmNotifyIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3C6C)
[Address] EAT @iexplore.exe (ImmProcessKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A3C)
[Address] EAT @iexplore.exe (ImmPutImeMenuItemsIntoMappedFile) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E96)
[Address] EAT @iexplore.exe (ImmReSizeIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0E0)
[Address] EAT @iexplore.exe (ImmRegisterClient) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1346)
[Address] EAT @iexplore.exe (ImmRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB59E)
[Address] EAT @iexplore.exe (ImmRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB6DB)
[Address] EAT @iexplore.exe (ImmReleaseContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21A2)
[Address] EAT @iexplore.exe (ImmRequestMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83A4)
[Address] EAT @iexplore.exe (ImmRequestMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D4079)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF907)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF8EC)
[Address] EAT @iexplore.exe (ImmSetActiveContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2246)
[Address] EAT @iexplore.exe (ImmSetActiveContextConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4487)
[Address] EAT @iexplore.exe (ImmSetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3E02)
[Address] EAT @iexplore.exe (ImmSetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6964)
[Address] EAT @iexplore.exe (ImmSetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3938)
[Address] EAT @iexplore.exe (ImmSetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83C2)
[Address] EAT @iexplore.exe (ImmSetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83E9)
[Address] EAT @iexplore.exe (ImmSetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D38AA)
[Address] EAT @iexplore.exe (ImmSetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EE6)
[Address] EAT @iexplore.exe (ImmSetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D132A)
[Address] EAT @iexplore.exe (ImmSetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3FF3)
[Address] EAT @iexplore.exe (ImmSetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6A7C)
[Address] EAT @iexplore.exe (ImmShowSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0E7)
[Address] EAT @iexplore.exe (ImmSimulateHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D88A8)
[Address] EAT @iexplore.exe (ImmSystemHandler) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB1CF)
[Address] EAT @iexplore.exe (ImmTranslateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF27F)
[Address] EAT @iexplore.exe (ImmUnlockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1DA0)
[Address] EAT @iexplore.exe (ImmUnlockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E95)
[Address] EAT @iexplore.exe (ImmUnlockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F82)
[Address] EAT @iexplore.exe (ImmUnlockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1FD8)
[Address] EAT @iexplore.exe (ImmUnregisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB82A)
[Address] EAT @iexplore.exe (ImmUnregisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB967)
[Address] EAT @iexplore.exe (ImmWINNLSEnableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF637)
[Address] EAT @iexplore.exe (ImmWINNLSGetEnableStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF65E)
[Address] EAT @iexplore.exe (ImmWINNLSGetIMEHotkey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (AcroBrwSetCallbacks) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736665D4)
[Address] EAT @iexplore.exe (AcroBrwSubclassWindow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736667EE)
[Address] EAT @iexplore.exe (DllCanUnloadNow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73661D54)
[Address] EAT @iexplore.exe (DllGetClassObject) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736644FC)
[Address] EAT @iexplore.exe (DllRegisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736611A3)
[Address] EAT @iexplore.exe (DllUnregisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736654AB)
[Address] EAT @iexplore.exe (StubInit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x7366556C)
[Address] EAT @iexplore.exe (StubOnQuit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736655AF)
[Address] EAT @iexplore.exe (StubSetSite) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73665595)
[Address] EAT @iexplore.exe (BeginBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DF38)
[Address] EAT @iexplore.exe (BeginBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B741)
[Address] EAT @iexplore.exe (BeginPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE876AF)
[Address] EAT @iexplore.exe (BufferedPaintClear) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6BBDB)
[Address] EAT @iexplore.exe (BufferedPaintInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B8D4)
[Address] EAT @iexplore.exe (BufferedPaintRenderAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DE83)
[Address] EAT @iexplore.exe (BufferedPaintSetAlpha) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CE19)
[Address] EAT @iexplore.exe (BufferedPaintStopAllAnimations) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E428)
[Address] EAT @iexplore.exe (BufferedPaintUnInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77525)
[Address] EAT @iexplore.exe (CloseThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE61FA1)
[Address] EAT @iexplore.exe (DrawThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6D464)
[Address] EAT @iexplore.exe (DrawThemeBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7436D)
[Address] EAT @iexplore.exe (DrawThemeEdge) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C01C)
[Address] EAT @iexplore.exe (DrawThemeIcon) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8D123)
[Address] EAT @iexplore.exe (DrawThemeParentBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E776)
[Address] EAT @iexplore.exe (DrawThemeParentBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E5C5)
[Address] EAT @iexplore.exe (DrawThemeText) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DB21)
[Address] EAT @iexplore.exe (DrawThemeTextEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6A70C)
[Address] EAT @iexplore.exe (EnableThemeDialogTexture) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7786D)
[Address] EAT @iexplore.exe (EnableTheming) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C9FF)
[Address] EAT @iexplore.exe (EndBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8762C)
[Address] EAT @iexplore.exe (GetBufferedPaintBits) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6CF26)
[Address] EAT @iexplore.exe (GetBufferedPaintDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CDCF)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CD86)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C893)
[Address] EAT @iexplore.exe (GetCurrentThemeName) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE763AE)
[Address] EAT @iexplore.exe (GetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6EBD6)
[Address] EAT @iexplore.exe (GetThemeBackgroundContentRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DA9E)
[Address] EAT @iexplore.exe (GetThemeBackgroundExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77155)
[Address] EAT @iexplore.exe (GetThemeBackgroundRegion) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70190)
[Address] EAT @iexplore.exe (GetThemeBitmap) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64B9C)
[Address] EAT @iexplore.exe (GetThemeBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE66651)
[Address] EAT @iexplore.exe (GetThemeColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeDocumentationProperty) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C346)
[Address] EAT @iexplore.exe (GetThemeEnumValue) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeFilename) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B997)
[Address] EAT @iexplore.exe (GetThemeFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE776A2)
[Address] EAT @iexplore.exe (GetThemeInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeIntList) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B86E)
[Address] EAT @iexplore.exe (GetThemeMargins) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE62F97)
[Address] EAT @iexplore.exe (GetThemeMetric) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE755B4)
[Address] EAT @iexplore.exe (GetThemePartSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6289F)
[Address] EAT @iexplore.exe (GetThemePosition) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B80D)
[Address] EAT @iexplore.exe (GetThemePropertyOrigin) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70923)
[Address] EAT @iexplore.exe (GetThemeRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B936)
[Address] EAT @iexplore.exe (GetThemeStream) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B8CF)
[Address] EAT @iexplore.exe (GetThemeString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B7A1)
[Address] EAT @iexplore.exe (GetThemeSysBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB86)
[Address] EAT @iexplore.exe (GetThemeSysColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE75530)
[Address] EAT @iexplore.exe (GetThemeSysColorBrush) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CA32)
[Address] EAT @iexplore.exe (GetThemeSysFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C3D8)
[Address] EAT @iexplore.exe (GetThemeSysInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C5E7)
[Address] EAT @iexplore.exe (GetThemeSysSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CC61)
[Address] EAT @iexplore.exe (GetThemeSysString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C553)
[Address] EAT @iexplore.exe (GetThemeTextExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE689FE)
[Address] EAT @iexplore.exe (GetThemeTextMetrics) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7778C)
[Address] EAT @iexplore.exe (GetThemeTransitionDuration) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E1A1)
[Address] EAT @iexplore.exe (GetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7535B)
[Address] EAT @iexplore.exe (HitTestThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE72DC1)
[Address] EAT @iexplore.exe (IsAppThemed) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77009)
[Address] EAT @iexplore.exe (IsCompositionActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE665DF)
[Address] EAT @iexplore.exe (IsThemeActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE76F36)
[Address] EAT @iexplore.exe (IsThemeBackgroundPartiallyTransparent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6281C)
[Address] EAT @iexplore.exe (IsThemeDialogTextureEnabled) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB3F)
[Address] EAT @iexplore.exe (IsThemePartDefined) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE630CF)
[Address] EAT @iexplore.exe (OpenThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE65F29)
[Address] EAT @iexplore.exe (OpenThemeDataEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE706FE)
[Address] EAT @iexplore.exe (SetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CCEC)
[Address] EAT @iexplore.exe (SetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77AFC)
[Address] EAT @iexplore.exe (SetWindowThemeAttribute) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE69E39)
[Address] EAT @iexplore.exe (ThemeInitApiHook) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64571)
[Address] EAT @iexplore.exe (UpdatePanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE875ED)
[Address] IAT @iexplore.exe (SHGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744927)
[Address] IAT @iexplore.exe (SHRegGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744984)
[Address] IAT @iexplore.exe (SHSetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B762B62)
[Address] IAT @iexplore.exe (PathIsURLW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B74FA79)
[Address] EAT @iexplore.exe (CtfImmAppCompatEnableIMEonProtectedCode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53EC)
[Address] EAT @iexplore.exe (CtfImmCoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3065)
[Address] EAT @iexplore.exe (CtfImmDispatchDefImeMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D163C)
[Address] EAT @iexplore.exe (CtfImmEnterCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EA1)
[Address] EAT @iexplore.exe (CtfImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB41D)
[Address] EAT @iexplore.exe (CtfImmGetCompatibleKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53DC)
 

