Jump to content

Suspicious Hooks


Recommended Posts

Hello. My laptop has recently been infected by Zero Access. I am 100% sure it has been removed, as I have been given the all clear. My worry now is on my main computer. I was doing a scan with Rogue Killer as I do every week, and it found multiple objects under the drivers tab. I am suspicious and am wondering what these objects are. I will attach the Rogue Killer report. Thanks in advance for the help.

 

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
 
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Zoli [Admin rights]
Mode : Scan -- Date : 03/30/2014 16:21:22
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 0 ¤¤¤
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Browser Addons : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @explorer.exe (WlanAllocateMemory) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE8AC8)
[Address] EAT @explorer.exe (WlanCloseHandle) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE38A0)
[Address] EAT @explorer.exe (WlanConnect) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE5558)
[Address] EAT @explorer.exe (WlanDeleteProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE6D10)
[Address] EAT @explorer.exe (WlanDisconnect) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE57E8)
[Address] EAT @explorer.exe (WlanEnumInterfaces) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE3A80)
[Address] EAT @explorer.exe (WlanExtractPsdIEDataList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE8394)
[Address] EAT @explorer.exe (WlanFreeMemory) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCEA5A0)
[Address] EAT @explorer.exe (WlanGetAvailableNetworkList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4F88)
[Address] EAT @explorer.exe (WlanGetFilterList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE7F9C)
[Address] EAT @explorer.exe (WlanGetInterfaceCapability) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4188)
[Address] EAT @explorer.exe (WlanGetNetworkBssList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE5268)
[Address] EAT @explorer.exe (WlanGetProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE6A20)
[Address] EAT @explorer.exe (WlanGetProfileCustomUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE7B1C)
[Address] EAT @explorer.exe (WlanGetProfileList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE7404)
[Address] EAT @explorer.exe (WlanGetSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE8D88)
[Address] EAT @explorer.exe (WlanHostedNetworkForceStart) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE935C)
[Address] EAT @explorer.exe (WlanHostedNetworkForceStop) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE9418)
[Address] EAT @explorer.exe (WlanHostedNetworkInitSettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE99D8)
[Address] EAT @explorer.exe (WlanHostedNetworkQueryProperty) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE94D4)
[Address] EAT @explorer.exe (WlanHostedNetworkQuerySecondaryKey) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCEA020)
[Address] EAT @explorer.exe (WlanHostedNetworkQueryStatus) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE9B50)
[Address] EAT @explorer.exe (WlanHostedNetworkRefreshSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE9A94)
[Address] EAT @explorer.exe (WlanHostedNetworkSetProperty) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE9744)
[Address] EAT @explorer.exe (WlanHostedNetworkSetSecondaryKey) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE9D78)
[Address] EAT @explorer.exe (WlanHostedNetworkStartUsing) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE91EC)
[Address] EAT @explorer.exe (WlanHostedNetworkStopUsing) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE92A4)
[Address] EAT @explorer.exe (WlanIhvControl) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4A00)
[Address] EAT @explorer.exe (WlanOpenHandle) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE1960)
[Address] EAT @explorer.exe (WlanQueryAutoConfigParameter) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE3EE8)
[Address] EAT @explorer.exe (WlanQueryInterface) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4668)
[Address] EAT @explorer.exe (WlanReasonCodeToString) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE8A54)
[Address] EAT @explorer.exe (WlanRegisterNotification) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE5A08)
[Address] EAT @explorer.exe (WlanRegisterVirtualStationNotification) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCEA358)
[Address] EAT @explorer.exe (WlanRenameProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE6F4C)
[Address] EAT @explorer.exe (WlanSaveTemporaryProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE87D0)
[Address] EAT @explorer.exe (WlanScan) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4D40)
[Address] EAT @explorer.exe (WlanSetAutoConfigParameter) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE3D10)
[Address] EAT @explorer.exe (WlanSetFilterList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE7DCC)
[Address] EAT @explorer.exe (WlanSetInterface) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE4470)
[Address] EAT @explorer.exe (WlanSetProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE6760)
[Address] EAT @explorer.exe (WlanSetProfileCustomUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE78A4)
[Address] EAT @explorer.exe (WlanSetProfileEapUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE5CC4)
[Address] EAT @explorer.exe (WlanSetProfileEapXmlUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE5F9C)
[Address] EAT @explorer.exe (WlanSetProfileList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE71A8)
[Address] EAT @explorer.exe (WlanSetProfilePosition) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE7644)
[Address] EAT @explorer.exe (WlanSetPsdIEDataList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE81B0)
