1 strana
RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail :
http://www.adlice.com/contact/Podpora :
http://forum.adlice.comWebové stránky :
http://www.adlice.com/softwares/roguekiller/ :
http://www.adlice.comOperační systém : Windows 8 (6.2.9200 ) 64 bits version
Spuštěno v : Normální režim
Uživatel : ASUS [Práva správce]
Mód : Odebrat -- Datum : 04/06/2014 10:26:21
| ARK || FAK || MBR |
¤¤¤ Škodlivé procesy: : 0 ¤¤¤
¤¤¤ ¤¤¤ Záznamy Registrů: : 6 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)
¤¤¤ naplánované úlohy : 0 ¤¤¤
¤¤¤ spuštění položky : 0 ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Zvláštní soubory / Složky: ¤¤¤
¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (AssocCreate) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73B20)
[Address] EAT @explorer.exe (AssocGetPerceivedType) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF74940)
[Address] EAT @explorer.exe (AssocIsDangerous) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8CFBC)
[Address] EAT @explorer.exe (AssocQueryKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A870)
[Address] EAT @explorer.exe (AssocQueryKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73A20)
[Address] EAT @explorer.exe (AssocQueryStringA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8E60C)
[Address] EAT @explorer.exe (AssocQueryStringByKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8E440)
[Address] EAT @explorer.exe (AssocQueryStringByKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF741A0)
[Address] EAT @explorer.exe (AssocQueryStringW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF79CC0)
[Address] EAT @explorer.exe (ChrCmpIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A03C)
[Address] EAT @explorer.exe (ChrCmpIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A02C)
[Address] EAT @explorer.exe (ColorAdjustLuma) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F7A8)
[Address] EAT @explorer.exe (ColorHLSToRGB) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7BFF0)
[Address] EAT @explorer.exe (ColorRGBToHLS) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7BF30)
[Address] EAT @explorer.exe (ConnectToConnectionPoint) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF742B0)
[Address] EAT @explorer.exe (DelayLoadFailureHook) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F8F0)
[Address] EAT @explorer.exe (DllGetClassObject) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9D448)
[Address] EAT @explorer.exe (DllGetVersion) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF85AE0)
[Address] EAT @explorer.exe (GUIDFromStringW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7F786)
[Address] EAT @explorer.exe (GetAcceptLanguagesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF897D0)
[Address] EAT @explorer.exe (GetAcceptLanguagesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75A40)
[Address] EAT @explorer.exe (GetMenuPosFromID) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75A60)
[Address] EAT @explorer.exe (HashData) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF897C0)
[Address] EAT @explorer.exe (IStream_Copy) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A1A0)
[Address] EAT @explorer.exe (IStream_Read) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72B80)
[Address] EAT @explorer.exe (IStream_ReadPidl) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF79980)
[Address] EAT @explorer.exe (IStream_ReadStr) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71120)
[Address] EAT @explorer.exe (IStream_Reset) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76340)
[Address] EAT @explorer.exe (IStream_Size) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A180)
[Address] EAT @explorer.exe (IStream_Write) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76320)
[Address] EAT @explorer.exe (IStream_WritePidl) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9F194)
[Address] EAT @explorer.exe (IStream_WriteStr) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76350)
[Address] EAT @explorer.exe (IUnknown_AtomicRelease) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A09C)
[Address] EAT @explorer.exe (IUnknown_Exec) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75B80)
[Address] EAT @explorer.exe (IUnknown_GetSite) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF760B0)
[Address] EAT @explorer.exe (IUnknown_GetWindow) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72D20)
[Address] EAT @explorer.exe (IUnknown_QueryService) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73300)
[Address] EAT @explorer.exe (IUnknown_QueryStatus) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9BBA8)
[Address] EAT @explorer.exe (IUnknown_Set) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71130)
[Address] EAT @explorer.exe (IUnknown_SetSite) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73310)
[Address] EAT @explorer.exe (IntlStrEqWorkerA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E3C)
[Address] EAT @explorer.exe (IntlStrEqWorkerW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E2C)
[Address] EAT @explorer.exe (IsCharSpaceA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A80)
[Address] EAT @explorer.exe (IsCharSpaceW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71140)
[Address] EAT @explorer.exe (IsInternetESCEnabled) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF897B0)
[Address] EAT @explorer.exe (IsOS) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72B60)
[Address] EAT @explorer.exe (MLFreeLibrary) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF99EF4)