 

 

Link to post
Share on other sites

[Address] EAT @iexplore.exe (CtfImmGetGuidAtom) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E51A8)
[Address] EAT @iexplore.exe (CtfImmGetIMEFileName) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5412)
[Address] EAT @iexplore.exe (CtfImmGetTMAEFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D238D)
[Address] EAT @iexplore.exe (CtfImmHideToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E514B)
[Address] EAT @iexplore.exe (CtfImmIsCiceroEnabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53A2)
[Address] EAT @iexplore.exe (CtfImmIsCiceroStartedInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A07)
[Address] EAT @iexplore.exe (CtfImmIsGuidMapEnable) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5227)
[Address] EAT @iexplore.exe (CtfImmIsTextFrameServiceDisabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3018)
[Address] EAT @iexplore.exe (CtfImmLastEnabledWndDestroy) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D33B9)
[Address] EAT @iexplore.exe (CtfImmLeaveCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EBA)
[Address] EAT @iexplore.exe (CtfImmNotify) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D15D0)
[Address] EAT @iexplore.exe (CtfImmRestoreToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5114)
[Address] EAT @iexplore.exe (CtfImmSetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D34D9)
[Address] EAT @iexplore.exe (CtfImmSetCiceroStartInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21CD)
[Address] EAT @iexplore.exe (CtfImmSetDefaultRemoteKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53CC)
[Address] EAT @iexplore.exe (CtfImmTIMActivate) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1888)
[Address] EAT @iexplore.exe (GetKeyboardLayoutCP) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB123)
[Address] EAT @iexplore.exe (ImmActivateLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8DF5)
[Address] EAT @iexplore.exe (ImmAssociateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3540)
[Address] EAT @iexplore.exe (ImmAssociateContextEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D608F)
[Address] EAT @iexplore.exe (ImmCallImeConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4326)
[Address] EAT @iexplore.exe (ImmConfigureIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8F67)
[Address] EAT @iexplore.exe (ImmConfigureIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D913F)
[Address] EAT @iexplore.exe (ImmCreateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3D4C)
[Address] EAT @iexplore.exe (ImmCreateIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D28A1)
[Address] EAT @iexplore.exe (ImmCreateSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DEF46)
[Address] EAT @iexplore.exe (ImmDestroyContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3CCE)
[Address] EAT @iexplore.exe (ImmDestroyIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D30F2)
[Address] EAT @iexplore.exe (ImmDestroySoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0D6)
[Address] EAT @iexplore.exe (ImmDisableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableIme) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableTextFrameService) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (ImmEnumInputContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D31DD)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBEF9)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DC057)
[Address] EAT @iexplore.exe (ImmEscapeA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9327)
[Address] EAT @iexplore.exe (ImmEscapeW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D95A9)
[Address] EAT @iexplore.exe (ImmFreeLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D97EF)
[Address] EAT @iexplore.exe (ImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB2A7)
[Address] EAT @iexplore.exe (ImmGetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2D6A)
[Address] EAT @iexplore.exe (ImmGetCandidateListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8320)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D82EA)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8305)
[Address] EAT @iexplore.exe (ImmGetCandidateListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8341)
[Address] EAT @iexplore.exe (ImmGetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2EBC)
[Address] EAT @iexplore.exe (ImmGetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D682C)
[Address] EAT @iexplore.exe (ImmGetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D68C8)
[Address] EAT @iexplore.exe (ImmGetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7A37)
[Address] EAT @iexplore.exe (ImmGetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D420C)
[Address] EAT @iexplore.exe (ImmGetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2E79)
[Address] EAT @iexplore.exe (ImmGetContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2084)
[Address] EAT @iexplore.exe (ImmGetConversionListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7214)
[Address] EAT @iexplore.exe (ImmGetConversionListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7364)
[Address] EAT @iexplore.exe (ImmGetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D24E9)
[Address] EAT @iexplore.exe (ImmGetDefaultIMEWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F9D)
[Address] EAT @iexplore.exe (ImmGetDescriptionA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA031)
[Address] EAT @iexplore.exe (ImmGetDescriptionW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA467)
[Address] EAT @iexplore.exe (ImmGetGuideLineA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8362)
[Address] EAT @iexplore.exe (ImmGetGuideLineW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8383)
[Address] EAT @iexplore.exe (ImmGetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8410)
[Address] EAT @iexplore.exe (ImmGetIMCCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0BA)
[Address] EAT @iexplore.exe (ImmGetIMCCSize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB106)
[Address] EAT @iexplore.exe (ImmGetIMCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB268)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA659)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA50A)
[Address] EAT @iexplore.exe (ImmGetImeInfoEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D14D8)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E48)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E6F)
[Address] EAT @iexplore.exe (ImmGetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3DCF)
[Address] EAT @iexplore.exe (ImmGetProperty) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3BB8)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBCF3)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBDFA)
[Address] EAT @iexplore.exe (ImmGetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D63BE)
[Address] EAT @iexplore.exe (ImmGetVirtualKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB553)
[Address] EAT @iexplore.exe (ImmIMPGetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB99)
[Address] EAT @iexplore.exe (ImmIMPGetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB65)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFAD6)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF9CA)
[Address] EAT @iexplore.exe (ImmIMPSetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF86E)
[Address] EAT @iexplore.exe (ImmIMPSetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF746)
[Address] EAT @iexplore.exe (ImmInstallIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAF74)
[Address] EAT @iexplore.exe (ImmInstallIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAC89)
[Address] EAT @iexplore.exe (ImmIsIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2FC7)
[Address] EAT @iexplore.exe (ImmIsUIMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB226)
[Address] EAT @iexplore.exe (ImmIsUIMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB247)
[Address] EAT @iexplore.exe (ImmLoadIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D197A)
[Address] EAT @iexplore.exe (ImmLoadLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9E79)
[Address] EAT @iexplore.exe (ImmLockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1D30)
[Address] EAT @iexplore.exe (ImmLockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E7D)
[Address] EAT @iexplore.exe (ImmLockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F67)
[Address] EAT @iexplore.exe (ImmLockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2025)
