Jump to content

Recommended Posts

Hello,

 

First i downloaded "Malwarebytes Anti-Malware" (the new update) and runned a scan,but when it finished it founded a Backdoor virus and Spyware so i deleted them. I restarted my PC and then i scanned the TEMP file it founded these two viruses again so i removed them. I restarted my PC again and checked the TEMP folder the viruses restored. I disabled the Restore Point and deleted those viruses. Restarted again and the viruses where gone. But after few days my PC was going so slow and i found something suspicious a Trojan downloader i deleted it to. Can anyone help me delete this virus ?

 

THANKS  :) 

Link to post
Share on other sites

Welcome to the forum.

Please run a Quick Scan with Malwarebytes like this:

Open up Malwarebytes > Settings Tab > Scanner Settings > Under action for PUP > Select: Show in Results List and Check for removal.

Please Update and run a Quick Scan with Malwarebytes Anti-Malware, post the report.

Make sure that everything is checked, and click Remove Selected.

If you're using Malwarebytes 2.0, please run a Threat Scan

Then.......

Please download and run RogueKiller 32 bit to your desktop.

RogueKiller<---use this one for 64 bit systems

Which system am I using?

Quit all running programs.

For Windows XP, double-click to start.

For Vista or Windows 7-8, do a right-click on the program, select Run as Administrator to start, & when prompted Allow to run.

Click Scan to scan the system.

When the scan completes > Close out the program > Don't Fix anything!

Don't run any other options, they're not all bad!!!!!!!

Post back the report which should be located on your desktop.

(please don't put logs in code or quotes and use the default font)

MrC

Note:

Please read all of my instructions completely including these.

Make sure system restore is turned on and running. Create a new restore point

Make sure you're subscribed to this topic: Click on the Follow This Topic Button (at the top right of this page), make sure that the Receive notification box is checked and that it is set to Instantly

Removing malware can be unpredictable...unlikely but things can go very wrong! Backup any files that cannot be replaced. You can copy them to a CD/DVD, external drive or a pen drive

<+>Please don't run any other scans, download, install or uninstall any programs while I'm working with you.

<+>The removal of malware isn't instantaneous, please be patient.

<+>When we are done, I'll give to instructions on how to cleanup all the tools and logs

<+>Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that.

------->Your topic will be closed if you haven't replied within 3 days!<--------

(If I don't respond within 24 hours, please send me a PM)

Link to post
Share on other sites

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 4/1/2014

Scan Time: 9:03:01 PM

Logfile: MalwareBytes Anti-Malware Report.txt

Administrator: Yes

 

Version: 2.00.0.1000

Malware Database: v2014.04.01.07

Rootkit Database: v2014.03.27.01

License: Premium

Malware Protection: Enabled

Malicious Website Protection: Enabled

Chameleon: Enabled

 

OS: Windows 8

CPU: x64

File System: NTFS

User: Vartotojas

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 250127

Time Elapsed: 11 min, 7 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Disabled

Shuriken: Enabled

PUP: Warn

PUM: Disabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 0

(No malicious items detected)

 

Registry Values: 0

(No malicious items detected)

 

Registry Data: 0

(No malicious items detected)

 

Folders: 0

(No malicious items detected)

 

Files: 0

(No malicious items detected)

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

Link to post
Share on other sites

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software





 

 

Operating System : Windows 8 (6.2.9200 ) 64 bits version

Started in : Normal mode

User : Vartotojas [Admin rights]

Mode : Scan -- Date : 04/01/2014 21:08:38

| ARK || FAK || MBR |

 

¤¤¤ Bad processes : 0 ¤¤¤

 

¤¤¤ Registry Entries : 17 ¤¤¤

[RUN][sUSP PATH] HKCU\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKCU\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-1\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-1\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-2\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-2\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-3\[...]\Run : AceStream (C:\Users\Vartotojas\AppData\Roaming\ACEStream\engine\ace_engine.exe [7]) -> FOUND

[RUN][sUSP PATH] HKUS\S-1-5-21-2568246086-2447926606-4193830083-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-3\[...]\Run : Minecraft Tweaker Updater (C:\Users\Vartotojas\AppData\Roaming\.minecraft\MinecraftTweakerUpdater.exe [x]) -> FOUND

[iFEO] HKLM\[...]\Clownfish.exe : Debugger (C:\Program Files (x86)\IObit\Advanced SystemCare 7\AutoReactivator.exe [7]) -> FOUND

[HJ POL][PUM] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND

[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND

[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

 

¤¤¤ Scheduled tasks : 0 ¤¤¤

 

¤¤¤ Startup Entries : 0 ¤¤¤

 

¤¤¤ Web browsers : 0 ¤¤¤

 

¤¤¤ Browser Addons : 0 ¤¤¤

 

¤¤¤ Particular Files / Folders: ¤¤¤

 

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

[Address] EAT @explorer.exe (BiChangeApplicationStateForPackageName) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EAAB80)

[Address] EAT @explorer.exe (BiChangeSessionState) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EC53D8)

[Address] EAT @explorer.exe (BiNotifyNewSession) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EC6F0C)

[Address] EAT @explorer.exe (BiPtActivateWorkItem) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BCE0)

[Address] EAT @explorer.exe (BiPtAssociateActivationProxy) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69ECA7EC)

[Address] EAT @explorer.exe (BiPtAssociateApplicationExtensionClass) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BBD0)

[Address] EAT @explorer.exe (BiPtCreateEventForPackageName) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BAC0)

[Address] EAT @explorer.exe (BiPtDeleteEvent) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BA50)

[Address] EAT @explorer.exe (BiPtDisassociateWorkItem) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B9B0)