[Address] EAT @explorer.exe (WlanSetSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFCE8B58)
[Address] EAT @explorer.exe (AppCacheCheckManifest) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE66D2BC)
[Address] EAT @explorer.exe (AppCacheCloseHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE66A1D8)
[Address] EAT @explorer.exe (AppCacheDeleteGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791BE0)
[Address] EAT @explorer.exe (AppCacheDeleteIEGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791C38)
[Address] EAT @explorer.exe (AppCacheDuplicateHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE66A2BC)
[Address] EAT @explorer.exe (AppCacheFinalize) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791C90)
[Address] EAT @explorer.exe (AppCacheFreeDownloadList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791CE8)
[Address] EAT @explorer.exe (AppCacheFreeGroupList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D5488)
[Address] EAT @explorer.exe (AppCacheFreeIESpace) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE698570)
[Address] EAT @explorer.exe (AppCacheFreeSpace) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791DCC)
[Address] EAT @explorer.exe (AppCacheGetDownloadList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791E24)
[Address] EAT @explorer.exe (AppCacheGetFallbackUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791E7C)
[Address] EAT @explorer.exe (AppCacheGetGroupList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D5464)
[Address] EAT @explorer.exe (AppCacheGetIEGroupList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791ED4)
[Address] EAT @explorer.exe (AppCacheGetInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE791F2C)
[Address] EAT @explorer.exe (AppCacheGetManifestUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE66BB30)
[Address] EAT @explorer.exe (AppCacheLookup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6856B8)
[Address] EAT @explorer.exe (CommitUrlCacheEntryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE675F8C)
[Address] EAT @explorer.exe (CommitUrlCacheEntryBinaryBlob) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE62BF24)
[Address] EAT @explorer.exe (CommitUrlCacheEntryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE631F50)
[Address] EAT @explorer.exe (CreateMD5SSOHash) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE769180)
[Address] EAT @explorer.exe (CreateUrlCacheContainerA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE693808)
[Address] EAT @explorer.exe (CreateUrlCacheContainerW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6936B8)
[Address] EAT @explorer.exe (CreateUrlCacheEntryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE675CC0)
[Address] EAT @explorer.exe (CreateUrlCacheEntryExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D7200)
[Address] EAT @explorer.exe (CreateUrlCacheEntryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D71DC)
[Address] EAT @explorer.exe (CreateUrlCacheGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE792E4C)
[Address] EAT @explorer.exe (DeleteIE3Cache) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE797394)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE698BE0)
[Address] EAT @explorer.exe (DeleteUrlCacheContainerW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6894D0)
[Address] EAT @explorer.exe (DeleteUrlCacheEntry) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE69BD40)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE69BD40)
[Address] EAT @explorer.exe (DeleteUrlCacheEntryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE69A1B0)
[Address] EAT @explorer.exe (DeleteUrlCacheGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE792F4C)
[Address] EAT @explorer.exe (DeleteWpadCacheForNetworks) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE750270)
[Address] EAT @explorer.exe (DetectAutoProxyUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE750694)
[Address] EAT @explorer.exe (DispatchAPICall) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6114E8)
[Address] EAT @explorer.exe (DllCanUnloadNow) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE68DC70)
[Address] EAT @explorer.exe (DllGetClassObject) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE627470)
[Address] EAT @explorer.exe (DllInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6CCD10)
[Address] EAT @explorer.exe (DllRegisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732E30)
[Address] EAT @explorer.exe (DllUnregisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732E64)
[Address] EAT @explorer.exe (FindCloseUrlCache) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE61553C)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE63183C)
[Address] EAT @explorer.exe (FindFirstUrlCacheContainerW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE61E8C8)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE68C580)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6164A0)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6289FC)
[Address] EAT @explorer.exe (FindFirstUrlCacheEntryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE692DE0)
[Address] EAT @explorer.exe (FindFirstUrlCacheGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793044)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE631CA0)
[Address] EAT @explorer.exe (FindNextUrlCacheContainerW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE61EB5C)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE68C704)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE79318C)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE79335C)
[Address] EAT @explorer.exe (FindNextUrlCacheEntryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE628680)
[Address] EAT @explorer.exe (FindNextUrlCacheGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE79352C)
