Fileparade bundle

mimik -  
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   -
Bonsoir, depuis quelques temps lorsque je me connecte sur internet, et notamment à youtube, mon écran est pris d'assaut par des pub. je crois que la cause de ceci est un fichier que j'ai découvert dans mon panneau de configuration, fileparade bundle, que j'ai tenté de désinstaller mais sans succès. Pouvez-vous m'aider à m'en débarrasser car je n'ai trouvé aucune solution.

84 réponses

billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

tu me diras quand c'est terminé avec les mises a jour

merci

@+
0
mimik
 
les mises à jour ont réussi :)
0
mimik
 
l'état des trois mises à jour que j'ai dû effectuer est le suivant: opération réussie :)
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

ok, refais moi 1 zhpdiag comme sur l'image >> clique ici

merci

@+
0
mimik
 
d'accord
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
mimik
 
voici le rapport:

~ Rapport de ZHPDiag v2014.3.21.22 - Nicolas Coolman (21/03/2014)
~ Lancé par myriam (22/03/2014 00:53:46)
~ Adresse du Site Web http://nicolascoolman.webs.com
~ Forums gratuits d'Assistance à la désinfection : http://nicolascoolman.webs.com/apps/links/
~ Traduit par Nicolas Coolman
~ Etat de la version :
~ Liste blanche : Activée par le programme
~ Elévation des Privilèges : OK
~ User Account Control (UAC): Deactivate by user


---\\ Navigateurs Internet
MSIE: Internet Explorer v10.0.9200.16843
GCIE: Google Chrome v33.0.1750.154 (Defaut)

---\\ Informations sur les produits Windows
~ Langage: Français
Windows 8, 64-bit (Build 9200)
Windows Server License Manager Script : OK
~ ion : Windows(R) Operating System, OEM_DM channel
Windows ID Activation : OK
~ Windows Partial Key : 6XVDQ
Windows License : OK
~ Windows Remaining Initializations Number : 999
Software Protection Service (Protection logicielle) : OK
Windows Automatic Updates : OK
Windows Activation Technologies : OK

---\\ Logiciels de protection du système
Malwarebytes Anti-Malware version 1.75.0.1300
Windows Defender W8

---\\ Logiciels d'optimisation du système

---\\ Logiciels de partage PeerToPeer

---\\ Surveillance de Logiciels

---\\ Informations sur le système
~ Processor: Intel64 Family 6 Model 55 Stepping 3, GenuineIntel
~ Operating System: 64 Bits
Boot mode: Normal (Normal boot)
Total RAM: 3945 MB (62% free)
System Restore: Activé (Enable)
System drive C: has 389 GB (85%) free of 453 GB

---\\ Mode de connexion au système
~ Computer Name: MIMI
~ User Name: myriam
~ All Users Names: myriam, Administrateur,
~ Unselected Option: None
Logged in as Administrator

---\\ Variables d'environnement
~ System Unit : C:\
~ %AppZHP% : C:\Users\myriam\AppData\Roaming\ZHP\
~ %AppData% : C:\Users\myriam\AppData\Roaming\
~ %Desktop% : C:\Users\myriam\Desktop\
~ %Favorites% : C:\Users\myriam\Favorites\
~ %LocalAppData% : C:\Users\myriam\AppData\Local\
~ %StartMenu% : C:\Users\myriam\AppData\Roaming\Microsoft\Windows\Start Menu\
~ %Windir% : C:\Windows\
~ %System% : C:\Windows\System32\

---\\ Enumération des unités disques
C: Hard drive, Flash drive, Thumb drive (Free 389 Go of 453 Go)



---\\ Etat du Centre de Sécurité Windows
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoActiveDesktopChanges: Modified
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] EnableLUA: Modified
~ Security Center: 46 Legitimates Filtered in 00mn 00s



---\\ Recherche particulière de fichiers génériques
[MD5.0E8E6463F81C80AFBED533E0F1F8895D] - (.Microsoft Corporation - Explorateur Windows.) (.01/06/2013 - 03:34:21.) -- C:\Windows\Explorer.exe [2391280]
[MD5.FE9AB232B56A12224E8A3F3F9878C9A3] - (.Microsoft Corporation - Application de démarrage de Windows.) (.25/07/2012 - 19:08:50.) -- C:\Windows\System32\Wininit.exe [132608]
[MD5.79EDF01FA13D886F8E1B655D542011FB] - (.Microsoft Corporation - Extensions Internet pour Win32.) (.23/02/2014 - 00:13:41.) -- C:\Windows\System32\wininet.dll [2241536]
[MD5.BCF2036A0DD579E47C008C133550283E] - (.Microsoft Corporation - Application d'ouverture de session Windows.) (.10/10/2012 - 21:46:58.) -- C:\Windows\System32\Winlogon.exe [517120]
[MD5.9448F5740A037EC0C18F0E9177232DD0] - (.Microsoft Corporation - Bibliothèque de licences.) (.25/07/2012 - 19:07:20.) -- C:\Windows\System32\sppcomapi.dll [273408]
[MD5.7C0E0EDF18D6CC565D7BFBB451709FA5] - (.Microsoft Corporation - Pilote de fonction connexe pour WinSock.) (.03/09/2013 - 19:11:23.) -- C:\Windows\system32\Drivers\AFD.sys [576512]
[MD5.A721FF570C2387E383BDDEA9632863C9] - (.Microsoft Corporation - ATAPI IDE Miniport Driver.) (.25/07/2012 - 21:00:48.) -- C:\Windows\system32\Drivers\atapi.sys [25840]
[MD5.990B1BABE6E81FB18E65A87EBEFB1772] - (.Microsoft Corporation - CD-ROM File System Driver.) (.25/07/2012 - 18:30:10.) -- C:\Windows\system32\Drivers\Cdfs.sys [108544]
[MD5.339BFF85D788268752DA8C9644B188EE] - (.Microsoft Corporation - SCSI CD-ROM Driver.) (.25/07/2012 - 18:26:36.) -- C:\Windows\system32\Drivers\Cdrom.sys [174080]
[MD5.431141C6859990824D17F71C30A78728] - (.Microsoft Corporation - DFS Namespace Client Driver.) (.15/01/2014 - 15:42:58.) -- C:\Windows\system32\Drivers\DfsC.sys [118784]
[MD5.7D87B5B6C7188D553E11B59DC7F0B111] - (.Microsoft Corporation - High Definition Audio Bus Driver.) (.19/09/2012 - 22:08:44.) -- C:\Windows\system32\Drivers\HDAudBus.sys [71168]
[MD5.C9E9CBF73AFFBFE3E801EFB516787BA3] - (.Microsoft Corporation - Pilote de port i8042.) (.25/07/2012 - 18:28:51.) -- C:\Windows\system32\Drivers\i8042prt.sys [112640]
[MD5.3969B9C218DD3FAA9F4ED2FFC3651C02] - (.Microsoft Corporation - IP Network Address Translator.) (.25/07/2012 - 18:23:01.) -- C:\Windows\system32\Drivers\IpNat.sys [145920]
[MD5.93179D48066918323628CB016D8C94DC] - (.Microsoft Corporation - Minirdr SMB Windows NT.) (.05/02/2013 - 14:29:09.) -- C:\Windows\system32\Drivers\MRxSmb.sys [370688]
[MD5.7CEC25C682D319D484630B3952C31A11] - (.Microsoft Corporation - MBT Transport driver.) (.25/07/2012 - 18:24:28.) -- C:\Windows\system32\Drivers\netBT.sys [331776]
[MD5.7BE3EDFFA3216F989A6BDCB14795DD08] - (.Microsoft Corporation - Pilote du système de fichiers NT.) (.26/01/2014 - 19:39:40.) -- C:\Windows\system32\Drivers\ntfs.sys [1939288]
[MD5.4563DAF8C6A740AD7F501E219BD10766] - (.Microsoft Corporation - Pilote de port parallèle.) (.25/07/2012 - 18:29:53.) -- C:\Windows\system32\Drivers\Parport.sys [105984]
[MD5.A14D625C5AEE5FFE0F47D1A1D419FAAE] - (.Microsoft Corporation - RAS L2TP mini-port/call-manager driver.) (.25/07/2012 - 18:23:17.) -- C:\Windows\system32\Drivers\Rasl2tp.sys [124928]
[MD5.B2A3AD74FF2E2FFA73AF2567108231B3] - (.Microsoft Corporation - Redirecteur de périphérique de Microsoft RDP.) (.25/07/2012 - 18:25:18.) -- C:\Windows\system32\Drivers\rdpdr.sys [179712]
[MD5.73DC722CE5DF26D7638CE2446F2655C7] - (.Microsoft Corporation - TDI Translation Driver.) (.25/07/2012 - 21:26:47.) -- C:\Windows\system32\Drivers\tdx.sys [117248]
[MD5.78A5BBA3819FFFC62FFEC3E2220D102D] - (.Microsoft Corporation - Pilote de cliché instantané du volume.) (.01/06/2013 - 03:26:33.) -- C:\Windows\system32\Drivers\volsnap.sys [327936]
~ Generic Processes: Scanned in 00mn 00s



---\\ Etat des fichiers cachés (Caché/Total)
~ Mes Favoris (My Favorites) : 1/9
~ Mes Documents (My Documents) : 2/6238
~ Mon Bureau (My Desktop) : 1/155
~ Menu demarrer (Programs) : 1/21
~ Hidden Files: Scanned in 00mn 00s