[Address] EAT @iexplore.exe (ImmNotifyIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3C6C)
[Address] EAT @iexplore.exe (ImmProcessKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A3C)
[Address] EAT @iexplore.exe (ImmPutImeMenuItemsIntoMappedFile) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E96)
[Address] EAT @iexplore.exe (ImmReSizeIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0E0)
[Address] EAT @iexplore.exe (ImmRegisterClient) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1346)
[Address] EAT @iexplore.exe (ImmRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB59E)
[Address] EAT @iexplore.exe (ImmRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB6DB)
[Address] EAT @iexplore.exe (ImmReleaseContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21A2)
[Address] EAT @iexplore.exe (ImmRequestMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83A4)
[Address] EAT @iexplore.exe (ImmRequestMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D4079)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF907)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF8EC)
[Address] EAT @iexplore.exe (ImmSetActiveContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2246)
[Address] EAT @iexplore.exe (ImmSetActiveContextConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4487)
[Address] EAT @iexplore.exe (ImmSetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3E02)
[Address] EAT @iexplore.exe (ImmSetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6964)
[Address] EAT @iexplore.exe (ImmSetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3938)
[Address] EAT @iexplore.exe (ImmSetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83C2)
[Address] EAT @iexplore.exe (ImmSetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83E9)
[Address] EAT @iexplore.exe (ImmSetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D38AA)
[Address] EAT @iexplore.exe (ImmSetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EE6)
[Address] EAT @iexplore.exe (ImmSetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D132A)
[Address] EAT @iexplore.exe (ImmSetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3FF3)
[Address] EAT @iexplore.exe (ImmSetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6A7C)
[Address] EAT @iexplore.exe (ImmShowSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0E7)
[Address] EAT @iexplore.exe (ImmSimulateHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D88A8)
[Address] EAT @iexplore.exe (ImmSystemHandler) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB1CF)
[Address] EAT @iexplore.exe (ImmTranslateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF27F)
[Address] EAT @iexplore.exe (ImmUnlockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1DA0)
[Address] EAT @iexplore.exe (ImmUnlockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E95)
[Address] EAT @iexplore.exe (ImmUnlockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F82)
[Address] EAT @iexplore.exe (ImmUnlockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1FD8)
[Address] EAT @iexplore.exe (ImmUnregisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB82A)
[Address] EAT @iexplore.exe (ImmUnregisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB967)
[Address] EAT @iexplore.exe (ImmWINNLSEnableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF637)
[Address] EAT @iexplore.exe (ImmWINNLSGetEnableStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF65E)
[Address] EAT @iexplore.exe (ImmWINNLSGetIMEHotkey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (AcroBrwSetCallbacks) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736665D4)
[Address] EAT @iexplore.exe (AcroBrwSubclassWindow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736667EE)
[Address] EAT @iexplore.exe (DllCanUnloadNow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73661D54)
[Address] EAT @iexplore.exe (DllGetClassObject) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736644FC)
[Address] EAT @iexplore.exe (DllRegisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736611A3)
[Address] EAT @iexplore.exe (DllUnregisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736654AB)
[Address] EAT @iexplore.exe (StubInit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x7366556C)
[Address] EAT @iexplore.exe (StubOnQuit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736655AF)
[Address] EAT @iexplore.exe (StubSetSite) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73665595)
[Address] EAT @iexplore.exe (BeginBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DF38)
[Address] EAT @iexplore.exe (BeginBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B741)
[Address] EAT @iexplore.exe (BeginPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE876AF)
[Address] EAT @iexplore.exe (BufferedPaintClear) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6BBDB)
[Address] EAT @iexplore.exe (BufferedPaintInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B8D4)
[Address] EAT @iexplore.exe (BufferedPaintRenderAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DE83)
[Address] EAT @iexplore.exe (BufferedPaintSetAlpha) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CE19)
[Address] EAT @iexplore.exe (BufferedPaintStopAllAnimations) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E428)
[Address] EAT @iexplore.exe (BufferedPaintUnInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77525)
[Address] EAT @iexplore.exe (CloseThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE61FA1)
[Address] EAT @iexplore.exe (DrawThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6D464)
[Address] EAT @iexplore.exe (DrawThemeBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7436D)
[Address] EAT @iexplore.exe (DrawThemeEdge) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C01C)
[Address] EAT @iexplore.exe (DrawThemeIcon) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8D123)
[Address] EAT @iexplore.exe (DrawThemeParentBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E776)
[Address] EAT @iexplore.exe (DrawThemeParentBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E5C5)
[Address] EAT @iexplore.exe (DrawThemeText) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DB21)
[Address] EAT @iexplore.exe (DrawThemeTextEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6A70C)
[Address] EAT @iexplore.exe (EnableThemeDialogTexture) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7786D)
[Address] EAT @iexplore.exe (EnableTheming) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C9FF)
[Address] EAT @iexplore.exe (EndBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8762C)
[Address] EAT @iexplore.exe (GetBufferedPaintBits) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6CF26)
[Address] EAT @iexplore.exe (GetBufferedPaintDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CDCF)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CD86)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C893)
[Address] EAT @iexplore.exe (GetCurrentThemeName) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE763AE)
[Address] EAT @iexplore.exe (GetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6EBD6)
[Address] EAT @iexplore.exe (GetThemeBackgroundContentRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DA9E)
[Address] EAT @iexplore.exe (GetThemeBackgroundExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77155)
[Address] EAT @iexplore.exe (GetThemeBackgroundRegion) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70190)
[Address] EAT @iexplore.exe (GetThemeBitmap) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64B9C)
[Address] EAT @iexplore.exe (GetThemeBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE66651)
[Address] EAT @iexplore.exe (GetThemeColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeDocumentationProperty) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C346)
[Address] EAT @iexplore.exe (GetThemeEnumValue) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeFilename) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B997)
[Address] EAT @iexplore.exe (GetThemeFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE776A2)
[Address] EAT @iexplore.exe (GetThemeInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeIntList) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B86E)
[Address] EAT @iexplore.exe (GetThemeMargins) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE62F97)
[Address] EAT @iexplore.exe (GetThemeMetric) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE755B4)
[Address] EAT @iexplore.exe (GetThemePartSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6289F)