[Address] EAT @explorer.exe (ForceNexusLookup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE769390)
[Address] EAT @explorer.exe (ForceNexusLookupExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7693E0)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793648)
[Address] EAT @explorer.exe (FreeUrlCacheSpaceW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6978B8)
[Address] EAT @explorer.exe (FtpCommandA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73D968)
[Address] EAT @explorer.exe (FtpCommandW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741494)
[Address] EAT @explorer.exe (FtpCreateDirectoryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73DA4C)
[Address] EAT @explorer.exe (FtpCreateDirectoryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741630)
[Address] EAT @explorer.exe (FtpDeleteFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73DAEC)
[Address] EAT @explorer.exe (FtpDeleteFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741798)
[Address] EAT @explorer.exe (FtpFindFirstFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73DB8C)
[Address] EAT @explorer.exe (FtpFindFirstFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741900)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73DDF8)
[Address] EAT @explorer.exe (FtpGetCurrentDirectoryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741AD8)
[Address] EAT @explorer.exe (FtpGetFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73DEB8)
[Address] EAT @explorer.exe (FtpGetFileEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741C60)
[Address] EAT @explorer.exe (FtpGetFileSize) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E0DC)
[Address] EAT @explorer.exe (FtpGetFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741DF4)
[Address] EAT @explorer.exe (FtpOpenFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E36C)
[Address] EAT @explorer.exe (FtpOpenFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741EF8)
[Address] EAT @explorer.exe (FtpPutFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E44C)
[Address] EAT @explorer.exe (FtpPutFileEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE741F88)
[Address] EAT @explorer.exe (FtpPutFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7420EC)
[Address] EAT @explorer.exe (FtpRemoveDirectoryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E7CC)
[Address] EAT @explorer.exe (FtpRemoveDirectoryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7421C0)
[Address] EAT @explorer.exe (FtpRenameFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E86C)
[Address] EAT @explorer.exe (FtpRenameFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74231C)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73E920)
[Address] EAT @explorer.exe (FtpSetCurrentDirectoryW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74253C)
[Address] EAT @explorer.exe (GetProxyDllInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE728D3C)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793868)
[Address] EAT @explorer.exe (GetUrlCacheConfigInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6973F4)
[Address] EAT @explorer.exe (GetUrlCacheEntryBinaryBlob) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE68B510)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793B04)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793CBC)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67AB20)
[Address] EAT @explorer.exe (GetUrlCacheEntryInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE679C80)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE793F04)
[Address] EAT @explorer.exe (GetUrlCacheGroupAttributeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE79416C)
[Address] EAT @explorer.exe (GetUrlCacheHeaderData) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6436A0)
[Address] EAT @explorer.exe (GopherCreateLocatorA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherCreateLocatorW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherFindFirstFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherFindFirstFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherGetAttributeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherGetAttributeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherGetLocatorTypeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherGetLocatorTypeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherOpenFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (GopherOpenFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (HttpAddRequestHeadersA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE63C8C0)
[Address] EAT @explorer.exe (HttpAddRequestHeadersW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE642A20)
[Address] EAT @explorer.exe (HttpCheckDavCompliance) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE755078)
[Address] EAT @explorer.exe (HttpCloseDependencyHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67BD00)
[Address] EAT @explorer.exe (HttpDuplicateDependencyHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67BE60)
[Address] EAT @explorer.exe (HttpEndRequestA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6756C0)
[Address] EAT @explorer.exe (HttpEndRequestW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE755714)
[Address] EAT @explorer.exe (HttpGetServerCredentials) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE76D5FC)
[Address] EAT @explorer.exe (HttpGetTunnelSocket) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE737BD4)
[Address] EAT @explorer.exe (HttpOpenDependencyHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE686090)
[Address] EAT @explorer.exe (HttpOpenRequestA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE755D6C)
[Address] EAT @explorer.exe (HttpOpenRequestW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE63ABE0)
[Address] EAT @explorer.exe (HttpPushClose) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7388B4)