[Address] EAT @explorer.exe (BiPtEnumerateBrokeredEvents) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EC6A70)

[Address] EAT @explorer.exe (BiPtEnumerateWorkItemsForPackageName) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B8C0)

[Address] EAT @explorer.exe (BiPtFreeMemory) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA5FE0)

[Address] EAT @explorer.exe (BiPtQueryBrokeredEvent) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA5DF0)

[Address] EAT @explorer.exe (BiPtQuerySystemStateBroadcastChannels) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EC6A0C)

[Address] EAT @explorer.exe (BiPtQueryWorkItem) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B804)

[Address] EAT @explorer.exe (BiPtSignalEvent) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B738)

[Address] EAT @explorer.exe (BiPtSignalMultipleEvents) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B660)

[Address] EAT @explorer.exe (BiResetActiveSessionForPackage) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B57C)

[Address] EAT @explorer.exe (BiSetActiveSessionForPackage) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B4E0)

[Address] EAT @explorer.exe (BiUpdateLockScreenApplications) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1B430)

[Address] EAT @explorer.exe (DllCanUnloadNow) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA1340)

[Address] EAT @explorer.exe (DllGetActivationFactory) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA2F60)

[Address] EAT @explorer.exe (DllGetClassObject) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA2110)

[Address] EAT @explorer.exe (PsmBlockAppStateChangeCompletion) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BDD4)

[Address] EAT @explorer.exe (PsmIsProcessInApplication) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EB7D60)

[Address] EAT @explorer.exe (PsmQueryApplicationInformation) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA73F0)

[Address] EAT @explorer.exe (PsmQueryApplicationList) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA2770)

[Address] EAT @explorer.exe (PsmQueryCurrentAppState) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BD70)

[Address] EAT @explorer.exe (PsmQueryProcessList) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA24F0)

[Address] EAT @explorer.exe (PsmRegisterAppStateChangeNotification) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EACF00)

[Address] EAT @explorer.exe (PsmRegisterApplicationNotification) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EA71E0)

[Address] EAT @explorer.exe (PsmSetApplicationState) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EAA870)

[Address] EAT @explorer.exe (PsmShutdownApplication) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BEC0)

[Address] EAT @explorer.exe (PsmUnblockAppStateChangeCompletion) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BE0C)

[Address] EAT @explorer.exe (PsmUnregisterAppStateChangeNotification) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69EB0A68)

[Address] EAT @explorer.exe (PsmWaitForAppResume) : actxprxy.dll -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x69F1BE5C)

[Address] EAT @explorer.exe (DllCanUnloadNow) : bthprops.cpl -> HOOKED (C:\Windows\System32\actxprxy.dll @ 0x69F51010)

[Address] EAT @explorer.exe (DllGetClassObject) : bthprops.cpl -> HOOKED (C:\Windows\System32\actxprxy.dll @ 0x69F52B90)

[Address] EAT @explorer.exe (DllRegisterServer) : bthprops.cpl -> HOOKED (C:\Windows\System32\actxprxy.dll @ 0x6A0FBAC4)

[Address] EAT @explorer.exe (DllUnregisterServer) : bthprops.cpl -> HOOKED (C:\Windows\System32\actxprxy.dll @ 0x6A0FBAA0)

[Address] EAT @explorer.exe (GetProxyDllInfo) : bthprops.cpl -> HOOKED (C:\Windows\System32\actxprxy.dll @ 0x6A0FBAEC)

[Address] EAT @explorer.exe (DllCanUnloadNow) : hcproviders.dll -> HOOKED (C:\windows\system32\SearchFolder.dll @ 0x6D241010)

[Address] EAT @explorer.exe (DllGetClassObject) : hcproviders.dll -> HOOKED (C:\windows\system32\SearchFolder.dll @ 0x6D241F20)

[Address] EAT @explorer.exe (DllRegisterServer) : hcproviders.dll -> HOOKED (C:\windows\system32\SearchFolder.dll @ 0x6D24BB40)

[Address] EAT @explorer.exe (DllUnregisterServer) : hcproviders.dll -> HOOKED (C:\windows\system32\SearchFolder.dll @ 0x6D24BB40)

[Address] EAT @explorer.exe (AssocCreate) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3B20)

[Address] EAT @explorer.exe (AssocGetPerceivedType) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF4940)

[Address] EAT @explorer.exe (AssocIsDangerous) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0CFBC)

[Address] EAT @explorer.exe (AssocQueryKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA870)

[Address] EAT @explorer.exe (AssocQueryKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3A20)

[Address] EAT @explorer.exe (AssocQueryStringA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0E60C)

[Address] EAT @explorer.exe (AssocQueryStringByKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0E440)

[Address] EAT @explorer.exe (AssocQueryStringByKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF41A0)

[Address] EAT @explorer.exe (AssocQueryStringW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF9CC0)

[Address] EAT @explorer.exe (ChrCmpIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A03C)

[Address] EAT @explorer.exe (ChrCmpIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A02C)

[Address] EAT @explorer.exe (ColorAdjustLuma) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F7A8)

[Address] EAT @explorer.exe (ColorHLSToRGB) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFBFF0)

[Address] EAT @explorer.exe (ColorRGBToHLS) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFBF30)

[Address] EAT @explorer.exe (ConnectToConnectionPoint) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF42B0)

[Address] EAT @explorer.exe (DelayLoadFailureHook) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F8F0)

[Address] EAT @explorer.exe (DllGetClassObject) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1D448)

[Address] EAT @explorer.exe (DllGetVersion) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C05AE0)

[Address] EAT @explorer.exe (GUIDFromStringW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFF786)

[Address] EAT @explorer.exe (GetAcceptLanguagesA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C097D0)