---\\ Processus lancés
[MD5.99E7D2BDB4F75A094AC73B7C98171C42] - (.Smart PC Solutions - PC Speed Maximizer Smart Scan.) -- C:\Program Files (x86)\PC Speed Maximizer\SPMSmartScan.exe [423536] [PID.3996] =>Rogue.PCSpeedMaximizer
[MD5.103E677D349674E8F49C1A08F6E3CADF] - (.Smart PC Solutions - Performance Monitor.) -- C:\Program Files (x86)\PC Speed Maximizer\SPMReminder.exe [900720] [PID.4008] =>Rogue.PCSpeedMaximizer
[MD5.9C1BDB837A2DA4FFC60CB61CEEA3E334] - (.TOSHIBA - readLM.) -- C:\Program Files (x86)\TOSHIBA\PasswordUtility\readLM.exe [2216800] [PID.2200]
[MD5.3A924B200D86590D2C83214CEBFA9742] - (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe [859976] [PID.912]
[MD5.5E3C178779730B057BA263C0D3A8EE42] - (.Nicolas Coolman - ZHPDiag.) -- C:\Program Files (x86)\ZHPDiag\ZHPDiag.exe [8250368] [PID.2612]
~ Processes Running: Scanned in 00mn 00s



---\\ Google Chrome, Démarrage,Recherche,Extensions (G0,G1,G2)
C:\Users\myriam\AppData\Local\Google\Chrome\User Data\Default\Preferences
G1 - GCS: Preference [User Data\Default] http://www.default-search.net
G0 - GCSP: Preference [User Data\Default][HomePage] http://www.default-search.net?sid=476&aid=125&itype=n&ver=11471&tm=292&src=hmp
G2 - GCE: Preference [User Data\Default] [apdfllckaahabafndbhieahigkjlhalf] Google Drive v.6.3 (Activé)
G2 - GCE: Preference [User Data\Default] [booedmolknjekdopkepjjeckmjkdpfgl] Extutil v.0.1 (Activé)
G2 - GCE: Preference [User Data\Default] [flpcjncodpafbgdpnkljologafpionhb] Managera v.0.1 (Activé)
G2 - GCE: Preference [User Data\Default] [neajdppkdcdipfabeoofebfddakdcjhd] Google Network Speech v.1.0 (Activé)
G2 - GCE: Preference [User Data\Default] [nkeimhogjdpnpccoofpliimaahmaaome] Hangout Services v.1.0 (Activé)
G2 - GCE: Preference [User Data\Default] [nmmhkkegccagdldgiimedpiccmgmieda] Google Wallet v.0.0.6.1 (Activé)
~ Google Browser: 18 Legitimates Filtered in 00mn 36s



---\\ Internet Explorer, Démarrage,Recherche,URLSearchHook, Phishing (R0,R1,R3,R4)
R0 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://start.mysearchdial.com =>Adware.MyWebSearch
R0 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://start.mysearchdial.com =>Adware.MyWebSearch
R0 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://start.mysearchdial.com =>Adware.MyWebSearch
~ IE Browser: 16 Legitimates Filtered in 00mn 00s



---\\ Internet Explorer, Proxy Management (R5)
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = no key
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyEnable = 0
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,MigrateProxy = 1
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,EnableHttp1_1 = 1
R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigProxy = wininet.dll
~ Proxy management: Scanned in 00mn 00s



---\\ Analyse des lignes F0, F1, F2, F3 - IniFiles, Autoloading programs
F2 - REG:system.ini: USERINIT=C:\Windows\system32\userinit.exe,
F2 - REG:system.ini: Shell=C:\Windows\explorer.exe
F2 - REG:system.ini: VMApplet=C:\Windows\System32\SystemPropertiesPerformance.exe
~ Keys: Scanned in 00mn 00s



---\\ Hosts file redirection (O1)
~ Le fichier hosts est sain (The hosts file is clean).
~ Hosts File: Scanned in 00mn 00s
~ Nombre de lignes (Lines number): 21



---\\ Browser Helper Objects de navigateur (O2)
O2 - BHO: mysearchdial Helper Object [64Bits] - {EF5625A3-37AB-4BDB-9875-2A3D91CD0DFD} . (.MySearchDial - Pas de description.) -- C:\Program Files (x86)\Mysearchdial\1.8.29.0\bh\mysearchdial.dll =>Adware.MyWebSearch
O2 - BHO: Lync Click to Call BHO [64Bits] - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} Clé orpheline
O2 - BHO: Linkey [64Bits] - {4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47} Clé orpheline
~ BHO: 6 Legitimates Filtered in 00mn 00s



---\\ Autres liens utilisateurs (O4)
O4 - GS\Desktop [Public]: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O4 - GS\Desktop [Public]: Le Petit Robert 2014.lnk . (...) -- C:\Program Files (x86)\Le Robert\Le Petit Robert 2014\Le Petit Robert.exe
O4 - GS\Desktop [Public]: Manual.lnk . (.TOSHIBA - Toshiba Regensburg EXternal file Launcher.) -- C:\Program Files (x86)\TOSHIBA\Manuals\TREXLauncher.exe
O4 - GS\Desktop [Public]: OpenOffice 4.0.1.lnk . (.Apache Software Foundation - OpenOffice 4.0.1.) -- C:\Program Files (x86)\OpenOffice 4\program\soffice.exe
O4 - GS\Desktop [Public]: PDF Reader.lnk . (.Krzysztof Kowalczyk - SumatraPDF.) -- C:\Program Files (x86)\PDF Reader\SumatraPDF.exe
O4 - GS\Desktop [Public]: Poursuivre l'installation de Reimage Repair .lnk . (.Reimage® - Reimage Downloader.) -- C:\Users\myriam\Downloads\ReimageRepair.exe =>Rogue.ReimageRepair
O4 - GS\Desktop [Public]: Recovery Media Creator.lnk . (.Toshiba Information Equipment(Hangzhou)Co., - TOSHIBA Recovery Media Creator Launcher.) -- C:\Program Files\TOSHIBA\TOSHIBA Recovery Media Creator\TRMCLcher.exe
O4 - GS\Program [Public]: Desktop.lnk - Clé orpheline
O4 - GS\QuickLaunch [myriam]: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O4 - GS\QuickLaunch [myriam]: Launch Internet Explorer Browser.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\TaskBar [myriam]: Desktop Assist.lnk . (...) -- C:\Program Files (x86)\TOSHIBA\TOSHIBA Desktop Assist\TosDesktopAssist.exe (.not file.)
O4 - GS\TaskBar [myriam]: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O4 - GS\TaskBar [myriam]: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\Program [myriam]: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe
O4 - GS\Program [myriam]: OneDrive.lnk . (.Microsoft Corporation - Microsoft OneDrive.) -- C:\Users\myriam\AppData\Local\Microsoft\SkyDrive\SkyDrive.exe
O4 - GS\Desktop [myriam]: PC Speed Maximizer.lnk . (.Smart PC Solutions - PC Speed Maximizer.) -- C:\Program Files (x86)\PC Speed Maximizer\PCSpeedMaximizer.exe =>Rogue.PCSpeedMaximizer
O4 - GS\Desktop [myriam]: Your Unin-staller!.lnk . (.URSoft,Inc - Your Uninstaller! - New way to uninstall pr.) -- C:\Program Files (x86)\Your Uninstaller! 7\urmain.exe
~ Global Startup: 39 Legitimates Filtered in 00mn 00s



---\\ Applications lancées au démarrage du sytème (O4)
O4 - HKLM\..\Run: [IgfxTray] . (.Intel Corporation - igfxTray Module.) -- C:\windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] . (.Intel Corporation - hkcmd Module.) -- C:\windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] . (.Intel Corporation - persistence Module.) -- C:\windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [TSSSrv] . (.TOSHIBA Corporation - TOSHIBA System Settings Service.) -- C:\Program Files (x86)\TOSHIBA\System Setting\TSSSrv.exe
O4 - HKLM\..\Run: [TecoResident] . (.TOSHIBA Corporation - Resident module of eco Utility.) -- C:\Program Files\TOSHIBA\Teco\TecoResident.exe
O4 - HKLM\..\Run: [TosWaitSrv] C:\Program Files (x86)\TOSHIBA\TPHM\TosWaitSrv.exe (.not file.)
O4 - HKLM\..\Run: [TCrdMain] . (.TOSHIBA Corporation - TOSHIBA Function Key Main Module.) -- C:\Program Files\TOSHIBA\Hotkey\TCrdMain_Win8.exe
O4 - HKCU\..\Run: [Le Petit Robert V4 Hyperappel] . (.Dictionnaire Le Robert - Le Petit Robert Hyperappel.) -- C:\Program Files (x86)\Le Robert\Le Petit Robert 2014\PetitRobertHA.exe
O4 - HKCU\..\Run: [Facebook Update] . (.Facebook Inc. - Programme d'installation de Facebook.) -- C:\Users\myriam\AppData\Local\Facebook\Update\FacebookUpdate.exe
O4 - HKCU\..\Run: [PC Speed Maximizer] . (.Smart PC Solutions - Fix PC problems and optimize performance.) -- C:\Program Files (x86)\PC Speed Maximizer\SPMLauncher.exe =>Rogue.PCSpeedMaximizer
O4 - HKLM\..\Wow6432Node\Run: [Intel AppUp(R) center] . (.Intel Corporation - Intel Services Manager.) -- C:\Program Files (x86)\Intel\IntelAppStore\bin\ismagent.exe
O4 - HKLM\..\Wow6432Node\Run: [AmIcoSinglun64] . (.Alcor Micro Corp. - Single LUN Icon Utility for VID 058F PID 63.) -- C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe
O4 - HKLM\..\Wow6432Node\Run: [1.TPUReg] . (.TOSHIBA - readLM.) -- C:\Program Files (x86)\TOSHIBA\PasswordUtility\readLM.exe
O4 - HKLM\..\Wow6432Node\Run: [TSVU] . (.TOSHIBA - TOSHIBA Display Setup Launcher.) -- c:\Program Files\TOSHIBA\TOSHIBA Smart View Utility\TosSmartViewLauncher.exe
O4 - HKLM\..\Wow6432Node\Run: [fst_fr_80] Clé orpheline =>PUA.FSTfr9
O4 - HKUS\S-1-5-21-4042709775-3453770670-536968249-1001\..\Run: [Le Petit Robert V4 Hyperappel] . (.Dictionnaire Le Robert - Le Petit Robert Hyperappel.) -- C:\Program Files (x86)\Le Robert\Le Petit Robert 2014\PetitRobertHA.exe
O4 - HKUS\S-1-5-21-4042709775-3453770670-536968249-1001\..\Run: [Facebook Update] . (.Facebook Inc. - Programme d'installation de Facebook.) -- C:\Users\myriam\AppData\Local\Facebook\Update\FacebookUpdate.exe
O4 - HKUS\S-1-5-21-4042709775-3453770670-536968249-1001\..\Run: [PC Speed Maximizer] . (.Smart PC Solutions - Fix PC problems and optimize performance.) -- C:\Program Files (x86)\PC Speed Maximizer\SPMLauncher.exe =>Rogue.PCSpeedMaximizer
~ Application: Scanned in 00mn 00s