[Address] EAT @explorer.exe (HttpPushEnable) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE738964)
[Address] EAT @explorer.exe (HttpPushWait) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7389BC)
[Address] EAT @explorer.exe (HttpQueryInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE63F8B0)
[Address] EAT @explorer.exe (HttpQueryInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE64F3A0)
[Address] EAT @explorer.exe (HttpSendRequestA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D2A14)
[Address] EAT @explorer.exe (HttpSendRequestExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE755814)
[Address] EAT @explorer.exe (HttpSendRequestExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6754A4)
[Address] EAT @explorer.exe (HttpSendRequestW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE64287C)
[Address] EAT @explorer.exe (HttpWebSocketClose) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE765E40)
[Address] EAT @explorer.exe (HttpWebSocketCompleteUpgrade) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7663CC)
[Address] EAT @explorer.exe (HttpWebSocketQueryCloseStatus) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE765F88)
[Address] EAT @explorer.exe (HttpWebSocketReceive) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE766878)
[Address] EAT @explorer.exe (HttpWebSocketSend) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE766DBC)
[Address] EAT @explorer.exe (HttpWebSocketShutdown) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE76707C)
[Address] EAT @explorer.exe (IncrementUrlCacheHeaderData) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6604A4)
[Address] EAT @explorer.exe (InternetAlgIdToStringA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772440)
[Address] EAT @explorer.exe (InternetAlgIdToStringW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772618)
[Address] EAT @explorer.exe (InternetAttemptConnect) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72CC48)
[Address] EAT @explorer.exe (InternetAutodial) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE731EF0)
[Address] EAT @explorer.exe (InternetAutodialCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72955C)
[Address] EAT @explorer.exe (InternetAutodialHangup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE731F88)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72CCB0)
[Address] EAT @explorer.exe (InternetCanonicalizeUrlW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E0CC)
[Address] EAT @explorer.exe (InternetCheckConnectionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72CDBC)
[Address] EAT @explorer.exe (InternetCheckConnectionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E1DC)
[Address] EAT @explorer.exe (InternetClearAllPerSiteCookieDecisions) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7567F8)
[Address] EAT @explorer.exe (InternetCloseHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE638400)
[Address] EAT @explorer.exe (InternetCombineUrlA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D288)
[Address] EAT @explorer.exe (InternetCombineUrlW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE634DA8)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossing) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7733E4)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7733E4)
[Address] EAT @explorer.exe (InternetConfirmZoneCrossingW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6CFA00)
[Address] EAT @explorer.exe (InternetConnectA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D3A0)
[Address] EAT @explorer.exe (InternetConnectW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE641460)
[Address] EAT @explorer.exe (InternetCrackUrlA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE65C300)
[Address] EAT @explorer.exe (InternetCrackUrlW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE691DD0)
[Address] EAT @explorer.exe (InternetCreateUrlA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D4CC)
[Address] EAT @explorer.exe (InternetCreateUrlW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE634880)
[Address] EAT @explorer.exe (InternetDial) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732018)
[Address] EAT @explorer.exe (InternetDialA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732018)
[Address] EAT @explorer.exe (InternetDialW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7320D0)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE756804)
[Address] EAT @explorer.exe (InternetEnumPerSiteCookieDecisionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE75686C)
[Address] EAT @explorer.exe (InternetErrorDlg) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE77349C)
[Address] EAT @explorer.exe (InternetFindNextFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE740DF0)
[Address] EAT @explorer.exe (InternetFindNextFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE743160)
[Address] EAT @explorer.exe (InternetFortezzaCommand) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE738A14)
[Address] EAT @explorer.exe (InternetFreeCookies) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE671254)
[Address] EAT @explorer.exe (InternetFreeProxyInfoList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6A3098)
[Address] EAT @explorer.exe (InternetGetCertByURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6121A8)
[Address] EAT @explorer.exe (InternetGetCertByURLA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6121A8)
[Address] EAT @explorer.exe (InternetGetConnectedState) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE633FF0)
[Address] EAT @explorer.exe (InternetGetConnectedStateEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D61B4)
[Address] EAT @explorer.exe (InternetGetConnectedStateExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D61B4)
[Address] EAT @explorer.exe (InternetGetConnectedStateExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6512A4)