[Address] EAT @explorer.exe (MLLoadLibraryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF99F48)
[Address] EAT @explorer.exe (MLLoadLibraryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF99FA8)
[Address] EAT @explorer.exe (ParseURLA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF897A0)
[Address] EAT @explorer.exe (ParseURLW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7C250)
[Address] EAT @explorer.exe (PathAddBackslashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B2C)
[Address] EAT @explorer.exe (PathAddBackslashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73C00)
[Address] EAT @explorer.exe (PathAddExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CCC)
[Address] EAT @explorer.exe (PathAddExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CBC)
[Address] EAT @explorer.exe (PathAppendA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CAC)
[Address] EAT @explorer.exe (PathAppendW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75A10)
[Address] EAT @explorer.exe (PathBuildRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A05C)
[Address] EAT @explorer.exe (PathBuildRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A06C)
[Address] EAT @explorer.exe (PathCanonicalizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C9C)
[Address] EAT @explorer.exe (PathCanonicalizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72CF0)
[Address] EAT @explorer.exe (PathCombineA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B5C)
[Address] EAT @explorer.exe (PathCombineW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73C10)
[Address] EAT @explorer.exe (PathCommonPrefixA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89DAC)
[Address] EAT @explorer.exe (PathCommonPrefixW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D9C)
[Address] EAT @explorer.exe (PathCompactPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8AF90)
[Address] EAT @explorer.exe (PathCompactPathExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8AD80)
[Address] EAT @explorer.exe (PathCompactPathExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76530)
[Address] EAT @explorer.exe (PathCompactPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8EB08)
[Address] EAT @explorer.exe (PathCreateFromUrlA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89790)
[Address] EAT @explorer.exe (PathCreateFromUrlAlloc) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89780)
[Address] EAT @explorer.exe (PathCreateFromUrlW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF736E0)
[Address] EAT @explorer.exe (PathFileExistsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C0C)
[Address] EAT @explorer.exe (PathFileExistsAndAttributesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75930)
[Address] EAT @explorer.exe (PathFileExistsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73690)
[Address] EAT @explorer.exe (PathFindExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C3C)
[Address] EAT @explorer.exe (PathFindExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710C0)
[Address] EAT @explorer.exe (PathFindFileNameA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BFC)
[Address] EAT @explorer.exe (PathFindFileNameW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71090)
[Address] EAT @explorer.exe (PathFindNextComponentA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89AE0)
[Address] EAT @explorer.exe (PathFindNextComponentW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A210)
[Address] EAT @explorer.exe (PathFindOnPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8B610)
[Address] EAT @explorer.exe (PathFindOnPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF79170)
[Address] EAT @explorer.exe (PathFindSuffixArrayA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8B534)
[Address] EAT @explorer.exe (PathFindSuffixArrayW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF753D0)
[Address] EAT @explorer.exe (PathGetArgsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8962C)
[Address] EAT @explorer.exe (PathGetArgsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7C880)
[Address] EAT @explorer.exe (PathGetCharTypeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89648)
[Address] EAT @explorer.exe (PathGetCharTypeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76480)
[Address] EAT @explorer.exe (PathGetDriveNumberA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D5C)
[Address] EAT @explorer.exe (PathGetDriveNumberW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71050)
[Address] EAT @explorer.exe (PathIsContentTypeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8ABAC)
[Address] EAT @explorer.exe (PathIsContentTypeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A2C0)
[Address] EAT @explorer.exe (PathIsDirectoryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8B404)
[Address] EAT @explorer.exe (PathIsDirectoryEmptyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8B334)
[Address] EAT @explorer.exe (PathIsDirectoryEmptyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8EE78)
[Address] EAT @explorer.exe (PathIsDirectoryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF754D0)
[Address] EAT @explorer.exe (PathIsFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D6C)
[Address] EAT @explorer.exe (PathIsFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76200)
[Address] EAT @explorer.exe (PathIsLFNFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CFC)
[Address] EAT @explorer.exe (PathIsLFNFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CEC)