---\\ Boutons situés sur la barre d'outils principale d'Internet Explorer (O9)
O9 - Extra button: Se&nd to OneNote [64Bits] - {2670000A-7350-4f3c-8081-5663EE0C6C49} . (.Microsoft Corporation - Microsoft OneNote Internet Explorer Add-in.) -- C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\ONBttnIE.dll =>.Microsoft Corporation
O9 - Extra button: Lync Click to Call [64Bits] - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} -- C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\lync.exe (.not file.)
O9 - Extra button: OneNote Lin&ked Notes [64Bits] - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} . (.Microsoft Corporation - Microsoft OneNote Internet Explorer Add-in.) -- C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX64\Microsoft Office\Office15\ONBttnIELinkedNotes.dll =>.Microsoft Corporation
~ IE Extra Buttons: Scanned in 00mn 00s



---\\ Modification Domaine/Adresses DNS (O17)
O17 - HKLM\System\CCS\Services\Tcpip\..\{5747490E-A16E-48E2-8422-5D9C41E0B9EE}: DhcpNameServer = 192.168.168.1
O17 - HKLM\System\CCS\Services\Tcpip\..\{CE907713-CB7C-4B04-AE30-5BCE46305E42}: DhcpNameServer = 109.0.66.10 109.0.66.20
O17 - HKLM\System\CCS\Services\Tcpip\..\{5747490E-A16E-48E2-8422-5D9C41E0B9EE}: DhcpDomain = ANCG02.com
O17 - HKLM\System\CS1\Services\Tcpip\..\{5747490E-A16E-48E2-8422-5D9C41E0B9EE}: DhcpNameServer = 192.168.168.1
O17 - HKLM\System\CS1\Services\Tcpip\..\{CE907713-CB7C-4B04-AE30-5BCE46305E42}: DhcpNameServer = 109.0.66.10 109.0.66.20
O17 - HKLM\System\CS1\Services\Tcpip\..\{5747490E-A16E-48E2-8422-5D9C41E0B9EE}: DhcpDomain = ANCG02.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 109.0.66.10 109.0.66.20
~ Domain: Scanned in 00mn 00s



---\\ Protocole additionnel (O18)
O18 - Handler: vbscript [64Bits] - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} . (.Microsoft Corporation - Visionneuse HTML Microsoft (R).) -- C:\Windows\System32\mshtml.dll =>.Microsoft Corporation
O18 - Filter: application/x-msdownload [64Bits] - {1E66F26B-79EE-11D2-8710-00C04F79ED0D} . (.Microsoft Corporation - Microsoft .NET Runtime Execution Engine.) -- C:\Windows\System32\mscoree.dll =>.Microsoft Corporation
~ Protocole Additionnel: Scanned in 00mn 00s



---\\ Valeur de Registre AppInit_DLLs et sous-clés Winlogon Notify (autorun) (O20)
O20 - Winlogon Notify: igfxcui . (.Intel Corporation - igfxdev Module.) -- C:\Windows\System32\igfxdev.dll
~ Winlogon: Scanned in 00mn 00s



---\\ Valeur de Registre AppInit_DLLs et sous-clés Winlogon Notify (autorun) (O20)
O20 - AppInit_DLLs: . (...) - C:\Program Files (x86)\Linkey\IEEXTE~1\iedll64.dll (.not file.)
~ AppInit DLL: Scanned in 00mn 00s



---\\ Liste des services NT non Microsoft et non désactivés (O23)
O23 - Service: McAfee Application Installer Cleanup (0104861395361337) (0104861395361337mcinstcleanup) . (...) - C:\Users\myriam\AppData\Local\Temp\010486~1.exe (.not file.)
O23 - Service: DTS APO Service (dts_apo_service) . (.Pas de propriétaire - dts_apo_service.) - C:\Program Files (x86)\DTS, Inc\DTS Studio Sound\dts_apo_service.exe
~ Services: 7 Legitimates Filtered in 00mn 04s



---\\ Clés Session Manager (AppCertDlls,KnownDLLs) (O36)
O36 - AppCertDlls: (x64) . (...) -- c:\program files (x86)\settings manager\systemk\x64\sysapcrt.dll
O36 - AppCertDlls: (x86) . (...) -- c:\program files (x86)\settings manager\systemk\sysapcrt.dll
~ Keys: Scanned in 00mn 00s



---\\ Tâches planifiées en automatique (O39)
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\bench-S-1-5-21-4042709775-3453770670-536968249-1001.job [356] =>PUP.GiganticSavings
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\MySearchDial.job [306] =>Adware.MyWebSearch
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\Re-markit_wd.job [402] =>PUP.ReMarkIt
[MD5.00000000000000000000000000000000] [APT] [bench-S-1-5-21-4042709775-3453770670-536968249-1001] (...) -- C:\Program Files (x86)\Bench\Updater\updater.exe (.not file.) [0] =>PUP.GiganticSavings
[MD5.91A1158C259FC75EB14EBED996A49640] [APT] [MySearchDial] (...) -- C:\Users\myriam\AppData\Roaming\MYSEAR~1\UPDATE~1\UPDATE~1.exe [104960] =>Adware.MyWebSearch
[MD5.00000000000000000000000000000000] [APT] [Re-markit_wd] (...) -- C:\Program Files (x86)\Re-markit-soft\Re-markit_wd.exe (.not file.) [0] =>PUP.ReMarkIt
[MD5.00000000000000000000000000000000] [APT] [{50CC36BE-2450-4EA8-B7D4-6EA4925251CF}] (...) -- C:\Program Files (x86)\sweetpacks bundle uninstaller\uninstaller.exe (.not file.) [0] =>PUP.SweetIM
~ Scheduled Task: 23 Legitimates Filtered in 00mn 07s



---\\ Logiciels installés (O42)
O42 - Logiciel: Mysearchdial - (.Mysearchdial.) [HKLM][64Bits] -- mysearchdial =>Adware.MyWebSearch
O42 - Logiciel: Re-markit - (.Re-markit Software.) [HKLM][64Bits] -- 1ac6ebd8-24fb-42f2-89aa-135a3b547de0 =>PUP.ReMarkIt
~ Logic: 39 Legitimates Filtered in 00mn 01s



---\\ HKCU & HKLM Software Keys
[HKCU\Software\Condut]
[HKCU\Software\ELIGCHK]
[HKCU\Software\InstallCore] =>Adware.InstallCore
[HKCU\Software\Linkey]
[HKCU\Software\SystemK]
[HKCU\Software\mysearchdial] =>Adware.MyWebSearch
[HKLM\Software\Reimage] =>Rogue.ReimageRepair
[HKLM\Software\Wow6432Node\InstallCore] =>Adware.InstallCore
[HKLM\Software\Wow6432Node\SPCP]
[HKLM\Software\Wow6432Node\Shortcut_Module]
[HKLM\Software\Wow6432Node\SystemK]
[HKLM\Software\Wow6432Node\Taronja]
[HKLM\Software\Wow6432Node\anset]
~ Key Software: 213 Legitimates Filtered in 00mn 01s



---\\ Contenu des dossiers Programs/ProgramFiles/ProgramData/AppData (O43)
O43 - CFD: 20/03/2014 - 16:11:00 - [0] ----D C:\Program Files (x86)\Linkey
O43 - CFD: 17/03/2014 - 22:57:17 - [0,010] ----D C:\Program Files (x86)\Mega Browse =>PUP.MegaBrowse
O43 - CFD: 21/03/2014 - 23:28:30 - [2,988] ----D C:\Program Files (x86)\Mysearchdial =>Adware.MyWebSearch
O43 - CFD: 15/03/2014 - 12:53:58 - [0] ----D C:\Program Files (x86)\PC Registry Shield =>Rogue.PCRegistryShield
O43 - CFD: 17/03/2014 - 22:49:17 - [1,291] ----D C:\Program Files (x86)\Re-markit-soft =>PUP.ReMarkIt
O43 - CFD: 20/03/2014 - 16:03:22 - [20,609] ----D C:\Program Files (x86)\Settings Manager
O43 - CFD: 22/03/2014 - 00:54:39 - [0,017] ----D C:\ProgramData\systemk
O43 - CFD: 21/03/2014 - 23:27:02 - [1,063] ----D C:\Users\myriam\AppData\Roaming\1H1Q
O43 - CFD: 21/03/2014 - 23:29:18 - [0,100] ----D C:\Users\myriam\AppData\Roaming\mysearchdial =>Adware.MyWebSearch
~ Program Folder: 118 Legitimates Filtered in 00mn 08s