[Address] EAT @explorer.exe (GetAcceptLanguagesW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5A40)

[Address] EAT @explorer.exe (GetMenuPosFromID) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5A60)

[Address] EAT @explorer.exe (HashData) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C097C0)

[Address] EAT @explorer.exe (IStream_Copy) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA1A0)

[Address] EAT @explorer.exe (IStream_Read) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2B80)

[Address] EAT @explorer.exe (IStream_ReadPidl) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF9980)

[Address] EAT @explorer.exe (IStream_ReadStr) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1120)

[Address] EAT @explorer.exe (IStream_Reset) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6340)

[Address] EAT @explorer.exe (IStream_Size) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA180)

[Address] EAT @explorer.exe (IStream_Write) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6320)

[Address] EAT @explorer.exe (IStream_WritePidl) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1F194)

[Address] EAT @explorer.exe (IStream_WriteStr) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6350)

[Address] EAT @explorer.exe (IUnknown_AtomicRelease) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A09C)

[Address] EAT @explorer.exe (IUnknown_Exec) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5B80)

[Address] EAT @explorer.exe (IUnknown_GetSite) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF60B0)

[Address] EAT @explorer.exe (IUnknown_GetWindow) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2D20)

[Address] EAT @explorer.exe (IUnknown_QueryService) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3300)

[Address] EAT @explorer.exe (IUnknown_QueryStatus) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1BBA8)

[Address] EAT @explorer.exe (IUnknown_Set) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1130)

[Address] EAT @explorer.exe (IUnknown_SetSite) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3310)

[Address] EAT @explorer.exe (IntlStrEqWorkerA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E3C)

[Address] EAT @explorer.exe (IntlStrEqWorkerW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E2C)

[Address] EAT @explorer.exe (IsCharSpaceA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A80)

[Address] EAT @explorer.exe (IsCharSpaceW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1140)

[Address] EAT @explorer.exe (IsInternetESCEnabled) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C097B0)

[Address] EAT @explorer.exe (IsOS) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2B60)

[Address] EAT @explorer.exe (MLFreeLibrary) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C19EF4)

[Address] EAT @explorer.exe (MLLoadLibraryA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C19F48)

[Address] EAT @explorer.exe (MLLoadLibraryW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C19FA8)

[Address] EAT @explorer.exe (ParseURLA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C097A0)

[Address] EAT @explorer.exe (ParseURLW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFC250)

[Address] EAT @explorer.exe (PathAddBackslashA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B2C)

[Address] EAT @explorer.exe (PathAddBackslashW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3C00)

[Address] EAT @explorer.exe (PathAddExtensionA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CCC)

[Address] EAT @explorer.exe (PathAddExtensionW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CBC)

[Address] EAT @explorer.exe (PathAppendA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CAC)

[Address] EAT @explorer.exe (PathAppendW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5A10)

[Address] EAT @explorer.exe (PathBuildRootA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A05C)

[Address] EAT @explorer.exe (PathBuildRootW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A06C)

[Address] EAT @explorer.exe (PathCanonicalizeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C9C)

[Address] EAT @explorer.exe (PathCanonicalizeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2CF0)

[Address] EAT @explorer.exe (PathCombineA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B5C)

[Address] EAT @explorer.exe (PathCombineW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3C10)

[Address] EAT @explorer.exe (PathCommonPrefixA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09DAC)

[Address] EAT @explorer.exe (PathCommonPrefixW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D9C)

[Address] EAT @explorer.exe (PathCompactPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0AF90)

[Address] EAT @explorer.exe (PathCompactPathExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0AD80)

[Address] EAT @explorer.exe (PathCompactPathExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6530)

[Address] EAT @explorer.exe (PathCompactPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0EB08)

[Address] EAT @explorer.exe (PathCreateFromUrlA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09790)

[Address] EAT @explorer.exe (PathCreateFromUrlAlloc) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09780)

[Address] EAT @explorer.exe (PathCreateFromUrlW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF36E0)

[Address] EAT @explorer.exe (PathFileExistsA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C0C)

[Address] EAT @explorer.exe (PathFileExistsAndAttributesW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5930)

[Address] EAT @explorer.exe (PathFileExistsW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3690)

[Address] EAT @explorer.exe (PathFindExtensionA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C3C)

[Address] EAT @explorer.exe (PathFindExtensionW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10C0)

[Address] EAT @explorer.exe (PathFindFileNameA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BFC)

[Address] EAT @explorer.exe (PathFindFileNameW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1090)

[Address] EAT @explorer.exe (PathFindNextComponentA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09AE0)

[Address] EAT @explorer.exe (PathFindNextComponentW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA210)

[Address] EAT @explorer.exe (PathFindOnPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0B610)

[Address] EAT @explorer.exe (PathFindOnPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF9170)

[Address] EAT @explorer.exe (PathFindSuffixArrayA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0B534)

[Address] EAT @explorer.exe (PathFindSuffixArrayW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF53D0)

[Address] EAT @explorer.exe (PathGetArgsA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0962C)

[Address] EAT @explorer.exe (PathGetArgsW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFC880)

[Address] EAT @explorer.exe (PathGetCharTypeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09648)

[Address] EAT @explorer.exe (PathGetCharTypeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6480)

[Address] EAT @explorer.exe (PathGetDriveNumberA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D5C)

[Address] EAT @explorer.exe (PathGetDriveNumberW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1050)

[Address] EAT @explorer.exe (PathIsContentTypeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0ABAC)

[Address] EAT @explorer.exe (PathIsContentTypeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA2C0)

[Address] EAT @explorer.exe (PathIsDirectoryA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0B404)