[Address] EAT @explorer.exe (PathIsNetworkPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A07C)
[Address] EAT @explorer.exe (PathIsNetworkPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF729A0)
[Address] EAT @explorer.exe (PathIsPrefixA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D8C)
[Address] EAT @explorer.exe (PathIsPrefixW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D7C)
[Address] EAT @explorer.exe (PathIsRelativeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D4C)
[Address] EAT @explorer.exe (PathIsRelativeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73680)
[Address] EAT @explorer.exe (PathIsRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C8C)
[Address] EAT @explorer.exe (PathIsRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72CE0)
[Address] EAT @explorer.exe (PathIsSameRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D1C)
[Address] EAT @explorer.exe (PathIsSameRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D0C)
[Address] EAT @explorer.exe (PathIsSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A834)
[Address] EAT @explorer.exe (PathIsSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8E948)
[Address] EAT @explorer.exe (PathIsUNCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B3C)
[Address] EAT @explorer.exe (PathIsUNCServerA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C1C)
[Address] EAT @explorer.exe (PathIsUNCServerShareA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C2C)
[Address] EAT @explorer.exe (PathIsUNCServerShareW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E60)
[Address] EAT @explorer.exe (PathIsUNCServerW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E70)
[Address] EAT @explorer.exe (PathIsUNCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71040)
[Address] EAT @explorer.exe (PathIsURLA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89770)
[Address] EAT @explorer.exe (PathIsURLW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF736C0)
[Address] EAT @explorer.exe (PathMakePrettyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8BCB0)
[Address] EAT @explorer.exe (PathMakePrettyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF79FC0)
[Address] EAT @explorer.exe (PathMakeSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A8C0)
[Address] EAT @explorer.exe (PathMakeSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71270)
[Address] EAT @explorer.exe (PathMatchSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BAC)
[Address] EAT @explorer.exe (PathMatchSpecExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B8C)
[Address] EAT @explorer.exe (PathMatchSpecExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B7C)
[Address] EAT @explorer.exe (PathMatchSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B9C)
[Address] EAT @explorer.exe (PathParseIconLocationA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BEC)
[Address] EAT @explorer.exe (PathParseIconLocationW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E20)
[Address] EAT @explorer.exe (PathQuoteSpacesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BCC)
[Address] EAT @explorer.exe (PathQuoteSpacesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72D00)
[Address] EAT @explorer.exe (PathRelativePathToA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B14)
[Address] EAT @explorer.exe (PathRelativePathToW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89AF4)
[Address] EAT @explorer.exe (PathRemoveArgsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8BC74)
[Address] EAT @explorer.exe (PathRemoveArgsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76450)
[Address] EAT @explorer.exe (PathRemoveBackslashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89CDC)
[Address] EAT @explorer.exe (PathRemoveBackslashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73730)
[Address] EAT @explorer.exe (PathRemoveBlanksA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BBC)
[Address] EAT @explorer.exe (PathRemoveBlanksW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73BD0)
[Address] EAT @explorer.exe (PathRemoveExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C7C)
[Address] EAT @explorer.exe (PathRemoveExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E30)
[Address] EAT @explorer.exe (PathRemoveFileSpecA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B4C)
[Address] EAT @explorer.exe (PathRemoveFileSpecW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF74040)
[Address] EAT @explorer.exe (PathRenameExtensionA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C6C)
[Address] EAT @explorer.exe (PathRenameExtensionW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C5C)
[Address] EAT @explorer.exe (PathSearchAndQualifyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8961C)
[Address] EAT @explorer.exe (PathSearchAndQualifyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72E00)
[Address] EAT @explorer.exe (PathSetDlgItemPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8AC50)
[Address] EAT @explorer.exe (PathSetDlgItemPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8E9D0)
[Address] EAT @explorer.exe (PathSkipRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D2C)
[Address] EAT @explorer.exe (PathSkipRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75A20)
[Address] EAT @explorer.exe (PathStripPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89D3C)
[Address] EAT @explorer.exe (PathStripPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76220)