---\\ Derniers fichiers modifiés ou crées sous Windows et System32 (O44)
O44 - LFC:[MD5.B24065447CC1E21603C93B6EB7CAD4CF] - 14/03/2014 - 11:05:01 ---A- . (...) -- C:\Windows\Reimage.ini [99] =>Rogue.ReimageRepair
O44 - LFC:[MD5.3BD8C076C74DFC8B042E65DCCD659291] - 14/03/2014 - 13:46:44 ---A- . (.Reimage® - Reimage Repair.) -- C:\TRANSLATE [10830344] =>Rogue.ReimageRepair
O44 - LFC:[MD5.78B12B58D6E504A9B5B2E006CC04340C] - 21/03/2014 - 15:09:46 ---A- . (...) -- C:\Shortcut_Module.txt [33941]
O44 - LFC:[MD5.54B62943DB1A1C915F511EC01094D69C] - 21/03/2014 - 15:24:18 ---A- . (...) -- C:\Windows\ntbtlog.txt [402484]
O44 - LFC:[MD5.110BE5198A63D3FF3CE9C30F1DC12EC3] - 21/03/2014 - 23:20:06 ---A- . (...) -- C:\Windows\System32\ApnDatabase.xml [386722]
~ Files: 53 Legitimates Filtered in 00mn 04s



---\\ Derniers fichiers créés dans Windows Prefetcher (O45)
O45 - LFCP:[MD5.0818492BBC5570F83A8B5F41237F9EAC] - 12/03/2014 - 16:49:17 ---A- - C:\Windows\Prefetch\WINZIPDU.EXE-118825FF.pf
O45 - LFCP:[MD5.3051C09B49A7BC9B5BACE94CBEFD73F1] - 13/03/2014 - 18:18:43 ---A- - C:\Windows\Prefetch\SKYPE_TSV26NAXR.EXE-70C69136.pf
O45 - LFCP:[MD5.1D9654340ACF167BF2B131A337FC1308] - 13/03/2014 - 18:21:11 ---A- - C:\Windows\Prefetch\EA5134AB3B6E787EEEAE9DFD38DF2-0BF3CDD9.pf
O45 - LFCP:[MD5.D8C816D547EDC4BEECE77B9FF9E570A4] - 13/03/2014 - 18:21:11 ---A- - C:\Windows\Prefetch\NSC4703.EXE-A0AB04E8.pf
O45 - LFCP:[MD5.6C37FA25A54CD3F122BE4FEDC8C3FC13] - 13/03/2014 - 22:14:07 ---A- - C:\Windows\Prefetch\JAVA (1).EXE-AAB00325.pf
O45 - LFCP:[MD5.1C6D1A75AE7E93A5C9014D8F44D74CF2] - 14/03/2014 - 13:46:15 ---A- - C:\Windows\Prefetch\REIMAGEPACKAGE.EXE-2323EC14.pf =>Rogue.ReimageRepair
O45 - LFCP:[MD5.1693549BDC72BDED9B53684CFF90209A] - 14/03/2014 - 14:15:40 ---A- - C:\Windows\Prefetch\REIMAGE.EXE-BEE43FC1.pf =>Rogue.ReimageRepair
O45 - LFCP:[MD5.8D4FA935F28D9B58A4C2F9BC10CBB51B] - 15/03/2014 - 10:04:03 ---A- - C:\Windows\Prefetch\PCREGISTRYSHIELD.EXE-63C1EAD5.pf
O45 - LFCP:[MD5.C22B3CE4E1825BB98B2A8200931F25EE] - 15/03/2014 - 16:50:33 ---A- - C:\Windows\Prefetch\KAV14.0.0.4651ABCFR_5469 (1).-C26F5FE1.pf
O45 - LFCP:[MD5.8AD5563DD3C672E551A929D594D764D8] - 15/03/2014 - 16:50:33 ---A- - C:\Windows\Prefetch\TEST_WPF.EXE-262237FA.pf
O45 - LFCP:[MD5.880FC9BDA48F7D564DEDDFC2893CBCDA] - 15/03/2014 - 19:43:55 ---A- - C:\Windows\Prefetch\AVAST.EXE-91D42EA4.pf
O45 - LFCP:[MD5.B0B46193B509C26ABC6BEC91FBAED39D] - 15/03/2014 - 19:46:14 ---A- - C:\Windows\Prefetch\AVAST (1).EXE-76B3E606.pf
O45 - LFCP:[MD5.00EFEC6DC43A76C642E9B64E8753839D] - 15/03/2014 - 21:33:53 ---A- - C:\Windows\Prefetch\INSTUP.EXE-D5444E89.pf
O45 - LFCP:[MD5.3F6C9476CF0D9DEED71658C7CB8D6EEB] - 16/03/2014 - 11:07:42 ---A- - C:\Windows\Prefetch\PRNET.EXE-67159ACB.pf
O45 - LFCP:[MD5.16E58155CF4BBBCA0A8A3C977CEE50D1] - 16/03/2014 - 11:25:48 ---A- - C:\Windows\Prefetch\RCPSETUP_ADPPI13_ADPPI13.TMP-C19F6074.pf
O45 - LFCP:[MD5.3C701354E29759A810C8A6733B250B04] - 16/03/2014 - 11:34:29 ---A- - C:\Windows\Prefetch\_IU14D2N.TMP-2312A507.pf
O45 - LFCP:[MD5.B723E6EF56E0F5A22A2554BAC939CC9B] - 20/03/2014 - 15:01:55 ---A- - C:\Windows\Prefetch\SOFTONICDOWNLOADER_POUR_YOUR--7F7FBFE2.pf =>Toolbar.Conduit
O45 - LFCP:[MD5.8D42A8A2758C6BA095033ABE415FF6AE] - 20/03/2014 - 15:02:28 ---A- - C:\Windows\Prefetch\YUSETUP7.3.TMP-96DD8138.pf
O45 - LFCP:[MD5.AD69876E582D6B57CE58C45A141B5596] - 20/03/2014 - 16:20:58 ---A- - C:\Windows\Prefetch\GLCND.EXE-05B73AB0.pf
O45 - LFCP:[MD5.462414A994DF74F45CAD900ED9CC7EB6] - 20/03/2014 - 16:21:58 ---A- - C:\Windows\Prefetch\MCUIHOST.EXE-AE5E0AD4.pf
O45 - LFCP:[MD5.E016AB20810F21E49CA090A0B68EA745] - 20/03/2014 - 16:35:53 ---A- - C:\Windows\Prefetch\INTEGRATEDOFFICE.EXE-DFB67DA0.pf
O45 - LFCP:[MD5.ED1ACAC07849C9A426F456133711AD23] - 20/03/2014 - 18:56:41 ---A- - C:\Windows\Prefetch\dynreservedpri.db
O45 - LFCP:[MD5.94FD5D547B0E8094CA79C280F86AEB0E] - 20/03/2014 - 21:41:58 ---A- - C:\Windows\Prefetch\URMAIN.EXE-1907CD6F.pf
O45 - LFCP:[MD5.61087A11E4ADF95E0961387067049A02] - 20/03/2014 - 22:06:10 ---A- - C:\Windows\Prefetch\REMAR.EXE-575C7A07.pf
O45 - LFCP:[MD5.5D14EC0E92E4FF22DCD6C0C1915F4D67] - 21/03/2014 - 09:35:31 ---A- - C:\Windows\Prefetch\READLM.EXE-DD0A7195.pf
O45 - LFCP:[MD5.2908FE94615833C09FD3812CB323EB58] - 21/03/2014 - 12:45:13 ---A- - C:\Windows\Prefetch\SHORTCUT_MODULE (2).EXE-02076395.pf
O45 - LFCP:[MD5.615E4332005A26BB9A5781B5E6CEB9A4] - 21/03/2014 - 13:17:29 ---A- - C:\Windows\Prefetch\OFFICECLICKTORUN.EXE-EE812CCB.pf
O45 - LFCP:[MD5.B8DAD67D26BEA58D7E4F5721546C7DD5] - 21/03/2014 - 15:06:18 ---A- - C:\Windows\Prefetch\SYSTEMSETTINGS.EXE-D8CC3B5E.pf
O45 - LFCP:[MD5.22C433D6D1B88F3F6964344253A1EDE4] - 21/03/2014 - 19:36:40 ---A- - C:\Windows\Prefetch\SHORTCUT_MODULE.EXE-935D7736.pf
O45 - LFCP:[MD5.3A6D7D903240CFDE89F47B0A2365397D] - 21/03/2014 - 19:41:12 ---A- - C:\Windows\Prefetch\S_M.EXE-E2B78485.pf
O45 - LFCP:[MD5.71E28F3FF47B9838E0C582D4842E70C4] - 21/03/2014 - 19:41:22 ---A- - C:\Windows\Prefetch\SHORTCUT_MODULE.EXE-3D5B42F9.pf
O45 - LFCP:[MD5.3B482E8EA45CCB3050EE974097160E72] - 21/03/2014 - 22:26:12 ---A- - C:\Windows\Prefetch\871047~1.EXE-150A31E0.pf
O45 - LFCP:[MD5.E4D5DD3FE3A1CD55C073A7D9D7A6294E] - 21/03/2014 - 22:26:38 ---A- - C:\Windows\Prefetch\871041~1.EXE-0F0CD6A2.pf
O45 - LFCP:[MD5.3836554DFAA3ED54B91D61F228A3165E] - 21/03/2014 - 22:26:50 ---A- - C:\Windows\Prefetch\871049~1.EXE-1709504A.pf
O45 - LFCP:[MD5.1671BA9B842F6A426671344C5583F811] - 21/03/2014 - 22:27:03 ---A- - C:\Windows\Prefetch\SPMSMARTSCAN.EXE-5660B591.pf
O45 - LFCP:[MD5.47019DFB75D6E348A3F7F6919D144F55] - 21/03/2014 - 22:28:31 ---A- - C:\Windows\Prefetch\MYSEARCHDIALSRV.EXE-5FC83490.pf =>Adware.MyWebSearch
O45 - LFCP:[MD5.01FEB4A557373534D8C4C5627B71086D] - 21/03/2014 - 22:29:28 ---A- - C:\Windows\Prefetch\MYSEARCHDIAL.EXE-88BFEC2C.pf =>Adware.MyWebSearch
O45 - LFCP:[MD5.D6CEDF4FE7DB3D0B007A4F0F25A618D0] - 21/03/2014 - 22:29:56 ---A- - C:\Windows\Prefetch\891300~1.EXE-46990792.pf
O45 - LFCP:[MD5.0125D2754F7A9979BCD78DF51A062B5C] - 21/03/2014 - 22:32:00 ---A- - C:\Windows\Prefetch\PCSPEEDMAXIMIZER.EXE-60BA47FF.pf
O45 - LFCP:[MD5.B9936131185830AE8E93EC578EC59B6F] - 21/03/2014 - 23:24:28 ---A- - C:\Windows\Prefetch\TSSSRV.EXE-E86A7BE1.pf
O45 - LFCP:[MD5.4B57D6A645B18C73A6C43B276F185BCE] - 21/03/2014 - 23:24:54 ---A- - C:\Windows\Prefetch\SYSTEMKU.EXE-2CB37E34.pf
O45 - LFCP:[MD5.1D3FF1FC15F81E8407CC3DD546E69E8C] - 21/03/2014 - 23:29:06 ---A- - C:\Windows\Prefetch\UPDATE~1.EXE-B5FD9872.pf
~ Prefetcher: 234 Legitimates Filtered in 00mn 01s