[Address] EAT @explorer.exe (PathIsDirectoryEmptyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0B334)

[Address] EAT @explorer.exe (PathIsDirectoryEmptyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0EE78)

[Address] EAT @explorer.exe (PathIsDirectoryW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF54D0)

[Address] EAT @explorer.exe (PathIsFileSpecA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D6C)

[Address] EAT @explorer.exe (PathIsFileSpecW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6200)

[Address] EAT @explorer.exe (PathIsLFNFileSpecA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CFC)

[Address] EAT @explorer.exe (PathIsLFNFileSpecW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CEC)

[Address] EAT @explorer.exe (PathIsNetworkPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A07C)

[Address] EAT @explorer.exe (PathIsNetworkPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF29A0)

[Address] EAT @explorer.exe (PathIsPrefixA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D8C)

[Address] EAT @explorer.exe (PathIsPrefixW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D7C)

[Address] EAT @explorer.exe (PathIsRelativeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D4C)

[Address] EAT @explorer.exe (PathIsRelativeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3680)

[Address] EAT @explorer.exe (PathIsRootA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C8C)

[Address] EAT @explorer.exe (PathIsRootW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2CE0)

[Address] EAT @explorer.exe (PathIsSameRootA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D1C)

[Address] EAT @explorer.exe (PathIsSameRootW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D0C)

[Address] EAT @explorer.exe (PathIsSystemFolderA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A834)

[Address] EAT @explorer.exe (PathIsSystemFolderW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0E948)

[Address] EAT @explorer.exe (PathIsUNCA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B3C)

[Address] EAT @explorer.exe (PathIsUNCServerA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C1C)

[Address] EAT @explorer.exe (PathIsUNCServerShareA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C2C)

[Address] EAT @explorer.exe (PathIsUNCServerShareW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E60)

[Address] EAT @explorer.exe (PathIsUNCServerW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E70)

[Address] EAT @explorer.exe (PathIsUNCW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1040)

[Address] EAT @explorer.exe (PathIsURLA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09770)

[Address] EAT @explorer.exe (PathIsURLW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF36C0)

[Address] EAT @explorer.exe (PathMakePrettyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0BCB0)

[Address] EAT @explorer.exe (PathMakePrettyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF9FC0)

[Address] EAT @explorer.exe (PathMakeSystemFolderA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A8C0)

[Address] EAT @explorer.exe (PathMakeSystemFolderW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1270)

[Address] EAT @explorer.exe (PathMatchSpecA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BAC)

[Address] EAT @explorer.exe (PathMatchSpecExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B8C)

[Address] EAT @explorer.exe (PathMatchSpecExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B7C)

[Address] EAT @explorer.exe (PathMatchSpecW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B9C)

[Address] EAT @explorer.exe (PathParseIconLocationA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BEC)

[Address] EAT @explorer.exe (PathParseIconLocationW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E20)

[Address] EAT @explorer.exe (PathQuoteSpacesA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BCC)

[Address] EAT @explorer.exe (PathQuoteSpacesW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2D00)

[Address] EAT @explorer.exe (PathRelativePathToA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B14)

[Address] EAT @explorer.exe (PathRelativePathToW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09AF4)

[Address] EAT @explorer.exe (PathRemoveArgsA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0BC74)

[Address] EAT @explorer.exe (PathRemoveArgsW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6450)

[Address] EAT @explorer.exe (PathRemoveBackslashA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09CDC)

[Address] EAT @explorer.exe (PathRemoveBackslashW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3730)

[Address] EAT @explorer.exe (PathRemoveBlanksA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BBC)

[Address] EAT @explorer.exe (PathRemoveBlanksW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3BD0)

[Address] EAT @explorer.exe (PathRemoveExtensionA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C7C)

[Address] EAT @explorer.exe (PathRemoveExtensionW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E30)

[Address] EAT @explorer.exe (PathRemoveFileSpecA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B4C)

[Address] EAT @explorer.exe (PathRemoveFileSpecW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF4040)

[Address] EAT @explorer.exe (PathRenameExtensionA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C6C)

[Address] EAT @explorer.exe (PathRenameExtensionW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C5C)

[Address] EAT @explorer.exe (PathSearchAndQualifyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0961C)

[Address] EAT @explorer.exe (PathSearchAndQualifyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2E00)

[Address] EAT @explorer.exe (PathSetDlgItemPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0AC50)

[Address] EAT @explorer.exe (PathSetDlgItemPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0E9D0)

[Address] EAT @explorer.exe (PathSkipRootA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D2C)

[Address] EAT @explorer.exe (PathSkipRootW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5A20)

[Address] EAT @explorer.exe (PathStripPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09D3C)

[Address] EAT @explorer.exe (PathStripPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6220)

[Address] EAT @explorer.exe (PathStripToRootA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09C4C)

[Address] EAT @explorer.exe (PathStripToRootW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E50)

[Address] EAT @explorer.exe (PathUnExpandEnvStringsA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09B6C)

[Address] EAT @explorer.exe (PathUnExpandEnvStringsW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2DF0)

[Address] EAT @explorer.exe (PathUndecorateA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A75C)

[Address] EAT @explorer.exe (PathUndecorateW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF64D0)

[Address] EAT @explorer.exe (PathUnmakeSystemFolderA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A86C)

[Address] EAT @explorer.exe (PathUnmakeSystemFolderW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0E984)

[Address] EAT @explorer.exe (PathUnquoteSpacesA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09BDC)

[Address] EAT @explorer.exe (PathUnquoteSpacesW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3BE0)

[Address] EAT @explorer.exe (QISearch) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1010)

[Address] EAT @explorer.exe (SHAllocShared) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF29D0)

[Address] EAT @explorer.exe (SHAnsiToAnsi) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A310)