[Address] EAT @iexplore.exe (GetThemePosition) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B80D)
[Address] EAT @iexplore.exe (GetThemePropertyOrigin) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70923)
[Address] EAT @iexplore.exe (GetThemeRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B936)
[Address] EAT @iexplore.exe (GetThemeStream) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B8CF)
[Address] EAT @iexplore.exe (GetThemeString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B7A1)
[Address] EAT @iexplore.exe (GetThemeSysBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB86)
[Address] EAT @iexplore.exe (GetThemeSysColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE75530)
[Address] EAT @iexplore.exe (GetThemeSysColorBrush) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CA32)
[Address] EAT @iexplore.exe (GetThemeSysFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C3D8)
[Address] EAT @iexplore.exe (GetThemeSysInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C5E7)
[Address] EAT @iexplore.exe (GetThemeSysSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CC61)
[Address] EAT @iexplore.exe (GetThemeSysString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C553)
[Address] EAT @iexplore.exe (GetThemeTextExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE689FE)
[Address] EAT @iexplore.exe (GetThemeTextMetrics) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7778C)
[Address] EAT @iexplore.exe (GetThemeTransitionDuration) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E1A1)
[Address] EAT @iexplore.exe (GetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7535B)
[Address] EAT @iexplore.exe (HitTestThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE72DC1)
[Address] EAT @iexplore.exe (IsAppThemed) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77009)
[Address] EAT @iexplore.exe (IsCompositionActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE665DF)
[Address] EAT @iexplore.exe (IsThemeActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE76F36)
[Address] EAT @iexplore.exe (IsThemeBackgroundPartiallyTransparent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6281C)
[Address] EAT @iexplore.exe (IsThemeDialogTextureEnabled) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB3F)
[Address] EAT @iexplore.exe (IsThemePartDefined) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE630CF)
[Address] EAT @iexplore.exe (OpenThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE65F29)
[Address] EAT @iexplore.exe (OpenThemeDataEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE706FE)
[Address] EAT @iexplore.exe (SetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CCEC)
[Address] EAT @iexplore.exe (SetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77AFC)
[Address] EAT @iexplore.exe (SetWindowThemeAttribute) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE69E39)
[Address] EAT @iexplore.exe (ThemeInitApiHook) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64571)
[Address] EAT @iexplore.exe (UpdatePanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE875ED)
[Address] IAT @iexplore.exe (SHGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744927)
[Address] IAT @iexplore.exe (SHRegGetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B744984)
[Address] IAT @iexplore.exe (SHSetValueW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B762B62)
[Address] IAT @iexplore.exe (PathIsURLW) : SHLWAPI.dll -> HOOKED (C:\Program Files (x86)\Internet Explorer\IEShims.dll @ 0x6B74FA79)
[Address] EAT @iexplore.exe (CtfImmAppCompatEnableIMEonProtectedCode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53EC)
[Address] EAT @iexplore.exe (CtfImmCoUninitialize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3065)
[Address] EAT @iexplore.exe (CtfImmDispatchDefImeMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D163C)
[Address] EAT @iexplore.exe (CtfImmEnterCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EA1)
[Address] EAT @iexplore.exe (CtfImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB41D)
[Address] EAT @iexplore.exe (CtfImmGetCompatibleKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53DC)
[Address] EAT @iexplore.exe (CtfImmGetGuidAtom) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E51A8)
[Address] EAT @iexplore.exe (CtfImmGetIMEFileName) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5412)
[Address] EAT @iexplore.exe (CtfImmGetTMAEFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D238D)
[Address] EAT @iexplore.exe (CtfImmHideToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E514B)
[Address] EAT @iexplore.exe (CtfImmIsCiceroEnabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53A2)
[Address] EAT @iexplore.exe (CtfImmIsCiceroStartedInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A07)
[Address] EAT @iexplore.exe (CtfImmIsGuidMapEnable) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5227)
[Address] EAT @iexplore.exe (CtfImmIsTextFrameServiceDisabled) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3018)
[Address] EAT @iexplore.exe (CtfImmLastEnabledWndDestroy) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D33B9)
[Address] EAT @iexplore.exe (CtfImmLeaveCoInitCountSkipMode) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EBA)
[Address] EAT @iexplore.exe (CtfImmNotify) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D15D0)
[Address] EAT @iexplore.exe (CtfImmRestoreToolbarWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E5114)
[Address] EAT @iexplore.exe (CtfImmSetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D34D9)
[Address] EAT @iexplore.exe (CtfImmSetCiceroStartInThread) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21CD)
[Address] EAT @iexplore.exe (CtfImmSetDefaultRemoteKeyboardLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53CC)
[Address] EAT @iexplore.exe (CtfImmTIMActivate) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1888)
[Address] EAT @iexplore.exe (GetKeyboardLayoutCP) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB123)
[Address] EAT @iexplore.exe (ImmActivateLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8DF5)
[Address] EAT @iexplore.exe (ImmAssociateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3540)
[Address] EAT @iexplore.exe (ImmAssociateContextEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D608F)
[Address] EAT @iexplore.exe (ImmCallImeConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4326)
[Address] EAT @iexplore.exe (ImmConfigureIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8F67)
[Address] EAT @iexplore.exe (ImmConfigureIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D913F)
[Address] EAT @iexplore.exe (ImmCreateContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3D4C)
[Address] EAT @iexplore.exe (ImmCreateIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D28A1)
[Address] EAT @iexplore.exe (ImmCreateSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DEF46)
[Address] EAT @iexplore.exe (ImmDestroyContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3CCE)
[Address] EAT @iexplore.exe (ImmDestroyIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D30F2)
[Address] EAT @iexplore.exe (ImmDestroySoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0D6)
[Address] EAT @iexplore.exe (ImmDisableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableIme) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3B8B)
[Address] EAT @iexplore.exe (ImmDisableTextFrameService) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (ImmEnumInputContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D31DD)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBEF9)
[Address] EAT @iexplore.exe (ImmEnumRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DC057)
[Address] EAT @iexplore.exe (ImmEscapeA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9327)
[Address] EAT @iexplore.exe (ImmEscapeW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D95A9)
[Address] EAT @iexplore.exe (ImmFreeLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D97EF)
[Address] EAT @iexplore.exe (ImmGenerateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB2A7)
[Address] EAT @iexplore.exe (ImmGetAppCompatFlags) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2D6A)
[Address] EAT @iexplore.exe (ImmGetCandidateListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8320)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D82EA)
[Address] EAT @iexplore.exe (ImmGetCandidateListCountW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8305)
[Address] EAT @iexplore.exe (ImmGetCandidateListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8341)