---\\ Image File Execution Options (IFEO) (O50)
O50 - IFEO:Image File Execution Options - bpsvc.exe - tasklist.exe
O50 - IFEO:Image File Execution Options - browsersafeguard.exe - tasklist.exe =>PUP.BrowserSafeguard
O50 - IFEO:Image File Execution Options - dprotectsvc.exe - tasklist.exe =>Trojan.Trojan.Staser
O50 - IFEO:Image File Execution Options - protectedsearch.exe - tasklist.exe =>Spyware.ProtectedSearch
O50 - IFEO:Image File Execution Options - rjatydimofu.exe - tasklist.exe
O50 - IFEO:Image File Execution Options - searchprotection.exe - tasklist.exe =>Toolbar.Conduit
O50 - IFEO:Image File Execution Options - searchprotector.exe - tasklist.exe =>Toolbar.Conduit
O50 - IFEO:Image File Execution Options - snapdo.exe - tasklist.exe =>Hijacker.SmartBar
O50 - IFEO:Image File Execution Options - stinst32.exe - tasklist.exe
O50 - IFEO:Image File Execution Options - stinst64.exe - tasklist.exe
O50 - IFEO:Image File Execution Options - utiljumpflip.exe - tasklist.exe =>PUP.JumpFlip
~ IFEO: Scanned in 00mn 00s



---\\ Enumération des clés de registre PoliciesSystem (MWPS) (O55)
O55 - MWPS:[HKLM\...\Policies\System] - "PromptOnSecureDesktop"=0
O55 - MWPS:[HKLM\...\Policies\System] - "EnableLUA"=0
O55 - MWPS:[HKLM\...\Policies\System] - "EnableUIADesktopToggle"=0
O55 - MWPS:[HKLM\...\Policies\System] - "FilterAdministratorToken"=0
~ MWPS: 19 Legitimates Filtered in 00mn 00s



---\\ Enumération des clés de registre PoliciesExplorer (MWPE) (O56)
O56 - MWPE:[HKLM\...\policies\Explorer] - "NoActiveDesktopChanges"=1
~ MWPE Keys: 6 Legitimates Filtered in 00mn 00s



---\\ Liste des pilotes du système (SDL) (O58)
O58 - SDL:[MD5.4E85355B94CFCB67C135F6521A4895A7] - 25/07/2012 - 21:00:55 ---A- . (.Promise Technology, Inc. - Promise SuperTrak EX Series Driver for Windows x64.) -- C:\Windows\System32\Drivers\stexstor.sys [30960]
O58 - SDL:[MD5.45C7CA7C0753B7A43856A5F5423C1D32] - 14/05/2013 - 17:28:16 ---A- . (.Windows (R) Win 7 DDK provider - Toshiba Hotkey Driver.) -- C:\Windows\System32\Drivers\Thotkey.sys [31120]
~ Drivers: 19 Legitimates Filtered in 00mn 04s



---\\ Derniers fichiers modifiés ou crées (Utilisateur) (O61)
O61 - LFC: 20/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Downloads\adwcleaner.exe [1950720]
O61 - LFC: 20/03/2014 - 00:55:19 ---A- . (.Fusion Install.) -- C:\Users\myriam\Downloads\Player-Chrome.exe [218400]
O61 - LFC: 20/03/2014 - 00:55:19 ---A- . (.Softonic.) -- C:\Users\myriam\Downloads\SoftonicDownloader_pour_your-uninstaller.exe [389496] =>Toolbar.Conduit
O61 - LFC: 21/03/2014 - 00:55:09 ---A- . (...) -- C:\Users\myriam\AppData\Local\Google\Chrome\User Data\Certificate Revocation Lists [271243]
O61 - LFC: 21/03/2014 - 00:55:12 ---A- . (...) -- C:\Users\myriam\AppData\Local\Google\Chrome\User Data\Local State [64453]
O61 - LFC: 21/03/2014 - 00:55:15 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\mysearchdial\UpdateProc\info.dat [54] =>Adware.MyWebSearch
O61 - LFC: 21/03/2014 - 00:55:16 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\WB.CFG [46]
O61 - LFC: 21/03/2014 - 00:55:16 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\ZHP\Log.txt [42679] =>.Nicolas Coolman
O61 - LFC: 21/03/2014 - 00:55:16 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\ZHP\TestsZHPDiag.txt [2851] =>.Nicolas Coolman
O61 - LFC: 21/03/2014 - 00:55:16 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\ZHP\ZHPADSReport.txt [351] =>.Nicolas Coolman
O61 - LFC: 21/03/2014 - 00:55:16 ---A- . (...) -- C:\Users\myriam\AppData\Roaming\ZHP\ZHPDiag.txt [36347] =>.Nicolas Coolman
O61 - LFC: 21/03/2014 - 00:55:18 ---A- . (...) -- C:\Users\myriam\Documents\PC Speed Maximizer\CookiesException.txt [28] =>Rogue.PCSpeedMaximizer
O61 - LFC: 21/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Downloads\PdfReaderSetup.exe [805024]
O61 - LFC: 21/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Links\Desktop.lnk [449]
O61 - LFC: 21/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Links\Downloads.lnk [904]
O61 - LFC: 21/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Links\OneDrive.lnk [631]
O61 - LFC: 21/03/2014 - 00:55:19 ---A- . (...) -- C:\Users\myriam\Links\RecentPlaces.lnk [383]
~ 48 Fichiers temporaires (Temporary files)
~ Files: 347 Legitimates Filtered in 00mn 10s



---\\ Liste des outils de désinfection (LATC) (O63)
O63 - Logiciel: ZHPDiag 2014 - (.Nicolas Coolman.) [HKLM] -- ZHPDiag_is1 =>.Nicolas Coolman
~ ADS: Scanned in 00mn 00s



---\\ Associations Shell Spawning (O67)
O67 - Shell Spawning: <.html> <ChromeHTML>[HKCU\..\open\Command] (.Not Key.)
~ FASS Keys: 11 Legitimates Filtered in 00mn 00s



---\\ Menu de démarrage Internet (SMI) (O68)
O68 - StartMenuInternet: <Google Chrome> <Google Chrome>[HKLM\..\Shell\open\Command] (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
O68 - StartMenuInternet: <IEXPLORE.EXE> <Internet Explorer>[HKLM\..\Shell\open\Command] (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files\Internet Explorer\iexplore.exe
~ Keys: Scanned in 00mn 00s



---\\ Recherche d'infection sur les navigateurs internet (SBI) (O69)
O69 - SBI: SearchScopes [HKCU] {77AA745B-F4F8-45DA-9B14-61D2D95054C8} [DefaultScope] - (Mysearchdial) - http://start.mysearchdial.com =>Adware.MyWebSearch
~ Keys: Scanned in 00mn 00s



---\\ Recherche particulière à la racine du système (SPRF) (O84)
[MD5.E3B2CD404FC262089EB951DBFA4F84F8] [SPRF][21/03/2014] (.Pas de propriétaire - Shortcut_Module.) -- C:\Users\myriam\Desktop\Shortcut_Module.exe [2192384]
~ Files: 2 Legitimates Filtered in 00mn 00s



---\\ Liste des exceptions du parefeu (FirewallRules) (O87)
O87 - FAEL: "TCP Query User{9609AB3E-452B-4DA3-A9AB-791AA58E0A09}C:\users\myriam\appdata\roaming\cacaoweb\cacaoweb.exe" |In - Public - P6 - TRUE | .(...) -- C:\users\myriam\appdata\roaming\cacaoweb\cacaoweb.exe (.not file.) =>PUP.CacaoWeb
O87 - FAEL: "UDP Query User{78AD8226-EE90-4037-BB6B-0F7E6C4BF763}C:\users\myriam\appdata\roaming\cacaoweb\cacaoweb.exe" |In - Public - P17 - TRUE | .(...) -- C:\users\myriam\appdata\roaming\cacaoweb\cacaoweb.exe (.not file.) =>PUP.CacaoWeb
~ Firewall: 218 Legitimates Filtered in 00mn 01s