[Address] EAT @explorer.exe (SHAnsiToUnicode) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A320)

[Address] EAT @explorer.exe (SHAutoComplete) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFBE10)

[Address] EAT @explorer.exe (SHCopyKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A2F0)

[Address] EAT @explorer.exe (SHCopyKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA070)

[Address] EAT @explorer.exe (SHCreateMemStream) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF32B0)

[Address] EAT @explorer.exe (SHCreateShellPalette) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2890)

[Address] EAT @explorer.exe (SHCreateStreamOnFileA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0DC)

[Address] EAT @explorer.exe (SHCreateStreamOnFileEx) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6070)

[Address] EAT @explorer.exe (SHCreateStreamOnFileW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF64A0)

[Address] EAT @explorer.exe (SHCreateStreamWrapper) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFF792)

[Address] EAT @explorer.exe (SHCreateThread) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5E80)

[Address] EAT @explorer.exe (SHCreateThreadRef) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5B30)

[Address] EAT @explorer.exe (SHCreateThreadWithHandle) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6400)

[Address] EAT @explorer.exe (SHDeleteEmptyKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0FC)

[Address] EAT @explorer.exe (SHDeleteEmptyKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0EC)

[Address] EAT @explorer.exe (SHDeleteKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A2E0)

[Address] EAT @explorer.exe (SHDeleteKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2C60)

[Address] EAT @explorer.exe (SHDeleteOrphanKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1EFB8)

[Address] EAT @explorer.exe (SHDeleteOrphanKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1EF48)

[Address] EAT @explorer.exe (SHDeleteValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A10C)

[Address] EAT @explorer.exe (SHDeleteValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2CA0)

[Address] EAT @explorer.exe (SHEnumKeyExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A290)

[Address] EAT @explorer.exe (SHEnumKeyExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A280)

[Address] EAT @explorer.exe (SHEnumValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A250)

[Address] EAT @explorer.exe (SHEnumValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA1D0)

[Address] EAT @explorer.exe (SHFormatDateTimeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F004)

[Address] EAT @explorer.exe (SHFormatDateTimeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F070)

[Address] EAT @explorer.exe (SHFreeShared) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF29E0)

[Address] EAT @explorer.exe (SHGetInverseCMAP) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C10830)

[Address] EAT @explorer.exe (SHGetThreadRef) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF9140)

[Address] EAT @explorer.exe (SHGetValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF43C0)

[Address] EAT @explorer.exe (SHGetValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2B20)

[Address] EAT @explorer.exe (SHGetViewStatePropertyBag) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6FA0)

[Address] EAT @explorer.exe (SHIsChildOrSelf) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3510)

[Address] EAT @explorer.exe (SHIsLowMemoryMachine) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1BC3C)

[Address] EAT @explorer.exe (SHLoadIndirectString) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3340)

[Address] EAT @explorer.exe (SHLockShared) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1F838)

[Address] EAT @explorer.exe (SHMessageBoxCheckA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1ADD4)

[Address] EAT @explorer.exe (SHMessageBoxCheckW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1AF00)

[Address] EAT @explorer.exe (SHOpenRegStream2A) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0AC)

[Address] EAT @explorer.exe (SHOpenRegStream2W) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF43F0)

[Address] EAT @explorer.exe (SHOpenRegStreamA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0CC)

[Address] EAT @explorer.exe (SHOpenRegStreamW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A0BC)

[Address] EAT @explorer.exe (SHPackDispParamsV) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF7DB0)

[Address] EAT @explorer.exe (SHPropertyBag_ReadStrAlloc) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C21598)

[Address] EAT @explorer.exe (SHPropertyBag_WriteBSTR) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C21498)

[Address] EAT @explorer.exe (SHQueryInfoKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A230)

[Address] EAT @explorer.exe (SHQueryInfoKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A210)

[Address] EAT @explorer.exe (SHQueryValueExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A120)

[Address] EAT @explorer.exe (SHQueryValueExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF63A0)

[Address] EAT @explorer.exe (SHRegCloseUSKey) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A70)

[Address] EAT @explorer.exe (SHRegCreateUSKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A58)

[Address] EAT @explorer.exe (SHRegCreateUSKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2640)

[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A44)

[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A34)

[Address] EAT @explorer.exe (SHRegDeleteUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A24)

[Address] EAT @explorer.exe (SHRegDeleteUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09A14)

[Address] EAT @explorer.exe (SHRegDuplicateHKey) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A1F0)

[Address] EAT @explorer.exe (SHRegEnumUSKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C099FC)

[Address] EAT @explorer.exe (SHRegEnumUSKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C099DC)

[Address] EAT @explorer.exe (SHRegEnumUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09998)

[Address] EAT @explorer.exe (SHRegEnumUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2590)

[Address] EAT @explorer.exe (SHRegGetBoolUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09984)

[Address] EAT @explorer.exe (SHRegGetBoolUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFC220)

[Address] EAT @explorer.exe (SHRegGetBoolValueFromHKCUHKLM) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6330)

[Address] EAT @explorer.exe (SHRegGetIntW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A1E0)

[Address] EAT @explorer.exe (SHRegGetPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A1C0)

[Address] EAT @explorer.exe (SHRegGetPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA240)

[Address] EAT @explorer.exe (SHRegGetUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09948)

[Address] EAT @explorer.exe (SHRegGetUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA280)

[Address] EAT @explorer.exe (SHRegGetValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A2A4)

[Address] EAT @explorer.exe (SHRegGetValueFromHKCUHKLM) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6EBC)

[Address] EAT @explorer.exe (SHRegGetValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF21B0)