[Address] EAT @explorer.exe (PathStripToRootA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89C4C)
[Address] EAT @explorer.exe (PathStripToRootW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E50)
[Address] EAT @explorer.exe (PathUnExpandEnvStringsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89B6C)
[Address] EAT @explorer.exe (PathUnExpandEnvStringsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72DF0)
[Address] EAT @explorer.exe (PathUndecorateA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A75C)
[Address] EAT @explorer.exe (PathUndecorateW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF764D0)
[Address] EAT @explorer.exe (PathUnmakeSystemFolderA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A86C)
[Address] EAT @explorer.exe (PathUnmakeSystemFolderW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8E984)
[Address] EAT @explorer.exe (PathUnquoteSpacesA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89BDC)
[Address] EAT @explorer.exe (PathUnquoteSpacesW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73BE0)
[Address] EAT @explorer.exe (QISearch) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71010)
[Address] EAT @explorer.exe (SHAllocShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF729D0)
[Address] EAT @explorer.exe (SHAnsiToAnsi) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A310)
[Address] EAT @explorer.exe (SHAnsiToUnicode) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A320)
[Address] EAT @explorer.exe (SHAutoComplete) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7BE10)
[Address] EAT @explorer.exe (SHCopyKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A2F0)
[Address] EAT @explorer.exe (SHCopyKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A070)
[Address] EAT @explorer.exe (SHCreateMemStream) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF732B0)
[Address] EAT @explorer.exe (SHCreateShellPalette) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72890)
[Address] EAT @explorer.exe (SHCreateStreamOnFileA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0DC)
[Address] EAT @explorer.exe (SHCreateStreamOnFileEx) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76070)
[Address] EAT @explorer.exe (SHCreateStreamOnFileW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF764A0)
[Address] EAT @explorer.exe (SHCreateStreamWrapper) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7F792)
[Address] EAT @explorer.exe (SHCreateThread) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75E80)
[Address] EAT @explorer.exe (SHCreateThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75B30)
[Address] EAT @explorer.exe (SHCreateThreadWithHandle) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76400)
[Address] EAT @explorer.exe (SHDeleteEmptyKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0FC)
[Address] EAT @explorer.exe (SHDeleteEmptyKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0EC)
[Address] EAT @explorer.exe (SHDeleteKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A2E0)
[Address] EAT @explorer.exe (SHDeleteKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72C60)
[Address] EAT @explorer.exe (SHDeleteOrphanKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9EFB8)
[Address] EAT @explorer.exe (SHDeleteOrphanKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9EF48)
[Address] EAT @explorer.exe (SHDeleteValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A10C)
[Address] EAT @explorer.exe (SHDeleteValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72CA0)
[Address] EAT @explorer.exe (SHEnumKeyExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A290)
[Address] EAT @explorer.exe (SHEnumKeyExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A280)
[Address] EAT @explorer.exe (SHEnumValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A250)
[Address] EAT @explorer.exe (SHEnumValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A1D0)
[Address] EAT @explorer.exe (SHFormatDateTimeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F004)
[Address] EAT @explorer.exe (SHFormatDateTimeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F070)
[Address] EAT @explorer.exe (SHFreeShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF729E0)
[Address] EAT @explorer.exe (SHGetInverseCMAP) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF90830)
[Address] EAT @explorer.exe (SHGetThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF79140)
[Address] EAT @explorer.exe (SHGetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF743C0)
[Address] EAT @explorer.exe (SHGetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72B20)
[Address] EAT @explorer.exe (SHGetViewStatePropertyBag) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76FA0)
[Address] EAT @explorer.exe (SHIsChildOrSelf) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73510)
[Address] EAT @explorer.exe (SHIsLowMemoryMachine) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9BC3C)
[Address] EAT @explorer.exe (SHLoadIndirectString) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73340)
[Address] EAT @explorer.exe (SHLockShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9F838)
[Address] EAT @explorer.exe (SHMessageBoxCheckA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9ADD4)
[Address] EAT @explorer.exe (SHMessageBoxCheckW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9AF00)
[Address] EAT @explorer.exe (SHOpenRegStream2A) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0AC)
[Address] EAT @explorer.exe (SHOpenRegStream2W) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF743F0)