[Address] EAT @iexplore.exe (ImmGetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2EBC)
[Address] EAT @iexplore.exe (ImmGetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D682C)
[Address] EAT @iexplore.exe (ImmGetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D68C8)
[Address] EAT @iexplore.exe (ImmGetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7A37)
[Address] EAT @iexplore.exe (ImmGetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D420C)
[Address] EAT @iexplore.exe (ImmGetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2E79)
[Address] EAT @iexplore.exe (ImmGetContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2084)
[Address] EAT @iexplore.exe (ImmGetConversionListA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7214)
[Address] EAT @iexplore.exe (ImmGetConversionListW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D7364)
[Address] EAT @iexplore.exe (ImmGetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D24E9)
[Address] EAT @iexplore.exe (ImmGetDefaultIMEWnd) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F9D)
[Address] EAT @iexplore.exe (ImmGetDescriptionA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA031)
[Address] EAT @iexplore.exe (ImmGetDescriptionW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA467)
[Address] EAT @iexplore.exe (ImmGetGuideLineA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8362)
[Address] EAT @iexplore.exe (ImmGetGuideLineW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8383)
[Address] EAT @iexplore.exe (ImmGetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D8410)
[Address] EAT @iexplore.exe (ImmGetIMCCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0BA)
[Address] EAT @iexplore.exe (ImmGetIMCCSize) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB106)
[Address] EAT @iexplore.exe (ImmGetIMCLockCount) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB268)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA659)
[Address] EAT @iexplore.exe (ImmGetIMEFileNameW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DA50A)
[Address] EAT @iexplore.exe (ImmGetImeInfoEx) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D14D8)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E48)
[Address] EAT @iexplore.exe (ImmGetImeMenuItemsW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E6F)
[Address] EAT @iexplore.exe (ImmGetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3DCF)
[Address] EAT @iexplore.exe (ImmGetProperty) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3BB8)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBCF3)
[Address] EAT @iexplore.exe (ImmGetRegisterWordStyleW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DBDFA)
[Address] EAT @iexplore.exe (ImmGetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D63BE)
[Address] EAT @iexplore.exe (ImmGetVirtualKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB553)
[Address] EAT @iexplore.exe (ImmIMPGetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB99)
[Address] EAT @iexplore.exe (ImmIMPGetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFB65)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DFAD6)
[Address] EAT @iexplore.exe (ImmIMPQueryIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF9CA)
[Address] EAT @iexplore.exe (ImmIMPSetIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF86E)
[Address] EAT @iexplore.exe (ImmIMPSetIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF746)
[Address] EAT @iexplore.exe (ImmInstallIMEA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAF74)
[Address] EAT @iexplore.exe (ImmInstallIMEW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DAC89)
[Address] EAT @iexplore.exe (ImmIsIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2FC7)
[Address] EAT @iexplore.exe (ImmIsUIMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB226)
[Address] EAT @iexplore.exe (ImmIsUIMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB247)
[Address] EAT @iexplore.exe (ImmLoadIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D197A)
[Address] EAT @iexplore.exe (ImmLoadLayout) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D9E79)
[Address] EAT @iexplore.exe (ImmLockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1D30)
[Address] EAT @iexplore.exe (ImmLockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E7D)
[Address] EAT @iexplore.exe (ImmLockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F67)
[Address] EAT @iexplore.exe (ImmLockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2025)
[Address] EAT @iexplore.exe (ImmNotifyIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3C6C)
[Address] EAT @iexplore.exe (ImmProcessKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3A3C)
[Address] EAT @iexplore.exe (ImmPutImeMenuItemsIntoMappedFile) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4E96)
[Address] EAT @iexplore.exe (ImmReSizeIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB0E0)
[Address] EAT @iexplore.exe (ImmRegisterClient) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1346)
[Address] EAT @iexplore.exe (ImmRegisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB59E)
[Address] EAT @iexplore.exe (ImmRegisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB6DB)
[Address] EAT @iexplore.exe (ImmReleaseContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D21A2)
[Address] EAT @iexplore.exe (ImmRequestMessageA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83A4)
[Address] EAT @iexplore.exe (ImmRequestMessageW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D4079)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF907)
[Address] EAT @iexplore.exe (ImmSendIMEMessageExW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF8EC)
[Address] EAT @iexplore.exe (ImmSetActiveContext) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D2246)
[Address] EAT @iexplore.exe (ImmSetActiveContextConsoleIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E4487)
[Address] EAT @iexplore.exe (ImmSetCandidateWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3E02)
[Address] EAT @iexplore.exe (ImmSetCompositionFontA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6964)
[Address] EAT @iexplore.exe (ImmSetCompositionFontW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3938)
[Address] EAT @iexplore.exe (ImmSetCompositionStringA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83C2)
[Address] EAT @iexplore.exe (ImmSetCompositionStringW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D83E9)
[Address] EAT @iexplore.exe (ImmSetCompositionWindow) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D38AA)
[Address] EAT @iexplore.exe (ImmSetConversionStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3EE6)
[Address] EAT @iexplore.exe (ImmSetHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D132A)
[Address] EAT @iexplore.exe (ImmSetOpenStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D3FF3)
[Address] EAT @iexplore.exe (ImmSetStatusWindowPos) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D6A7C)
[Address] EAT @iexplore.exe (ImmShowSoftKeyboard) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF0E7)
[Address] EAT @iexplore.exe (ImmSimulateHotKey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D88A8)
[Address] EAT @iexplore.exe (ImmSystemHandler) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB1CF)
[Address] EAT @iexplore.exe (ImmTranslateMessage) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF27F)
[Address] EAT @iexplore.exe (ImmUnlockClientImc) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1DA0)
[Address] EAT @iexplore.exe (ImmUnlockIMC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1E95)
[Address] EAT @iexplore.exe (ImmUnlockIMCC) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1F82)
[Address] EAT @iexplore.exe (ImmUnlockImeDpi) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766D1FD8)
[Address] EAT @iexplore.exe (ImmUnregisterWordA) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB82A)
[Address] EAT @iexplore.exe (ImmUnregisterWordW) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DB967)
[Address] EAT @iexplore.exe (ImmWINNLSEnableIME) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF637)
[Address] EAT @iexplore.exe (ImmWINNLSGetEnableStatus) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766DF65E)
[Address] EAT @iexplore.exe (ImmWINNLSGetIMEHotkey) : MSCTF.dll -> HOOKED (C:\Windows\SysWOW64\IMM32.DLL @ 0x766E53C2)
[Address] EAT @iexplore.exe (AcroBrwSetCallbacks) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736665D4)
[Address] EAT @iexplore.exe (AcroBrwSubclassWindow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736667EE)