[Address] EAT @explorer.exe (SHRegOpenUSKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09928)

[Address] EAT @explorer.exe (SHRegOpenUSKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09908)

[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C098E0)

[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2610)

[Address] EAT @explorer.exe (SHRegQueryUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C098A0)

[Address] EAT @explorer.exe (SHRegQueryUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09860)

[Address] EAT @explorer.exe (SHRegSetPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A1A0)

[Address] EAT @explorer.exe (SHRegSetPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A180)

[Address] EAT @explorer.exe (SHRegSetUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09838)

[Address] EAT @explorer.exe (SHRegSetUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09810)

[Address] EAT @explorer.exe (SHRegWriteUSValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C097E4)

[Address] EAT @explorer.exe (SHRegWriteUSValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF25E0)

[Address] EAT @explorer.exe (SHRegisterValidateTemplate) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C258E0)

[Address] EAT @explorer.exe (SHReleaseThreadRef) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A08C)

[Address] EAT @explorer.exe (SHRunIndirectRegClientCommand) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0C95C)

[Address] EAT @explorer.exe (SHSendMessageBroadcastA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1A27C)

[Address] EAT @explorer.exe (SHSendMessageBroadcastW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2CC0)

[Address] EAT @explorer.exe (SHSetThreadRef) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5B10)

[Address] EAT @explorer.exe (SHSetValueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A14C)

[Address] EAT @explorer.exe (SHSetValueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF63D0)

[Address] EAT @explorer.exe (SHSkipJunction) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2E20)

[Address] EAT @explorer.exe (SHStrDupA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFA260)

[Address] EAT @explorer.exe (SHStrDupW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1070)

[Address] EAT @explorer.exe (SHStripMneumonicA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1A900)

[Address] EAT @explorer.exe (SHStripMneumonicW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2DB0)

[Address] EAT @explorer.exe (SHUnicodeToAnsi) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF32E0)

[Address] EAT @explorer.exe (SHUnicodeToAnsiCP) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BFF7B9)

[Address] EAT @explorer.exe (SHUnicodeToUnicode) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0A300)

[Address] EAT @explorer.exe (SHUnlockShared) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1F818)

[Address] EAT @explorer.exe (ShellMessageBoxA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0C604)

[Address] EAT @explorer.exe (ShellMessageBoxW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F54C)

[Address] EAT @explorer.exe (StrCSpnA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09EEC)

[Address] EAT @explorer.exe (StrCSpnIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09EDC)

[Address] EAT @explorer.exe (StrCSpnIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09ECC)

[Address] EAT @explorer.exe (StrCSpnW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF5A30)

[Address] EAT @explorer.exe (StrCatBuffA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FDC)

[Address] EAT @explorer.exe (StrCatBuffW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FEC)

[Address] EAT @explorer.exe (StrCatChainW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09DCC)

[Address] EAT @explorer.exe (StrCatW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FCF8)

[Address] EAT @explorer.exe (StrChrA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FCC)

[Address] EAT @explorer.exe (StrChrIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F9C)

[Address] EAT @explorer.exe (StrChrIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10E0)

[Address] EAT @explorer.exe (StrChrNIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F8C)

[Address] EAT @explorer.exe (StrChrNW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FBC)

[Address] EAT @explorer.exe (StrChrW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1080)

[Address] EAT @explorer.exe (StrCmpCA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09DEC)

[Address] EAT @explorer.exe (StrCmpCW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2C90)

[Address] EAT @explorer.exe (StrCmpICA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1100)

[Address] EAT @explorer.exe (StrCmpICW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10F0)

[Address] EAT @explorer.exe (StrCmpIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3650)

[Address] EAT @explorer.exe (StrCmpLogicalW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09DDC)

[Address] EAT @explorer.exe (StrCmpNA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09EBC)

[Address] EAT @explorer.exe (StrCmpNCA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E0C)

[Address] EAT @explorer.exe (StrCmpNCW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09DFC)

[Address] EAT @explorer.exe (StrCmpNIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09EAC)

[Address] EAT @explorer.exe (StrCmpNICA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF60A0)

[Address] EAT @explorer.exe (StrCmpNICW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2B70)

[Address] EAT @explorer.exe (StrCmpNIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3670)

[Address] EAT @explorer.exe (StrCmpNW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3770)

[Address] EAT @explorer.exe (StrCmpW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10B0)

[Address] EAT @explorer.exe (StrCpyNW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FFC)

[Address] EAT @explorer.exe (StrCpyW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FD38)

[Address] EAT @explorer.exe (StrDupA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E4C)

[Address] EAT @explorer.exe (StrDupW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF2B50)

[Address] EAT @explorer.exe (StrFormatByteSize64A) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FC00)

[Address] EAT @explorer.exe (StrFormatByteSizeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FBF4)

[Address] EAT @explorer.exe (StrFormatByteSizeEx) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF32D0)

[Address] EAT @explorer.exe (StrFormatByteSizeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FC60)

[Address] EAT @explorer.exe (StrFormatKBSizeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FB74)

[Address] EAT @explorer.exe (StrFormatKBSizeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FBE0)

[Address] EAT @explorer.exe (StrFromTimeIntervalA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C18AC8)

[Address] EAT @explorer.exe (StrFromTimeIntervalW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C18A44)

[Address] EAT @explorer.exe (StrIsIntlEqualA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E3C)

[Address] EAT @explorer.exe (StrIsIntlEqualW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E2C)

[Address] EAT @explorer.exe (StrNCatA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FCB8)

[Address] EAT @explorer.exe (StrNCatW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FC74)

[Address] EAT @explorer.exe (StrPBrkA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F5C)

[Address] EAT @explorer.exe (StrPBrkW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF61E0)