[Address] EAT @explorer.exe (InternetGetCookieA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757B40)
[Address] EAT @explorer.exe (InternetGetCookieEx2) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE671224)
[Address] EAT @explorer.exe (InternetGetCookieExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757B64)
[Address] EAT @explorer.exe (InternetGetCookieExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67126C)
[Address] EAT @explorer.exe (InternetGetCookieW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757E70)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D564)
[Address] EAT @explorer.exe (InternetGetLastResponseInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E2D0)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE756950)
[Address] EAT @explorer.exe (InternetGetPerSiteCookieDecisionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7569A0)
[Address] EAT @explorer.exe (InternetGetProxyForUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6A2DE0)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D704)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D704)
[Address] EAT @explorer.exe (InternetGetSecurityInfoByURLW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E48C)
[Address] EAT @explorer.exe (InternetGoOnline) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73217C)
[Address] EAT @explorer.exe (InternetGoOnlineA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE73217C)
[Address] EAT @explorer.exe (InternetGoOnlineW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732220)
[Address] EAT @explorer.exe (InternetHangUp) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7322B8)
[Address] EAT @explorer.exe (InternetInitializeAutoProxyDll) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE62A100)
[Address] EAT @explorer.exe (InternetLockRequestFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67B8D0)
[Address] EAT @explorer.exe (InternetOpenA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6546D0)
[Address] EAT @explorer.exe (InternetOpenUrlA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D81C)
[Address] EAT @explorer.exe (InternetOpenUrlW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E590)
[Address] EAT @explorer.exe (InternetOpenW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE654540)
[Address] EAT @explorer.exe (InternetQueryDataAvailable) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE630660)
[Address] EAT @explorer.exe (InternetQueryFortezzaStatus) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE738A74)
[Address] EAT @explorer.exe (InternetQueryOptionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE636F40)
[Address] EAT @explorer.exe (InternetQueryOptionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6374F0)
[Address] EAT @explorer.exe (InternetReadFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6501F0)
[Address] EAT @explorer.exe (InternetReadFileExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE686D90)
[Address] EAT @explorer.exe (InternetReadFileExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE686D00)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7727F0)
[Address] EAT @explorer.exe (InternetSecurityProtocolToStringW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772960)
[Address] EAT @explorer.exe (InternetSetCookieA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757E90)
[Address] EAT @explorer.exe (InternetSetCookieEx2) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757EB8)
[Address] EAT @explorer.exe (InternetSetCookieExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757F18)
[Address] EAT @explorer.exe (InternetSetCookieExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE65BDA0)
[Address] EAT @explorer.exe (InternetSetCookieW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE757FBC)
[Address] EAT @explorer.exe (InternetSetDialState) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732338)
[Address] EAT @explorer.exe (InternetSetDialStateA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732338)
[Address] EAT @explorer.exe (InternetSetDialStateW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE732390)
[Address] EAT @explorer.exe (InternetSetFilePointer) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D763C)
[Address] EAT @explorer.exe (InternetSetOptionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE635EB0)
[Address] EAT @explorer.exe (InternetSetOptionExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72EBA4)
[Address] EAT @explorer.exe (InternetSetOptionExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72ECA0)
[Address] EAT @explorer.exe (InternetSetOptionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE636370)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE756A38)
[Address] EAT @explorer.exe (InternetSetPerSiteCookieDecisionW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE756AD0)
[Address] EAT @explorer.exe (InternetSetStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6564B0)
[Address] EAT @explorer.exe (InternetSetStatusCallbackA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6564B0)
[Address] EAT @explorer.exe (InternetSetStatusCallbackW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE69B9BC)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D8B0)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72D8B0)
[Address] EAT @explorer.exe (InternetShowSecurityInfoByURLW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE72E73C)
[Address] EAT @explorer.exe (InternetTimeFromSystemTime) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE687860)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE687860)
[Address] EAT @explorer.exe (InternetTimeFromSystemTimeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6ED9A8)
[Address] EAT @explorer.exe (InternetTimeToSystemTime) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D3590)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D3590)