[Address] EAT @explorer.exe (SHOpenRegStreamA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0CC)
[Address] EAT @explorer.exe (SHOpenRegStreamW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A0BC)
[Address] EAT @explorer.exe (SHPackDispParamsV) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF77DB0)
[Address] EAT @explorer.exe (SHPropertyBag_ReadStrAlloc) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EFA1598)
[Address] EAT @explorer.exe (SHPropertyBag_WriteBSTR) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EFA1498)
[Address] EAT @explorer.exe (SHQueryInfoKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A230)
[Address] EAT @explorer.exe (SHQueryInfoKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A210)
[Address] EAT @explorer.exe (SHQueryValueExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A120)
[Address] EAT @explorer.exe (SHQueryValueExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF763A0)
[Address] EAT @explorer.exe (SHRegCloseUSKey) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A70)
[Address] EAT @explorer.exe (SHRegCreateUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A58)
[Address] EAT @explorer.exe (SHRegCreateUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72640)
[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A44)
[Address] EAT @explorer.exe (SHRegDeleteEmptyUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A34)
[Address] EAT @explorer.exe (SHRegDeleteUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A24)
[Address] EAT @explorer.exe (SHRegDeleteUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89A14)
[Address] EAT @explorer.exe (SHRegDuplicateHKey) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A1F0)
[Address] EAT @explorer.exe (SHRegEnumUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF899FC)
[Address] EAT @explorer.exe (SHRegEnumUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF899DC)
[Address] EAT @explorer.exe (SHRegEnumUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89998)
[Address] EAT @explorer.exe (SHRegEnumUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72590)
[Address] EAT @explorer.exe (SHRegGetBoolUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89984)
[Address] EAT @explorer.exe (SHRegGetBoolUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7C220)
[Address] EAT @explorer.exe (SHRegGetBoolValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76330)
[Address] EAT @explorer.exe (SHRegGetIntW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A1E0)
[Address] EAT @explorer.exe (SHRegGetPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A1C0)
[Address] EAT @explorer.exe (SHRegGetPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A240)
[Address] EAT @explorer.exe (SHRegGetUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89948)
[Address] EAT @explorer.exe (SHRegGetUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A280)
[Address] EAT @explorer.exe (SHRegGetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A2A4)
[Address] EAT @explorer.exe (SHRegGetValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76EBC)
[Address] EAT @explorer.exe (SHRegGetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF721B0)
[Address] EAT @explorer.exe (SHRegOpenUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89928)
[Address] EAT @explorer.exe (SHRegOpenUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89908)
[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF898E0)
[Address] EAT @explorer.exe (SHRegQueryInfoUSKeyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72610)
[Address] EAT @explorer.exe (SHRegQueryUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF898A0)
[Address] EAT @explorer.exe (SHRegQueryUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89860)
[Address] EAT @explorer.exe (SHRegSetPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A1A0)
[Address] EAT @explorer.exe (SHRegSetPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A180)
[Address] EAT @explorer.exe (SHRegSetUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89838)
[Address] EAT @explorer.exe (SHRegSetUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89810)
[Address] EAT @explorer.exe (SHRegWriteUSValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF897E4)
[Address] EAT @explorer.exe (SHRegWriteUSValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF725E0)
[Address] EAT @explorer.exe (SHRegisterValidateTemplate) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EFA58E0)
[Address] EAT @explorer.exe (SHReleaseThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A08C)
[Address] EAT @explorer.exe (SHRunIndirectRegClientCommand) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8C95C)
[Address] EAT @explorer.exe (SHSendMessageBroadcastA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9A27C)
[Address] EAT @explorer.exe (SHSendMessageBroadcastW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72CC0)
[Address] EAT @explorer.exe (SHSetThreadRef) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75B10)
[Address] EAT @explorer.exe (SHSetValueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A14C)
[Address] EAT @explorer.exe (SHSetValueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF763D0)
[Address] EAT @explorer.exe (SHSkipJunction) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72E20)
[Address] EAT @explorer.exe (SHStrDupA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7A260)
[Address] EAT @explorer.exe (SHStrDupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71070)