[Address] EAT @explorer.exe (StrRChrA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09FAC)

[Address] EAT @explorer.exe (StrRChrIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F7C)

[Address] EAT @explorer.exe (StrRChrIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F6C)

[Address] EAT @explorer.exe (StrRChrW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6210)

[Address] EAT @explorer.exe (StrRStrIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E9C)

[Address] EAT @explorer.exe (StrRStrIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E8C)

[Address] EAT @explorer.exe (StrRetToBSTR) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF60D0)

[Address] EAT @explorer.exe (StrRetToBufA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0F9E8)

[Address] EAT @explorer.exe (StrRetToBufW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1110)

[Address] EAT @explorer.exe (StrRetToStrA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0FA98)

[Address] EAT @explorer.exe (StrRetToStrW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3330)

[Address] EAT @explorer.exe (StrSpnA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F0C)

[Address] EAT @explorer.exe (StrSpnW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09EFC)

[Address] EAT @explorer.exe (StrStrA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E7C)

[Address] EAT @explorer.exe (StrStrIA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF6490)

[Address] EAT @explorer.exe (StrStrIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10D0)

[Address] EAT @explorer.exe (StrStrNIW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E5C)

[Address] EAT @explorer.exe (StrStrNW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E6C)

[Address] EAT @explorer.exe (StrStrW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3660)

[Address] EAT @explorer.exe (StrToInt64ExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F2C)

[Address] EAT @explorer.exe (StrToInt64ExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F3C)

[Address] EAT @explorer.exe (StrToIntA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F4C)

[Address] EAT @explorer.exe (StrToIntExA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09F1C)

[Address] EAT @explorer.exe (StrToIntExW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF61F0)

[Address] EAT @explorer.exe (StrToIntW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF10A0)

[Address] EAT @explorer.exe (StrTrimA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09E1C)

[Address] EAT @explorer.exe (StrTrimW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3320)

[Address] EAT @explorer.exe (UrlApplySchemeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09760)

[Address] EAT @explorer.exe (UrlApplySchemeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09750)

[Address] EAT @explorer.exe (UrlCanonicalizeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09740)

[Address] EAT @explorer.exe (UrlCanonicalizeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF36B0)

[Address] EAT @explorer.exe (UrlCombineA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09728)

[Address] EAT @explorer.exe (UrlCombineW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3750)

[Address] EAT @explorer.exe (UrlCompareA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09714)

[Address] EAT @explorer.exe (UrlCompareW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09704)

[Address] EAT @explorer.exe (UrlCreateFromPathA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C096F4)

[Address] EAT @explorer.exe (UrlCreateFromPathW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3BF0)

[Address] EAT @explorer.exe (UrlEscapeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C096E4)

[Address] EAT @explorer.exe (UrlEscapeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3720)

[Address] EAT @explorer.exe (UrlFixupW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C096D4)

[Address] EAT @explorer.exe (UrlGetLocationA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C096C4)

[Address] EAT @explorer.exe (UrlGetLocationW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C096B4)

[Address] EAT @explorer.exe (UrlGetPartA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0969C)

[Address] EAT @explorer.exe (UrlGetPartW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF3700)

[Address] EAT @explorer.exe (UrlHashA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09688)

[Address] EAT @explorer.exe (UrlHashW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09678)

[Address] EAT @explorer.exe (UrlIsA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09668)

[Address] EAT @explorer.exe (UrlIsNoHistoryA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C095EC)

[Address] EAT @explorer.exe (UrlIsNoHistoryW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF1150)

[Address] EAT @explorer.exe (UrlIsOpaqueA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C0960C)

[Address] EAT @explorer.exe (UrlIsOpaqueW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C095FC)

[Address] EAT @explorer.exe (UrlIsW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF36A0)

[Address] EAT @explorer.exe (UrlUnescapeA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C09658)

[Address] EAT @explorer.exe (UrlUnescapeW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70BF36D0)

[Address] EAT @explorer.exe (WhichPlatform) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C1A6D0)

[Address] EAT @explorer.exe (wnsprintfA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C193AC)

[Address] EAT @explorer.exe (wnsprintfW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C19318)

[Address] EAT @explorer.exe (wvnsprintfA) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C193F8)

[Address] EAT @explorer.exe (wvnsprintfW) : imagehlp.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x70C19368)

 

¤¤¤ External Hives: ¤¤¤

 

¤¤¤ Infection :  ¤¤¤

 

¤¤¤ HOSTS File: ¤¤¤

--> %SystemRoot%\System32\drivers\etc\hosts

 

 

 

 

¤¤¤ MBR Check: ¤¤¤

 

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST750LM022 HN-M750MBB +++++

--- User ---

[MBR] 2df53051a5438131203d98bdb4ff5638

[bSP] 7c802801883a3cd69a3fd2dfce93b827 : Empty MBR Code

Partition table:

0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB

User = LL1 ... OK!

User = LL2 ... OK!

 

Finished : << RKreport[0]_S_04012014_210838.txt >>

Link to post
Share on other sites

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 4/1/2014

Scan Time: 9:03:01 PM

Logfile: MalwareBytes Anti-Malware LOG.txt

Administrator: Yes

 

Version: 2.00.0.1000

Malware Database: v2014.04.01.07

Rootkit Database: v2014.03.27.01

License: Premium

Malware Protection: Enabled

Malicious Website Protection: Enabled

Chameleon: Enabled

 

OS: Windows 8

CPU: x64

File System: NTFS

User: Vartotojas

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 250127

Time Elapsed: 11 min, 7 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Disabled

Shuriken: Enabled

PUP: Warn

PUM: Disabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 0

(No malicious items detected)

 

Registry Values: 0

(No malicious items detected)

 

Registry Data: 0

(No malicious items detected)

 

Folders: 0

(No malicious items detected)

 

Files: 0

(No malicious items detected)

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

Link to post
Share on other sites

Lets run some scans:

Make sure you have created that system restore point before you continue!