[Address] EAT @explorer.exe (InternetTimeToSystemTimeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D34C0)
[Address] EAT @explorer.exe (InternetUnlockRequestFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE67B644)
[Address] EAT @explorer.exe (InternetWriteFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE675760)
[Address] EAT @explorer.exe (InternetWriteFileExA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (InternetWriteFileExW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (IsHostInProxyBypassList) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE659E94)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7943A0)
[Address] EAT @explorer.exe (IsUrlCacheEntryExpiredW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D73E4)
[Address] EAT @explorer.exe (LoadUrlCacheContent) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE74A424)
[Address] EAT @explorer.exe (ParseX509EncodedCertificateForListBoxEntry) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772AD0)
[Address] EAT @explorer.exe (PrivacyGetZonePreferenceW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE65D40C)
[Address] EAT @explorer.exe (PrivacySetZonePreferenceW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6CCF94)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStream) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6746E4)
[Address] EAT @explorer.exe (ReadUrlCacheEntryStreamEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7944F0)
[Address] EAT @explorer.exe (RegisterUrlCacheNotification) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE612A20)
[Address] EAT @explorer.exe (ResumeSuspendedDownload) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7313F8)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794600)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7947DC)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7949B4)
[Address] EAT @explorer.exe (RetrieveUrlCacheEntryStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D5FD0)
[Address] EAT @explorer.exe (RunOnceUrlCache) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6121A8)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794BB8)
[Address] EAT @explorer.exe (SetUrlCacheConfigInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794CEC)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroup) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794DEC)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794DEC)
[Address] EAT @explorer.exe (SetUrlCacheEntryGroupW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6589B0)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE668EE8)
[Address] EAT @explorer.exe (SetUrlCacheEntryInfoW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE794FB8)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795174)
[Address] EAT @explorer.exe (SetUrlCacheGroupAttributeW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795364)
[Address] EAT @explorer.exe (SetUrlCacheHeaderData) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795524)
[Address] EAT @explorer.exe (ShowCertificate) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772AD0)
[Address] EAT @explorer.exe (ShowClientAuthCerts) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772AD0)
[Address] EAT @explorer.exe (ShowSecurityInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772AF0)
[Address] EAT @explorer.exe (ShowX509EncodedCertificate) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE772C80)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795644)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795644)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE79577C)
[Address] EAT @explorer.exe (UnlockUrlCacheEntryStream) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE69FA10)
[Address] EAT @explorer.exe (UpdateUrlCacheContentPath) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7958BC)
[Address] EAT @explorer.exe (UrlCacheCheckEntriesExist) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE7959DC)
[Address] EAT @explorer.exe (UrlCacheCloseEntryHandle) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795A34)
[Address] EAT @explorer.exe (UrlCacheContainerSetEntryMaximumAge) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795A80)
[Address] EAT @explorer.exe (UrlCacheCreateContainer) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE61EC5C)
[Address] EAT @explorer.exe (UrlCacheFindFirstEntry) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE698948)
[Address] EAT @explorer.exe (UrlCacheFindNextEntry) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6D8A90)
[Address] EAT @explorer.exe (UrlCacheFreeEntryInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE6A0A60)
[Address] EAT @explorer.exe (UrlCacheGetContentPaths) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795AD8)
[Address] EAT @explorer.exe (UrlCacheGetEntryInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE68C358)
[Address] EAT @explorer.exe (UrlCacheGetGlobalLimit) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795B30)
[Address] EAT @explorer.exe (UrlCacheReadEntryStream) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795B88)
[Address] EAT @explorer.exe (UrlCacheReloadSettings) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795BE8)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryFile) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795C40)
[Address] EAT @explorer.exe (UrlCacheRetrieveEntryStream) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795C98)
[Address] EAT @explorer.exe (UrlCacheSetGlobalLimit) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE795CF8)
[Address] EAT @explorer.exe (UrlCacheUpdateEntryExtraData) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE682E78)
[Address] EAT @explorer.exe (UrlZonesDetach) : imagehlp.dll -> HOOKED (C:\Windows\system32\WININET.dll @ 0xFE76D998)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection :  ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
 