[Address] EAT @iexplore.exe (DllCanUnloadNow) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73661D54)
[Address] EAT @iexplore.exe (DllGetClassObject) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736644FC)
[Address] EAT @iexplore.exe (DllRegisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736611A3)
[Address] EAT @iexplore.exe (DllUnregisterServer) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736654AB)
[Address] EAT @iexplore.exe (StubInit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x7366556C)
[Address] EAT @iexplore.exe (StubOnQuit) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x736655AF)
[Address] EAT @iexplore.exe (StubSetSite) : d3d10_1core.dll -> HOOKED (C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll @ 0x73665595)
[Address] EAT @iexplore.exe (BeginBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DF38)
[Address] EAT @iexplore.exe (BeginBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B741)
[Address] EAT @iexplore.exe (BeginPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE876AF)
[Address] EAT @iexplore.exe (BufferedPaintClear) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6BBDB)
[Address] EAT @iexplore.exe (BufferedPaintInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6B8D4)
[Address] EAT @iexplore.exe (BufferedPaintRenderAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DE83)
[Address] EAT @iexplore.exe (BufferedPaintSetAlpha) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CE19)
[Address] EAT @iexplore.exe (BufferedPaintStopAllAnimations) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E428)
[Address] EAT @iexplore.exe (BufferedPaintUnInit) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77525)
[Address] EAT @iexplore.exe (CloseThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE61FA1)
[Address] EAT @iexplore.exe (DrawThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6D464)
[Address] EAT @iexplore.exe (DrawThemeBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7436D)
[Address] EAT @iexplore.exe (DrawThemeEdge) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C01C)
[Address] EAT @iexplore.exe (DrawThemeIcon) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8D123)
[Address] EAT @iexplore.exe (DrawThemeParentBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E776)
[Address] EAT @iexplore.exe (DrawThemeParentBackgroundEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E5C5)
[Address] EAT @iexplore.exe (DrawThemeText) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DB21)
[Address] EAT @iexplore.exe (DrawThemeTextEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6A70C)
[Address] EAT @iexplore.exe (EnableThemeDialogTexture) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7786D)
[Address] EAT @iexplore.exe (EnableTheming) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C9FF)
[Address] EAT @iexplore.exe (EndBufferedAnimation) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndBufferedPaint) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6ACE8)
[Address] EAT @iexplore.exe (EndPanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8762C)
[Address] EAT @iexplore.exe (GetBufferedPaintBits) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6CF26)
[Address] EAT @iexplore.exe (GetBufferedPaintDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CDCF)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetDC) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CD86)
[Address] EAT @iexplore.exe (GetBufferedPaintTargetRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C893)
[Address] EAT @iexplore.exe (GetCurrentThemeName) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE763AE)
[Address] EAT @iexplore.exe (GetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6EBD6)
[Address] EAT @iexplore.exe (GetThemeBackgroundContentRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6DA9E)
[Address] EAT @iexplore.exe (GetThemeBackgroundExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77155)
[Address] EAT @iexplore.exe (GetThemeBackgroundRegion) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70190)
[Address] EAT @iexplore.exe (GetThemeBitmap) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64B9C)
[Address] EAT @iexplore.exe (GetThemeBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE66651)
[Address] EAT @iexplore.exe (GetThemeColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeDocumentationProperty) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C346)
[Address] EAT @iexplore.exe (GetThemeEnumValue) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeFilename) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B997)
[Address] EAT @iexplore.exe (GetThemeFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE776A2)
[Address] EAT @iexplore.exe (GetThemeInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE627C0)
[Address] EAT @iexplore.exe (GetThemeIntList) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B86E)
[Address] EAT @iexplore.exe (GetThemeMargins) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE62F97)
[Address] EAT @iexplore.exe (GetThemeMetric) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE755B4)
[Address] EAT @iexplore.exe (GetThemePartSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6289F)
[Address] EAT @iexplore.exe (GetThemePosition) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B80D)
[Address] EAT @iexplore.exe (GetThemePropertyOrigin) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE70923)
[Address] EAT @iexplore.exe (GetThemeRect) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B936)
[Address] EAT @iexplore.exe (GetThemeStream) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B8CF)
[Address] EAT @iexplore.exe (GetThemeString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8B7A1)
[Address] EAT @iexplore.exe (GetThemeSysBool) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB86)
[Address] EAT @iexplore.exe (GetThemeSysColor) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE75530)
[Address] EAT @iexplore.exe (GetThemeSysColorBrush) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CA32)
[Address] EAT @iexplore.exe (GetThemeSysFont) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C3D8)
[Address] EAT @iexplore.exe (GetThemeSysInt) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C5E7)
[Address] EAT @iexplore.exe (GetThemeSysSize) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CC61)
[Address] EAT @iexplore.exe (GetThemeSysString) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8C553)
[Address] EAT @iexplore.exe (GetThemeTextExtent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE689FE)
[Address] EAT @iexplore.exe (GetThemeTextMetrics) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7778C)
[Address] EAT @iexplore.exe (GetThemeTransitionDuration) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6E1A1)
[Address] EAT @iexplore.exe (GetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE7535B)
[Address] EAT @iexplore.exe (HitTestThemeBackground) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE72DC1)
[Address] EAT @iexplore.exe (IsAppThemed) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77009)
[Address] EAT @iexplore.exe (IsCompositionActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE665DF)
[Address] EAT @iexplore.exe (IsThemeActive) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE76F36)
[Address] EAT @iexplore.exe (IsThemeBackgroundPartiallyTransparent) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE6281C)
[Address] EAT @iexplore.exe (IsThemeDialogTextureEnabled) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CB3F)
[Address] EAT @iexplore.exe (IsThemePartDefined) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE630CF)
[Address] EAT @iexplore.exe (OpenThemeData) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE65F29)
[Address] EAT @iexplore.exe (OpenThemeDataEx) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE706FE)
[Address] EAT @iexplore.exe (SetThemeAppProperties) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE8CCEC)
[Address] EAT @iexplore.exe (SetWindowTheme) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE77AFC)
[Address] EAT @iexplore.exe (SetWindowThemeAttribute) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE69E39)
[Address] EAT @iexplore.exe (ThemeInitApiHook) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE64571)
[Address] EAT @iexplore.exe (UpdatePanningFeedback) : ATL.DLL -> HOOKED (C:\Windows\SysWOW64\uxtheme.dll @ 0x6EE875ED)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection : Root.Zekos ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