Please read the directions carefully so you don't end up deleting something that is good!!

If in doubt about an entry....please ask or choose Skip!!!!

Don't Delete anything unless instructed to!

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

If a suspicious object is detected, the default action will be Skip, click on Continue

Please note that TDSSKiller can be run in safe mode if needed.

Please download the latest version of TDSSKiller from HERE and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters. (Leave the KSN box checked)

    image000q.png

  • Put a checkmark beside loaded modules.

    2012081514h0118.png

  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.

    clip.jpg

  • Click the Start Scan button.

    19695967.jpg

  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.

    67776163.jpg

    Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

    If in doubt about an entry....please ask or choose Skip

  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.

    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.

    62117367.jpg

    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here. There may be 3 logs > so post or attach all of them.
  • Sometimes these logs can be very large, in that case please attach it or zip it up and attach it.

Here's a summary of what to do if you would like to print it out:

If in doubt about an entry....please ask or choose Skip

Don't Delete anything unless instructed to!

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

~~~~~~~~~~~~~~~~~~~~

You can attach the logs if they're too long:

Bottom right corner of this page.

reply1.jpg

New window that comes up.

replyer1.jpg

Then...........

Please download AdwCleaner from HERE or HERE to your desktop.

  • Double click on AdwCleaner.exe to run the tool.

    Vista/Windows 7/8 users right-click and select Run As Administrator

  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
  • Now click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • Look over the log especially under Files/Folders for any program you want to save.
  • If there's a program you may want to save, just uncheck it from AdwCleaner.
  • If you're not sure, post the log for review. (all items found are adware/spyware/foistware)
  • If you're ready to clean it all up.....click the Clean button.
  • After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
  • Items that are deleted are moved to the Quarantine Folder: C:\AdwCleaner\Quarantine
  • To restore an item that has been deleted:
  • Go to Tools > Quarantine Manager > check what you want restored > now click on Restore.
MrC
Link to post
Share on other sites

# AdwCleaner v3.023 - Report created 02/04/2014 at 13:16:42

# Updated 01/04/2014 by Xplode

# Operating System : Windows 8  (64 bits)

# Username : Vartotojas - SAMSUNG

# Running from : A:\Downloads\AdwCleaner.exe

# Option : Clean

 

***** [ Services ] *****

 

 

***** [ Files / Folders ] *****

 

[x] Not Deleted : C:\ProgramData\boost_interprocess

Folder Deleted : C:\Program Files (x86)\Toolbar Cleaner

Folder Deleted : C:\Users\Vartotojas\AppData\Roaming\Systweak

Folder Deleted : C:\Users\Vartotojas\AppData\Roaming\uniblue

 

***** [ Shortcuts ] *****

 

 

***** [ Registry ] *****

 

[x] Not Deleted : HKLM\SOFTWARE\Classes\speedupmypc

[x] Not Deleted : HKLM\SOFTWARE\Microsoft\Tracing\speedupmypc_RASAPI32

[x] Not Deleted : HKLM\SOFTWARE\Microsoft\Tracing\speedupmypc_RASMANCS

[x] Not Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Minecraft Tweaker Updater]

[x] Not Deleted : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}

[x] Not Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}

[x] Not Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}

[x] Not Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}

[x] Not Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}

[x] Not Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}

[x] Not Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}

[x] Not Deleted : HKCU\Software\anchorfree

Key Deleted : HKCU\Software\AVG Secure Search

Key Deleted : HKCU\Software\Softonic

[x] Not Deleted : HKCU\Software\systweak

[x] Not Deleted : HKLM\Software\systweak

Key Deleted : HKLM\Software\Toolbar Cleaner

[x] Not Deleted : HKLM\Software\Uniblue

[x] Not Deleted : HKLM\Software\Uniblue\SpeedUpMyPC

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Toolbar Cleaner

[x] Not Deleted : [x64] HKCU\Software\anchorfree

[x] Not Deleted : [x64] HKCU\Software\systweak

 

***** [ Browsers ] *****

 

-\\ Internet Explorer v10.0.9200.16843

 

 

-\\ Google Chrome v33.0.1750.154

 

[ File : C:\Users\Vartotojas\AppData\Local\Google\Chrome\User Data\Default\preferences ]

 

 

*************************

 

AdwCleaner[R0].txt - [2467 octets] - [02/04/2014 13:12:55]

AdwCleaner[s0].txt - [2340 octets] - [02/04/2014 13:16:42]

 

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [2400 octets] ##########
Link to post
Share on other sites

You didn't delete most of what AdwCleaner found...why???

 

------------------------------

 

Please download Farbar Recovery Scan Tool (FRST) and save it to a folder.
(use correct version for your system.....Which system am I using?)
FRST <----for 32 bit systems
FRST64 <----for 64 bit systems
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button. (make sure the Addition box is checked)
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

If the logs are large, you can attach them:
 
To attach a log:
 
Bottom right corner of this page.
reply1.jpg
 
New window that comes up.
replyer1.jpg
 
MrC
Link to post
Share on other sites

1: I suggest you go back and run AdwCleaner and have it delete everything it finds.

2: Then use your CCleaner to clean out temp files

3: Then......Download the attached fixlist.txt to the same folder as FRST.
Run FRST.exe and click Fix only once and wait
The tool will create a log (Fixlog.txt) in the folder, please post it to your reply.


Let me know how it is, MrC

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.