---\\ Etat général des services non Microsoft (EGS) (SR=Running, SS=Stopped)
SS - | Auto 10/07/1658 0 | (0104861395361337mcinstcleanup) . (...) - C:\Users\myriam\AppData\Local\Temp\010486~1.exe
SS - | Demand 03/10/2013 279024 | (cphs) . (.Intel Corporation.) - C:\Windows\SysWow64\IntelCpHeciSvc.exe
SS - | Auto 28/01/2014 116648 | (gupdate) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
SS - | Demand 28/01/2014 116648 | (gupdatem) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
SS - | Demand 24/04/2012 169752 | (ICCS) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
SS - | Demand 01/07/2013 822232 | (Intel(R) Capability Licensing Service TCP IP Interface) . (.Intel(R) Corporation.) - C:\Program Files\Intel\TXE Components\TCS\SocketHeciServer.exe
SS - | Demand 28/06/2013 116088 | (TemproMonitoringService) . (.Toshiba Europe GmbH.) - C:\Program Files (x86)\Toshiba TEMPRO\TemproSvc.exe =>.Toshiba Corporation
SS - | Demand 10/07/1658 0 | (WMPNetworkSvc) . (...) - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe =>.Microsoft Corporation

SR - | Auto 16/09/2013 19792 | (dts_apo_service) . (...) - C:\Program Files (x86)\DTS, Inc\DTS Studio Sound\dts_apo_service.exe
SR - | Auto 27/03/2013 163168 | (GFNEXSrv) . (...) - C:\Program Files (x86)\TOSHIBA\PasswordUtility\GFNEXSrv.exe
SR - | Auto 01/07/2013 733696 | (Intel(R) Capability Licensing Service Interface) . (.Intel(R) Corporation.) - C:\Program Files\Intel\TXE Components\TCS\HeciServer.exe
SR - | Auto 06/02/2014 3448848 | (SystemkService) . (.Aztec Media Inc..) - C:\Program Files (x86)\Settings Manager\systemk\SystemkService.exe
SR - | Demand 24/09/2013 53864 | (TMachInfo) . (.TOSHIBA Corporation.) - C:\Program Files\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe =>.Toshiba Corporation
SR - | Auto 28/07/2009 140632 | (TODDSrv) . (.TOSHIBA Corporation.) - C:\Windows\system32\TODDSrv.exe
SR - | Auto 05/09/2013 347488 | (TOSHIBA eco Utility Service) . (.Toshiba Corporation.) - C:\Program Files\TOSHIBA\Teco\TecoService.exe =>.Toshiba Corporation
SR - | Demand 04/09/2013 466504 | (TPCHSrv) . (.TOSHIBA Corporation.) - C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
SR - | Demand 10/07/1658 0 | (WinDefend) . (...) - C:\Program Files (x86)\Windows Defender\MsMpEng.exe
SR - | Auto 19/09/2012 29696 | C:\windows\system32\wuaueng.dll (wuauserv) . (.Microsoft Corporation.) - C:\Windows\System32\svchost.exe

~ Services: Scanned in 00mn 08s



---\\ Recherche d'infection sur le Master Boot Record (MBR)(O80)
Run by myriam at 22/03/2014 00:56:00
~ OS 64 not supported by MBR tool

~ MBR: 0 Legitimates Filtered in 00mn 00s



---\\ Recherche d'infection sur le Master Boot Record (MBRCheck)(O80)
Written by ad13, http://ad13.geekstog
Run by myriam at 22/03/2014 00:56:02

********* Dump file Name *********
C:\PhysicalDisk0_MBR.bin

~ MBR: Scanned in 00mn 02s



---\\ Scan Additionnel (O88)
Database Version : 13031 - (21/03/2014)
Clés trouvées (Keys found) : 44
Valeurs trouvées (Values found) : 4
Dossiers trouvés (Folders found) : 7
Fichiers trouvés (Files found) : 8

[HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EF5625A3-37AB-4BDB-9875-2A3D91CD0DFD}] =>Adware.MyWebSearch^
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\mysearchdial] =>Adware.MyWebSearch^
[HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\1ac6ebd8-24fb-42f2-89aa-135a3b547de0] =>PUP.ReMarkIt^
[HKLM\Software\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}] =>PUP.Babylon
[HKLM\Software\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}] =>PUP.Babylon
[HKLM\Software\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}] =>PUP.Babylon
[HKLM\Software\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}] =>PUP.Babylon
[HKLM\Software\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}] =>PUP.Babylon
[HKLM\Software\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}] =>PUP.Babylon
[HKLM\Software\Classes\AppID\escort.dll] =>PUP.Babylon
[HKLM\Software\Classes\AppID\escortapp.dll] =>PUP.Babylon
[HKLM\Software\Classes\AppID\escorteng.dll] =>PUP.Babylon
[HKLM\Software\Classes\AppID\esrv.EXE] =>PUP.Babylon
[HKCU\Software\SpeedyPC Software] =>PUP.SpeedyPC
[HKLM\Software\Wow6432Node\SpeedyPC Software] =>PUP.SpeedyPC
[HKCU\Software\InstallCore] =>Adware.InstallCore
[HKLM\Software\Wow6432Node\InstallCore] =>Adware.InstallCore
[HKLM\Software\Reimage] =>Rogue.ReimageRepair
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3004627E-F8E9-4E8B-909D-316753CBA923}] =>Adware.MyWebSearch
[HKLM\Software\Classes\esrv.mysearchdialESrvc] =>Adware.MyWebSearch
[HKLM\Software\Classes\esrv.mysearchdialESrvc.1] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialappCore] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialappCore.1] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialdskBnd] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialdskBnd.1] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialHlpr] =>Adware.MyWebSearch
[HKLM\Software\Classes\mysearchdial.mysearchdialHlpr.1] =>Adware.MyWebSearch
[HKLM\Software\Classes\AppID\escorTlbr.DLL] =>PUP.Funmoods
[HKLM\Software\Wow6432Node\Classes\esrv.mysearchdialESrvc] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\esrv.mysearchdialESrvc.1] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialappCore] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialappCore.1] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialdskBnd] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialdskBnd.1] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialHlpr] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\mysearchdial.mysearchdialHlpr.1] =>Adware.MyWebSearch
[HKLM\Software\Wow6432Node\Classes\AppID\escort.DLL] =>PUP.Funmoods
[HKLM\Software\Wow6432Node\Classes\AppID\escortApp.DLL] =>PUP.Funmoods
[HKLM\Software\Wow6432Node\Classes\AppID\escortEng.DLL] =>PUP.Funmoods
[HKLM\Software\Wow6432Node\Classes\AppID\escorTlbr.DLL] =>PUP.Funmoods
[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:PC Speed Maximizer =>Rogue.PCSpeedMaximizer^
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:fst_fr_80 =>PUA.FSTfr9^
C:\Program Files (x86)\Mega Browse =>PUP.MegaBrowse^
C:\Program Files (x86)\Mysearchdial =>Adware.MyWebSearch^
C:\Program Files (x86)\PC Registry Shield =>Rogue.PCRegistryShield^
C:\Program Files (x86)\Re-markit-soft =>PUP.ReMarkIt^
C:\Users\myriam\AppData\Roaming\mysearchdial =>Adware.MyWebSearch^
C:\ProgramData\SpeedyPC Software =>PUP.SpeedyPC
C:\Users\myriam\AppData\Roaming\SpeedyPC Software =>PUP.SpeedyPC
C:\Program Files (x86)\PC Speed Maximizer\SPMSmartScan.exe =>Rogue.PCSpeedMaximizer^
C:\Program Files (x86)\PC Speed Maximizer\SPMReminder.exe =>Rogue.PCSpeedMaximizer^
C:\Windows\Tasks\bench-S-1-5-21-4042709775-3453770670-536968249-1001.job =>PUP.GiganticSavings^
C:\Windows\Tasks\MySearchDial.job =>Adware.MyWebSearch^
C:\Windows\Tasks\Re-markit_wd.job =>PUP.ReMarkIt^
C:\Users\myriam\AppData\Roaming\MYSEAR~1\UPDATE~1\UPDATE~1.exe =>Adware.MyWebSearch^
[HKCU\Software\mysearchdial] =>Adware.MyWebSearch^
C:\Windows\Reimage.ini =>Rogue.ReimageRepair
~ Additionnel Scan: 178563 Items scanned in 00mn 29s



---\\ Récapitulatif des détections trouvées sur votre station
~ http://nicolascoolman.webs.com/apps/blog/show/33449013-rogue-pcspeedmaximizer =>Rogue.PCSpeedMaximizer
~ http://nicolascoolman.webs.com/apps/blog/show/27146838-adware-mywebsearch =>Adware.MyWebSearch
~ http://nicolascoolman.webs.com/apps/blog/show/26633218-rogue-reimagerepair =>Rogue.ReimageRepair
~ http://nicolascoolman.webs.com/apps/blog/show/34014358-pua-fstfr9 =>PUA.FSTfr9
~ http://nicolascoolman.webs.com/apps/blog/show/37514218-pup-giganticsavings =>PUP.GiganticSavings
~ http://nicolascoolman.webs.com/apps/blog/show/36657231-pup-remarkit =>PUP.ReMarkIt
~ http://nicolascoolman.webs.com/apps/blog/show/29216159-pup-sweetim =>PUP.SweetIM
~ http://nicolascoolman.webs.com/apps/blog/show/29790567-adware-installcore =>Adware.InstallCore
~ http://nicolascoolman.webs.com/apps/blog/show/41917380-pup-megabrowse =>PUP.MegaBrowse
~ http://nicolascoolman.webs.com/apps/blog/show/29507721-toolbar-conduit =>Toolbar.Conduit
~ http://nicolascoolman.webs.com/apps/blog/show/32799788-pup-browsersafeguard =>PUP.BrowserSafeguard
~ http://nicolascoolman.webs.com/apps/blog/show/32771797-trojan-staser =>Trojan.Staser
~ http://nicolascoolman.webs.com/apps/blog/show/33367156-spyware-protectedsearch =>Spyware.ProtectedSearch
~ http://nicolascoolman.webs.com/apps/blog/show/26990375-hijacker-smartbar =>Hijacker.SmartBar
~ http://nicolascoolman.webs.com/apps/blog/show/27566847-pup-cacaoweb =>PUP.CacaoWeb
~ http://nicolascoolman.webs.com/apps/blog/show/26627369-toolbar-babylon =>PUP.Babylon
~ http://nicolascoolman.webs.com/apps/blog/show/28224126-pup-speedypc =>PUP.SpeedyPC
~ http://nicolascoolman.webs.com/apps/blog/show/27630986-pup-funmoods =>PUP.Funmoods
~ MSI: 18 link(s) detected in 00mn 29s