[Address] EAT @explorer.exe (SHStripMneumonicA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9A900)
[Address] EAT @explorer.exe (SHStripMneumonicW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72DB0)
[Address] EAT @explorer.exe (SHUnicodeToAnsi) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF732E0)
[Address] EAT @explorer.exe (SHUnicodeToAnsiCP) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF7F7B9)
[Address] EAT @explorer.exe (SHUnicodeToUnicode) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8A300)
[Address] EAT @explorer.exe (SHUnlockShared) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9F818)
[Address] EAT @explorer.exe (ShellMessageBoxA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8C604)
[Address] EAT @explorer.exe (ShellMessageBoxW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F54C)
[Address] EAT @explorer.exe (StrCSpnA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89EEC)
[Address] EAT @explorer.exe (StrCSpnIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89EDC)
[Address] EAT @explorer.exe (StrCSpnIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89ECC)
[Address] EAT @explorer.exe (StrCSpnW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF75A30)
[Address] EAT @explorer.exe (StrCatBuffA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FDC)
[Address] EAT @explorer.exe (StrCatBuffW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FEC)
[Address] EAT @explorer.exe (StrCatChainW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89DCC)
[Address] EAT @explorer.exe (StrCatW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FCF8)
[Address] EAT @explorer.exe (StrChrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FCC)
[Address] EAT @explorer.exe (StrChrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F9C)
[Address] EAT @explorer.exe (StrChrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710E0)
[Address] EAT @explorer.exe (StrChrNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F8C)
[Address] EAT @explorer.exe (StrChrNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FBC)
[Address] EAT @explorer.exe (StrChrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71080)
[Address] EAT @explorer.exe (StrCmpCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89DEC)
[Address] EAT @explorer.exe (StrCmpCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72C90)
[Address] EAT @explorer.exe (StrCmpICA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71100)
[Address] EAT @explorer.exe (StrCmpICW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710F0)
[Address] EAT @explorer.exe (StrCmpIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73650)
[Address] EAT @explorer.exe (StrCmpLogicalW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89DDC)
[Address] EAT @explorer.exe (StrCmpNA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89EBC)
[Address] EAT @explorer.exe (StrCmpNCA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E0C)
[Address] EAT @explorer.exe (StrCmpNCW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89DFC)
[Address] EAT @explorer.exe (StrCmpNIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89EAC)
[Address] EAT @explorer.exe (StrCmpNICA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF760A0)
[Address] EAT @explorer.exe (StrCmpNICW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72B70)
[Address] EAT @explorer.exe (StrCmpNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73670)
[Address] EAT @explorer.exe (StrCmpNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73770)
[Address] EAT @explorer.exe (StrCmpW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710B0)
[Address] EAT @explorer.exe (StrCpyNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FFC)
[Address] EAT @explorer.exe (StrCpyW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FD38)
[Address] EAT @explorer.exe (StrDupA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E4C)
[Address] EAT @explorer.exe (StrDupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF72B50)
[Address] EAT @explorer.exe (StrFormatByteSize64A) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FC00)
[Address] EAT @explorer.exe (StrFormatByteSizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FBF4)
[Address] EAT @explorer.exe (StrFormatByteSizeEx) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF732D0)
[Address] EAT @explorer.exe (StrFormatByteSizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FC60)
[Address] EAT @explorer.exe (StrFormatKBSizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FB74)
[Address] EAT @explorer.exe (StrFormatKBSizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FBE0)
[Address] EAT @explorer.exe (StrFromTimeIntervalA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF98AC8)
[Address] EAT @explorer.exe (StrFromTimeIntervalW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF98A44)
[Address] EAT @explorer.exe (StrIsIntlEqualA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E3C)
[Address] EAT @explorer.exe (StrIsIntlEqualW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E2C)
[Address] EAT @explorer.exe (StrNCatA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FCB8)
[Address] EAT @explorer.exe (StrNCatW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FC74)
[Address] EAT @explorer.exe (StrPBrkA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F5C)
[Address] EAT @explorer.exe (StrPBrkW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF761E0)
[Address] EAT @explorer.exe (StrRChrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89FAC)