 

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HTS723232L9A360 ATA Device +++++
--- User ---
[MBR] 5e6697b22eca71f6fd915bebeb992bbd
[bSP] 06dada5093542108a0bf7a699a2ff680 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 289291 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 592877568 | Size: 15650 MB
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 624928768 | Size: 103 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_03262014_202352.txt >>

Link to post
Share on other sites

Please uninstall: BrowserSafeguard with Rockettab from your add/remove programs

Then................

Start with this: (make sure you have created a new system restore point)

Please download AdwCleaner from HERE or HERE to your desktop.

  • Double click on AdwCleaner.exe to run the tool.

    Vista/Windows 7/8 users right-click and select Run As Administrator

  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
  • Now click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • Look over the log especially under Files/Folders for any program you want to save.
  • If there's a program you may want to save, just uncheck it from AdwCleaner.
  • If you're not sure, post the log for review. (all items found are adware/spyware/foistware)
  • If you're ready to clean it all up.....click the Clean button.
  • After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
  • Items that are deleted are moved to the Quarantine Folder: C:\AdwCleaner\Quarantine
  • To restore an item that has been deleted:
  • Go to Tools > Quarantine Manager > check what you want restored > now click on Restore.
Next.........

Please read the directions carefully so you don't end up deleting something that is good!!

If in doubt about an entry....please ask or choose Skip!!!!

Don't Delete anything unless instructed to!

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

If a suspicious object is detected, the default action will be Skip, click on Continue

Please note that TDSSKiller can be run in safe mode if needed.

Please download the latest version of TDSSKiller from HERE and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters. (Leave the KSN box checked)

    image000q.png

  • Put a checkmark beside loaded modules.

    2012081514h0118.png

  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.

    clip.jpg

  • Click the Start Scan button.

    19695967.jpg

  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.

    67776163.jpg

    Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

    If in doubt about an entry....please ask or choose Skip

  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.

    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.

    62117367.jpg

    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here. There may be 3 logs > so post or attach all of them.
  • Sometimes these logs can be very large, in that case please attach it or zip it up and attach it.

Here's a summary of what to do if you would like to print it out:

If in doubt about an entry....please ask or choose Skip

Don't Delete anything unless instructed to!