~ 1396 Legitimates filtered by white list
End of the scan (621 lines in 02mn 46s)(0)
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

tu as toujours w8 et IE 10, continue la recherche des mises ajour jusqu'au moment

où tu auras w8.1 et IE 11

dis moi si ça va

@+
0
mimik
 
ça te dérange si je t'envoie ça demain dans le courant de la journée? :))
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

non pas de soucis, mais je ne serai pas là 1 bonne partie de la journée

donc ne t'inquiète pas si je réponds pas de suite

bonne nuit

@ demain
0
mimik
 
merci :)
bonne nuit
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

je t'envoie 1 message quand je me connecte demain

@+
0
mimik
 
est ce que tu penses que je devrais supprimer les rapports que j'ai postés?
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

si tu veux, mais il n'y a rien de perso dans les rapports

@+
0
mimik
 
Bonjour billmaxime, la recherche des mises à jour n'a rien donné. Après la recherche il est indiqué qu'aucune mise à jour n'est disponible.
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

j'ai le même soucis sur le pc d'1 pote avec w8 (il ne veut pas faire la mise a jour vers w8.1)

je te ferai 1 script avec les "restes" a éliminer quand je serai a la maison

@+
0
mimik
 
merci t'es super :))
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

fait ceci et poste le rapport

Télécharge roguekiller sur ton bureau

prends le x64>>regarde l'image >> clique ici

Le lien https://www.luanagames.com/index.fr.html

Le tuto http://tigzyrk.blogspot.be/2012/10/fr-roguekiller-tutoriel-officiel.html

Quitte tous tes programmes en cours

Lance roguekiller (utilisateurs vista-w7-w8 exécuter en tant qu'administrateur- clic droit)

Laisse faire le prescan

Clique sur scan

Le rapport s'affichera sur ton bureau et dans C: RKReport[#].txt

Poste le rapport via 1 copier/coller

@+

0
mimik
 
Bonjour Maxime, désolée de te répondre seulement maintenant. j'essaierai de te poster ce que tu m'as demandé dans le courant de la journée.
encore merci,
Myriam
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

pas de soucis^^

en attente du rapport

@+
0
mimik
 
bonjour Maxime^^
voici le rapport (enfin!)

RogueKiller V8.8.13 _x64_ [Mar 25 2014] par Adlice Software
mail : http://www.adlice.com/contact/
Remontees : http://forum.adlice.com
Site Web : http://www.surlatoile.org/RogueKiller/
Blog : http://www.adlice.com

Systeme d'exploitation : Windows 8 (6.2.9200 ) 64 bits version
Demarrage : Mode normal
Utilisateur : myriam [Droits d'admin]
Mode : Suppression -- Date : 03/25/2014 15:58:56
| ARK || FAK || MBR |

¤¤¤ Processus malicieux : 0 ¤¤¤

¤¤¤ Entrees de registre : 21 ¤¤¤
[IFEO] HKLM\[...]\bpsvc.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\browsersafeguard.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\dprotectsvc.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\protectedsearch.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\rjatydimofu.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\searchprotection.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\searchprotector.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\snapdo.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\stinst32.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\stinst64.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[IFEO] HKLM\[...]\utiljumpflip.exe : Debugger (tasklist.exe [-]) -> SUPPRIMÉ
[HJ POL][PUM] HKLM\[...]\System : DisableTaskMgr (0) -> SUPPRIMÉ
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> SUPPRIMÉ
[HJ POL][PUM] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REMPLACÉ (2)
[HJ POL][PUM] HKLM\[...]\System : EnableLUA (0) -> REMPLACÉ (1)
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : DisableTaskMgr (0) -> [0x2] Le fichier spécifié est introuvable.
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> [0x2] Le fichier spécifié est introuvable.
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorAdmin (0) -> REMPLACÉ (2)
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : EnableLUA (0) -> REMPLACÉ (1)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REMPLACÉ (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REMPLACÉ (0)

¤¤¤ Tâches planifiées : 2 ¤¤¤
[V1][SUSP PATH] MySearchDial.job : C:\Users\myriam\AppData\Roaming\MYSEAR~1\UPDATE~1\UPDATE~1.EXE - /Check [-] -> SUPPRIMÉ
[V2][SUSP PATH] MySearchDial : C:\Users\myriam\AppData\Roaming\MYSEAR~1\UPDATE~1\UPDATE~1.EXE - /Check [-] -> SUPPRIMÉ