[Address] EAT @explorer.exe (StrRChrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F7C)
[Address] EAT @explorer.exe (StrRChrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F6C)
[Address] EAT @explorer.exe (StrRChrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76210)
[Address] EAT @explorer.exe (StrRStrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E9C)
[Address] EAT @explorer.exe (StrRStrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E8C)
[Address] EAT @explorer.exe (StrRetToBSTR) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF760D0)
[Address] EAT @explorer.exe (StrRetToBufA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8F9E8)
[Address] EAT @explorer.exe (StrRetToBufW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71110)
[Address] EAT @explorer.exe (StrRetToStrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8FA98)
[Address] EAT @explorer.exe (StrRetToStrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73330)
[Address] EAT @explorer.exe (StrSpnA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F0C)
[Address] EAT @explorer.exe (StrSpnW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89EFC)
[Address] EAT @explorer.exe (StrStrA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E7C)
[Address] EAT @explorer.exe (StrStrIA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF76490)
[Address] EAT @explorer.exe (StrStrIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710D0)
[Address] EAT @explorer.exe (StrStrNIW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E5C)
[Address] EAT @explorer.exe (StrStrNW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E6C)
[Address] EAT @explorer.exe (StrStrW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73660)
[Address] EAT @explorer.exe (StrToInt64ExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F2C)
[Address] EAT @explorer.exe (StrToInt64ExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F3C)
[Address] EAT @explorer.exe (StrToIntA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F4C)
[Address] EAT @explorer.exe (StrToIntExA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89F1C)
[Address] EAT @explorer.exe (StrToIntExW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF761F0)
[Address] EAT @explorer.exe (StrToIntW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF710A0)
[Address] EAT @explorer.exe (StrTrimA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89E1C)
[Address] EAT @explorer.exe (StrTrimW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73320)
[Address] EAT @explorer.exe (UrlApplySchemeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89760)
[Address] EAT @explorer.exe (UrlApplySchemeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89750)
[Address] EAT @explorer.exe (UrlCanonicalizeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89740)
[Address] EAT @explorer.exe (UrlCanonicalizeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF736B0)
[Address] EAT @explorer.exe (UrlCombineA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89728)
[Address] EAT @explorer.exe (UrlCombineW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73750)
[Address] EAT @explorer.exe (UrlCompareA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89714)
[Address] EAT @explorer.exe (UrlCompareW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89704)
[Address] EAT @explorer.exe (UrlCreateFromPathA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF896F4)
[Address] EAT @explorer.exe (UrlCreateFromPathW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73BF0)
[Address] EAT @explorer.exe (UrlEscapeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF896E4)
[Address] EAT @explorer.exe (UrlEscapeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73720)
[Address] EAT @explorer.exe (UrlFixupW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF896D4)
[Address] EAT @explorer.exe (UrlGetLocationA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF896C4)
[Address] EAT @explorer.exe (UrlGetLocationW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF896B4)
[Address] EAT @explorer.exe (UrlGetPartA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8969C)
[Address] EAT @explorer.exe (UrlGetPartW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF73700)
[Address] EAT @explorer.exe (UrlHashA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89688)
[Address] EAT @explorer.exe (UrlHashW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89678)
[Address] EAT @explorer.exe (UrlIsA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89668)
[Address] EAT @explorer.exe (UrlIsNoHistoryA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF895EC)
[Address] EAT @explorer.exe (UrlIsNoHistoryW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF71150)
[Address] EAT @explorer.exe (UrlIsOpaqueA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF8960C)
[Address] EAT @explorer.exe (UrlIsOpaqueW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF895FC)
[Address] EAT @explorer.exe (UrlIsW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF736A0)
[Address] EAT @explorer.exe (UrlUnescapeA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF89658)
[Address] EAT @explorer.exe (UrlUnescapeW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF736D0)
[Address] EAT @explorer.exe (WhichPlatform) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF9A6D0)
[Address] EAT @explorer.exe (wnsprintfA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF993AC)
[Address] EAT @explorer.exe (wnsprintfW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF99318)