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

~~~~~~~~~~~~~~~~~~~~

You can attach the logs if they're too long:

Bottom right corner of this page.

reply1.jpg

New window that comes up.

replyer1.jpg

Then...........

Please download and run ComboFix.

The most important things to remember when running it is to disable all your malware programs and run Combofix from your desktop.

Please visit this webpage for download links, and instructions for running ComboFix

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

http://www.bleepingcomputer.com/download/combofix/dl/12/ <---ComboFix direct download

Please make sure you click download buttons that look similar to this, not "sponsored ad links":

bleep-crop.jpg

Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Information on disabling your malware programs can be found Here.

Make sure you run ComboFix from your desktop.

Give it at least 30-45 minutes to finish if needed.

Please include the C:\ComboFix.txt in your next reply for further review.

---------->NOTE<----------

If you get the message Illegal operation attempted on registry key that has been marked for deletion after you run ComboFix....please reboot the computer, this should resolve the problem. You may have to do this several times if needed.

MrC

Link to post
Share on other sites

# AdwCleaner v3.022 - Report created 27/03/2014 at 18:49:54
# Updated 13/03/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Hilda - CRAZYMONKEY
# Running from : C:\Users\Hilda\Downloads\adwcleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\AVG Secure Search
Folder Deleted : C:\Program Files (x86)\AVG Secure Search
Folder Deleted : C:\Program Files (x86)\BrowserSafeguard
Folder Deleted : C:\Program Files (x86)\Common Files\AVG Secure Search
Folder Deleted : C:\Program Files\Level Quality Watcher
Folder Deleted : C:\Program Files\SavingsBull
Folder Deleted : C:\Users\Hilda\AppData\Local\AVG Secure Search
Folder Deleted : C:\Users\Hilda\AppData\Local\BrowserSafeguard
Folder Deleted : C:\Users\Hilda\AppData\Local\Temp\boost_interprocess
Folder Deleted : C:\Users\Hilda\AppData\LocalLow\AVG Secure Search
File Deleted : C:\END
File Deleted : C:\Users\Public\Desktop\eBay.lnk
File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk

***** [ Shortcuts ] *****

***** [ Registry ] *****

Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [Avg@toolbar]
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\ndibdjnfmopecpmkdieinmbadjfpblof
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\conduit.com
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ScriptHelper.EXE
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ViProtocol.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\WLXQuickTimeShellExt.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI
Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI.1
Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj
Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj.1
Key Deleted : HKLM\SOFTWARE\Classes\protocols\handler\viprotocol
Key Deleted : HKLM\SOFTWARE\Classes\S
Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi
Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi.1
Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE
Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE.1
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasapi32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasmancs
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\HPSF_Tasks_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\HPSF_Tasks_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchProtectINT_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchProtectINT_RASMANCS
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [vProt]
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FDFF5A2-7BB1-48E1-8081-7236812B12B2}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BB711CB0-C70B-482E-9852-EC05EBD71DBB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{408CFAD9-8F13-4747-8EC7-770A339C7237}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{761F6A83-F007-49E4-8EAC-CDB6808EF06F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{76C45B18-A29E-43EA-AAF8-AF55C2E1AE17}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{7CD74AFF-3433-4E34-92E2-D98DFDB30754}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{933B95E2-E7B7-4AD9-B952-7AC336682AE3}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{94496571-6AC5-4836-82D5-D46260C44B17}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{96EF404C-24C7-43D0-9096-4CCC8BB7CCAC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{97720195-206A-42AE-8E65-260B9BA5589F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{986F7A5A-9676-47E1-8642-F41F8C3FCF82}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B18788A4-92BD-440E-A4D1-380C36531119}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B658800C-F66E-4EF3-AB85-6C0C227862A9}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{BC9FD17D-30F6-4464-9E53-596A90AFF023}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{07CAC314-E962-4F78-89AB-DD002F2490EE}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{13ABD093-D46F-40DF-A608-47E162EC799D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{74FB6AFD-DD77-4CEB-83BD-AB2B63E63C93}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C2AC8A0E-E48E-484B-A71C-C7A937FAAB94}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C6FDD0C3-266A-4DC3-B459-28C697C44CDC}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{95B7759C-8C7F-4BF1-B163-73684A933233}]
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{3408AC0D-510E-4808-8F7B-6B70B1F88534}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKCU\Software\AVG Secure Search
Key Deleted : HKCU\Software\SearchProtectINT
Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
Key Deleted : HKCU\Software\AppDataLow\Software\Savings Bull
Key Deleted : HKLM\Software\AVG Secure Search
Key Deleted : HKLM\Software\AVG Security Toolbar
Key Deleted : HKLM\Software\DeviceVM
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AVG Secure Search
Key Deleted : [x64] HKLM\SOFTWARE\DeviceVM
Key Deleted : [x64] HKLM\SOFTWARE\Savings Bull

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16450

-\\ Google Chrome v

[ File : C:\Users\Hilda\AppData\Local\Google\Chrome\User Data\Default\preferences ]

*************************

AdwCleaner[R0].txt - [8766 octets] - [27/03/2014 18:45:41]
AdwCleaner[s0].txt - [8538 octets] - [27/03/2014 18:49:54]

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [8598 octets] ##########

Link to post
Share on other sites

Using ComboFix......

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Download the attached CFScript.txt to the same location as ComboFix.exe

CFScript.gif

Refering to the picture above, drag CFScript into ComboFix.exe

CAUTION: Do not mouse-click ComboFix while it is running. It may cause it to stall.

After reboot, (in case it asks to reboot)......

Please provide the contents of the ComboFix log (C:\ComboFix.txt) in your next reply.

MrC

Link to post
Share on other sites

Looks better.......

Open up Malwarebytes > Settings Tab > Scanner Settings > Under action for PUP > Select Show in Results List and Check for removal.

Please Update and run a Quick Scan with Malwarebytes Anti-Malware, post the report.

Make sure that everything is checked, and click Remove Selected.

Please let me know how computer is running now, MrC

Link to post
Share on other sites

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org

Database version: v2014.03.30.06

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Hilda :: CRAZYMONKEY [administrator]

Protection: Enabled

3/30/2014 1:39:49 PM
mbam-log-2014-03-30 (13-39-49).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | PUP | PUM
Scan options disabled: Heuristics/Extra | Heuristics/Shuriken | P2P
Objects scanned: 35263
Time elapsed: 4 minute(s), 30 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

Link to post
Share on other sites

Yes you can do that.

If it's OK now......

Lets check your computers security before you go and we have a little cleanup to do also:

Download Security Check by screen317 from HERE or HERE.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • If you get Unsupported operating system. Aborting now, just reboot and try again.
  • A Notepad document should open automatically called checkup.txt.
  • Please Post the contents of that document.
  • Do Not Attach It!!!
MrC
Link to post
Share on other sites

 Results of screen317's Security Check version 0.99.81 
 Windows 7 Service Pack 1 x64 (UAC is enabled) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
AVG AntiVirus Free Edition 2013  
 Antivirus out of date! 
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.75.0.1300 
 Java 7 Update 51 
 Adobe Reader 9 Adobe Reader out of Date!
 Google Chrome 33.0.1750.146 
 Google Chrome 33.0.1750.154 
````````Process Check: objlist.exe by Laurent```````` 
 Malwarebytes Anti-Malware mbamservice.exe 
 Malwarebytes Anti-Malware mbamgui.exe 
 Malwarebytes Anti-Malware mbam.exe 
 AVG avgwdsvc.exe
 Malwarebytes' Anti-Malware mbamscheduler.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````
 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.