 
127.0.0.1 localhost
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST375052 8AS SCSI Disk Device +++++
--- User ---
[MBR] ffe92881260ba0585a4e6a6dcc7e7322
[bSP] 9e1327df3d3a2abe1dacc94c2e5402ee : Acer MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 15360 MB
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 31459328 | Size: 100 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 31664128 | Size: 699942 MB
User = LL1 ... OK!
Error reading LL2 MBR! ([0x1] Incorrect function. )
 
+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ USB) Generic Compact Flash USB Device +++++
Error reading User MBR! ([0x15] The device is not ready. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ USB) Generic SD/MMC USB Device +++++
Error reading User MBR! ([0x15] The device is not ready. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
+++++ PhysicalDrive3: (\\.\PHYSICALDRIVE3 @ USB) Generic microSD USB Device +++++
Error reading User MBR! ([0x15] The device is not ready. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
+++++ PhysicalDrive4: (\\.\PHYSICALDRIVE4 @ USB) Generic MS/MS-PRO USB Device +++++
Error reading User MBR! ([0x15] The device is not ready. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
+++++ PhysicalDrive5: (\\.\PHYSICALDRIVE5 @ USB) Generic SM/xD-Picture USB Device +++++
Error reading User MBR! ([0x15] The device is not ready. )
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
+++++ PhysicalDrive6: (\\.\PHYSICALDRIVE6 @ USB) PNY USB 2.0 FD USB Device +++++
--- User ---
[MBR] 2b4d681ebbcb82be2958055edccbd202
[bSP] 33a07a59d299ab4ea9f4ab0156f9d86f : Windows XP MBR Code
Partition table:
0 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 56 | Size: 7788 MB
User = LL1 ... OK!
Error reading LL2 MBR! ([0x32] The request is not supported. )
 
Finished : << RKreport[0]_S_03302014_162122.txt >>
 
 
 
 
Link to post
Share on other sites

  • 3 weeks later...
  • Root Admin

It's difficult to say for sure as hooks are normal depending on what is running on the system and why.  The fact of hooking itself does not mean that it's malicious.

 

Normally we run a process of scans to ensure that the computer is not infected.  Many times during this process and restarts the hooking will go away or sometimes an infection is found and it's removal will then stop the hooking.

 

Best to seek help if you're having issues just to make sure.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.