[Address] EAT @explorer.exe (wvnsprintfA) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF993F8)
[Address] EAT @explorer.exe (wvnsprintfW) : urlmon.dll -> HOOKED (C:\Windows\system32\SHLWAPI.dll @ 0x3EF99368)
[Address] EAT @explorer.exe (GdipAddPathArc) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A0C868)
[Address] EAT @explorer.exe (GdipAddPathArcI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A0C7C8)
[Address] EAT @explorer.exe (GdipAddPathBezier) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F400)
[Address] EAT @explorer.exe (GdipAddPathBezierI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F31C)
[Address] EAT @explorer.exe (GdipAddPathBeziers) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F258)
[Address] EAT @explorer.exe (GdipAddPathBeziersI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F174)
[Address] EAT @explorer.exe (GdipAddPathClosedCurve) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3EAC4)
[Address] EAT @explorer.exe (GdipAddPathClosedCurve2) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E90C)
[Address] EAT @explorer.exe (GdipAddPathClosedCurve2I) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E824)
[Address] EAT @explorer.exe (GdipAddPathClosedCurveI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E9E0)
[Address] EAT @explorer.exe (GdipAddPathCurve) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F094)
[Address] EAT @explorer.exe (GdipAddPathCurve2) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3EE94)
[Address] EAT @explorer.exe (GdipAddPathCurve2I) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3ED74)
[Address] EAT @explorer.exe (GdipAddPathCurve3) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3EC90)
[Address] EAT @explorer.exe (GdipAddPathCurve3I) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3EB90)
[Address] EAT @explorer.exe (GdipAddPathCurveI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3EF78)
[Address] EAT @explorer.exe (GdipAddPathEllipse) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E3FC)
[Address] EAT @explorer.exe (GdipAddPathEllipseI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E378)
[Address] EAT @explorer.exe (GdipAddPathLine) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A0B964)
[Address] EAT @explorer.exe (GdipAddPathLine2) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F61C)
[Address] EAT @explorer.exe (GdipAddPathLine2I) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F538)
[Address] EAT @explorer.exe (GdipAddPathLineI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A0B8E0)
[Address] EAT @explorer.exe (GdipAddPathPath) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3DF7C)
[Address] EAT @explorer.exe (GdipAddPathPie) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E280)
[Address] EAT @explorer.exe (GdipAddPathPieI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E1E0)
[Address] EAT @explorer.exe (GdipAddPathPolygon) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E11C)
[Address] EAT @explorer.exe (GdipAddPathPolygonI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E038)
[Address] EAT @explorer.exe (GdipAddPathRectangle) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E730)
[Address] EAT @explorer.exe (GdipAddPathRectangleI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E6AC)
[Address] EAT @explorer.exe (GdipAddPathRectangles) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E5E8)
[Address] EAT @explorer.exe (GdipAddPathRectanglesI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3E4E8)
[Address] EAT @explorer.exe (GdipAddPathString) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3DDBC)
[Address] EAT @explorer.exe (GdipAddPathStringI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3DCD4)
[Address] EAT @explorer.exe (GdipAlloc) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x389C9ADC)
[Address] EAT @explorer.exe (GdipBeginContainer) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A2B1C4)
[Address] EAT @explorer.exe (GdipBeginContainer2) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A2B100)
[Address] EAT @explorer.exe (GdipBeginContainerI) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A2B000)
[Address] EAT @explorer.exe (GdipBitmapApplyEffect) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A32874)
[Address] EAT @explorer.exe (GdipBitmapConvertFormat) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A32B20)
[Address] EAT @explorer.exe (GdipBitmapCreateApplyEffect) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3295C)
[Address] EAT @explorer.exe (GdipBitmapGetHistogram) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3278C)
[Address] EAT @explorer.exe (GdipBitmapGetHistogramSize) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A32740)
[Address] EAT @explorer.exe (GdipBitmapGetPixel) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A32E18)
[Address] EAT @explorer.exe (GdipBitmapLockBits) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x389CC490)
[Address] EAT @explorer.exe (GdipBitmapSetPixel) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x389E31E0)
[Address] EAT @explorer.exe (GdipBitmapSetResolution) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x389E4880)
[Address] EAT @explorer.exe (GdipBitmapUnlockBits) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x389CC5C8)
[Address] EAT @explorer.exe (GdipClearPathMarkers) : ntmarta.dll -> HOOKED (C:\Windows\WinSxS\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.9200.16518_none_726fbfe0cc22f012\gdiplus.dll @ 0x38A3F848)