¤¤¤ Entrées Startup : 0 ¤¤¤

¤¤¤ Navigateurs web : 0 ¤¤¤

¤¤¤ Addons navigateur : 0 ¤¤¤

¤¤¤ Fichiers / Dossiers particuliers: ¤¤¤

¤¤¤ Driver : [NON CHARGE 0x0] ¤¤¤
[Address] ***@*** (AssocCreate) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813B20)
[Address] ***@*** (AssocGetPerceivedType) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B814940)
[Address] ***@*** (AssocIsDangerous) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82CFBC)
[Address] ***@*** (AssocQueryKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A870)
[Address] ***@*** (AssocQueryKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813A20)
[Address] ***@*** (AssocQueryStringA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82E60C)
[Address] ***@*** (AssocQueryStringByKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82E440)
[Address] ***@*** (AssocQueryStringByKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8141A0)
[Address] ***@*** (AssocQueryStringW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B819CC0)
[Address] ***@*** (ChrCmpIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A03C)
[Address] ***@*** (ChrCmpIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A02C)
[Address] ***@*** (ColorAdjustLuma) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F7A8)
[Address] ***@*** (ColorHLSToRGB) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81BFF0)
[Address] ***@*** (ColorRGBToHLS) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81BF30)
[Address] ***@*** (ConnectToConnectionPoint) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8142B0)
[Address] ***@*** (DelayLoadFailureHook) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F8F0)
[Address] ***@*** (DllGetClassObject) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83D448)
[Address] ***@*** (DllGetVersion) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B825AE0)
[Address] ***@*** (GUIDFromStringW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81F786)
[Address] ***@*** (GetAcceptLanguagesA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8297D0)
[Address] ***@*** (GetAcceptLanguagesW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815A40)
[Address] ***@*** (GetMenuPosFromID) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815A60)
[Address] ***@*** (HashData) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8297C0)
[Address] ***@*** (IStream_Copy) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A1A0)
[Address] ***@*** (IStream_Read) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812B80)
[Address] ***@*** (IStream_ReadPidl) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B819980)
[Address] ***@*** (IStream_ReadStr) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811120)
[Address] ***@*** (IStream_Reset) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816340)
[Address] ***@*** (IStream_Size) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A180)
[Address] ***@*** (IStream_Write) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816320)
[Address] ***@*** (IStream_WritePidl) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83F194)
[Address] ***@*** (IStream_WriteStr) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816350)
[Address] ***@*** (IUnknown_AtomicRelease) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A09C)
[Address] ***@*** (IUnknown_Exec) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815B80)
[Address] ***@*** (IUnknown_GetSite) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8160B0)
[Address] ***@*** (IUnknown_GetWindow) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812D20)
[Address] ***@*** (IUnknown_QueryService) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813300)
[Address] ***@*** (IUnknown_QueryStatus) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83BBA8)
[Address] ***@*** (IUnknown_Set) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811130)
[Address] ***@*** (IUnknown_SetSite) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813310)
[Address] ***@*** (IntlStrEqWorkerA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E3C)
[Address] ***@*** (IntlStrEqWorkerW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E2C)
[Address] ***@*** (IsCharSpaceA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A80)
[Address] ***@*** (IsCharSpaceW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811140)
[Address] ***@*** (IsInternetESCEnabled) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8297B0)
[Address] ***@*** (IsOS) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812B60)
[Address] ***@*** (MLFreeLibrary) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B839EF4)
[Address] ***@*** (MLLoadLibraryA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B839F48)
[Address] ***@*** (MLLoadLibraryW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B839FA8)
[Address] ***@*** (ParseURLA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8297A0)
[Address] ***@*** (ParseURLW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81C250)
[Address] ***@*** (PathAddBackslashA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B2C)
[Address] ***@*** (PathAddBackslashW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813C00)
[Address] ***@*** (PathAddExtensionA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CCC)
[Address] ***@*** (PathAddExtensionW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CBC)
[Address] ***@*** (PathAppendA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CAC)
[Address] ***@*** (PathAppendW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815A10)
[Address] ***@*** (PathBuildRootA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A05C)
[Address] ***@*** (PathBuildRootW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A06C)
[Address] ***@*** (PathCanonicalizeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C9C)
[Address] ***@*** (PathCanonicalizeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812CF0)
[Address] ***@*** (PathCombineA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B5C)
[Address] ***@*** (PathCombineW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813C10)
[Address] ***@*** (PathCommonPrefixA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829DAC)
[Address] ***@*** (PathCommonPrefixW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D9C)
[Address] ***@*** (PathCompactPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82AF90)
[Address] ***@*** (PathCompactPathExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82AD80)
[Address] ***@*** (PathCompactPathExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816530)
[Address] ***@*** (PathCompactPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82EB08)
[Address] ***@*** (PathCreateFromUrlA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829790)
[Address] ***@*** (PathCreateFromUrlAlloc) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829780)
[Address] ***@*** (PathCreateFromUrlW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8136E0)
[Address] ***@*** (PathFileExistsA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C0C)
[Address] ***@*** (PathFileExistsAndAttributesW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815930)
[Address] ***@*** (PathFileExistsW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813690)
[Address] ***@*** (PathFindExtensionA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C3C)
[Address] ***@*** (PathFindExtensionW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110C0)
[Address] ***@*** (PathFindFileNameA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BFC)
[Address] ***@*** (PathFindFileNameW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811090)
[Address] ***@*** (PathFindNextComponentA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829AE0)
[Address] ***@*** (PathFindNextComponentW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A210)
[Address] ***@*** (PathFindOnPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82B610)
[Address] ***@*** (PathFindOnPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B819170)
[Address] ***@*** (PathFindSuffixArrayA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82B534)
[Address] ***@*** (PathFindSuffixArrayW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8153D0)
[Address] ***@*** (PathGetArgsA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82962C)
[Address] ***@*** (PathGetArgsW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81C880)
[Address] ***@*** (PathGetCharTypeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829648)
[Address] ***@*** (PathGetCharTypeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816480)
[Address] ***@*** (PathGetDriveNumberA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D5C)
[Address] ***@*** (PathGetDriveNumberW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811050)
[Address] ***@*** (PathIsContentTypeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82ABAC)
[Address] ***@*** (PathIsContentTypeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A2C0)
[Address] ***@*** (PathIsDirectoryA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82B404)
[Address] ***@*** (PathIsDirectoryEmptyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82B334)
[Address] ***@*** (PathIsDirectoryEmptyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82EE78)
[Address] ***@*** (PathIsDirectoryW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8154D0)
[Address] ***@*** (PathIsFileSpecA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D6C)
[Address] ***@*** (PathIsFileSpecW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816200)
[Address] ***@*** (PathIsLFNFileSpecA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CFC)
[Address] ***@*** (PathIsLFNFileSpecW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CEC)
[Address] ***@*** (PathIsNetworkPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A07C)
[Address] ***@*** (PathIsNetworkPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8129A0)
[Address] ***@*** (PathIsPrefixA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D8C)
[Address] ***@*** (PathIsPrefixW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D7C)
[Address] ***@*** (PathIsRelativeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D4C)
[Address] ***@*** (PathIsRelativeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813680)
[Address] ***@*** (PathIsRootA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C8C)
[Address] ***@*** (PathIsRootW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812CE0)
[Address] ***@*** (PathIsSameRootA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D1C)
[Address] ***@*** (PathIsSameRootW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D0C)
[Address] ***@*** (PathIsSystemFolderA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A834)
[Address] ***@*** (PathIsSystemFolderW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82E948)
[Address] ***@*** (PathIsUNCA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B3C)
[Address] ***@*** (PathIsUNCServerA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C1C)
[Address] ***@*** (PathIsUNCServerShareA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C2C)
[Address] ***@*** (PathIsUNCServerShareW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E60)
[Address] ***@*** (PathIsUNCServerW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E70)
[Address] ***@*** (PathIsUNCW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811040)
[Address] ***@*** (PathIsURLA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829770)
[Address] ***@*** (PathIsURLW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8136C0)
[Address] ***@*** (PathMakePrettyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82BCB0)
[Address] ***@*** (PathMakePrettyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B819FC0)
[Address] ***@*** (PathMakeSystemFolderA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A8C0)
[Address] ***@*** (PathMakeSystemFolderW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811270)
[Address] ***@*** (PathMatchSpecA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BAC)
[Address] ***@*** (PathMatchSpecExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B8C)
[Address] ***@*** (PathMatchSpecExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B7C)
[Address] ***@*** (PathMatchSpecW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B9C)
[Address] ***@*** (PathParseIconLocationA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BEC)
[Address] ***@*** (PathParseIconLocationW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E20)
[Address] ***@*** (PathQuoteSpacesA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BCC)
[Address] ***@*** (PathQuoteSpacesW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812D00)
[Address] ***@*** (PathRelativePathToA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B14)
[Address] ***@*** (PathRelativePathToW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829AF4)
[Address] ***@*** (PathRemoveArgsA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82BC74)
[Address] ***@*** (PathRemoveArgsW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816450)
[Address] ***@*** (PathRemoveBackslashA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829CDC)
[Address] ***@*** (PathRemoveBackslashW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813730)
[Address] ***@*** (PathRemoveBlanksA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BBC)
[Address] ***@*** (PathRemoveBlanksW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813BD0)
[Address] ***@*** (PathRemoveExtensionA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C7C)
[Address] ***@*** (PathRemoveExtensionW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E30)
[Address] ***@*** (PathRemoveFileSpecA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B4C)
[Address] ***@*** (PathRemoveFileSpecW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B814040)
[Address] ***@*** (PathRenameExtensionA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C6C)
[Address] ***@*** (PathRenameExtensionW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C5C)
[Address] ***@*** (PathSearchAndQualifyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82961C)
[Address] ***@*** (PathSearchAndQualifyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812E00)
[Address] ***@*** (PathSetDlgItemPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82AC50)
[Address] ***@*** (PathSetDlgItemPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82E9D0)
[Address] ***@*** (PathSkipRootA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D2C)
[Address] ***@*** (PathSkipRootW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815A20)
[Address] ***@*** (PathStripPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829D3C)
[Address] ***@*** (PathStripPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816220)
[Address] ***@*** (PathStripToRootA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829C4C)
[Address] ***@*** (PathStripToRootW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E50)
[Address] ***@*** (PathUnExpandEnvStringsA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829B6C)
[Address] ***@*** (PathUnExpandEnvStringsW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812DF0)
[Address] ***@*** (PathUndecorateA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A75C)
[Address] ***@*** (PathUndecorateW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8164D0)
[Address] ***@*** (PathUnmakeSystemFolderA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A86C)
[Address] ***@*** (PathUnmakeSystemFolderW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82E984)
[Address] ***@*** (PathUnquoteSpacesA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829BDC)
[Address] ***@*** (PathUnquoteSpacesW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813BE0)
[Address] ***@*** (QISearch) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811010)
[Address] ***@*** (SHAllocShared) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8129D0)
[Address] ***@*** (SHAnsiToAnsi) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A310)
[Address] ***@*** (SHAnsiToUnicode) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A320)
[Address] ***@*** (SHAutoComplete) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81BE10)
[Address] ***@*** (SHCopyKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A2F0)
[Address] ***@*** (SHCopyKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A070)
[Address] ***@*** (SHCreateMemStream) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8132B0)
[Address] ***@*** (SHCreateShellPalette) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812890)
[Address] ***@*** (SHCreateStreamOnFileA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0DC)
[Address] ***@*** (SHCreateStreamOnFileEx) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816070)
[Address] ***@*** (SHCreateStreamOnFileW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8164A0)
[Address] ***@*** (SHCreateStreamWrapper) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81F792)
[Address] ***@*** (SHCreateThread) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815E80)
[Address] ***@*** (SHCreateThreadRef) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815B30)
[Address] ***@*** (SHCreateThreadWithHandle) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816400)
[Address] ***@*** (SHDeleteEmptyKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0FC)
[Address] ***@*** (SHDeleteEmptyKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0EC)
[Address] ***@*** (SHDeleteKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A2E0)
[Address] ***@*** (SHDeleteKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812C60)
[Address] ***@*** (SHDeleteOrphanKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83EFB8)
[Address] ***@*** (SHDeleteOrphanKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83EF48)
[Address] ***@*** (SHDeleteValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A10C)
[Address] ***@*** (SHDeleteValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812CA0)
[Address] ***@*** (SHEnumKeyExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A290)
[Address] ***@*** (SHEnumKeyExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A280)
[Address] ***@*** (SHEnumValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A250)
[Address] ***@*** (SHEnumValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A1D0)
[Address] ***@*** (SHFormatDateTimeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F004)
[Address] ***@*** (SHFormatDateTimeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F070)
[Address] ***@*** (SHFreeShared) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8129E0)
[Address] ***@*** (SHGetInverseCMAP) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B830830)
[Address] ***@*** (SHGetThreadRef) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B819140)
[Address] ***@*** (SHGetValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8143C0)
[Address] ***@*** (SHGetValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812B20)
[Address] ***@*** (SHGetViewStatePropertyBag) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816FA0)
[Address] ***@*** (SHIsChildOrSelf) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813510)
[Address] ***@*** (SHIsLowMemoryMachine) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83BC3C)
[Address] ***@*** (SHLoadIndirectString) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813340)
[Address] ***@*** (SHLockShared) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83F838)
[Address] ***@*** (SHMessageBoxCheckA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83ADD4)
[Address] ***@*** (SHMessageBoxCheckW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83AF00)
[Address] ***@*** (SHOpenRegStream2A) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0AC)
[Address] ***@*** (SHOpenRegStream2W) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8143F0)
[Address] ***@*** (SHOpenRegStreamA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0CC)
[Address] ***@*** (SHOpenRegStreamW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A0BC)
[Address] ***@*** (SHPackDispParamsV) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B817DB0)
[Address] ***@*** (SHPropertyBag_ReadStrAlloc) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B841598)
[Address] ***@*** (SHPropertyBag_WriteBSTR) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B841498)
[Address] ***@*** (SHQueryInfoKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A230)
[Address] ***@*** (SHQueryInfoKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A210)
[Address] ***@*** (SHQueryValueExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A120)
[Address] ***@*** (SHQueryValueExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8163A0)
[Address] ***@*** (SHRegCloseUSKey) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A70)
[Address] ***@*** (SHRegCreateUSKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A58)
[Address] ***@*** (SHRegCreateUSKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812640)
[Address] ***@*** (SHRegDeleteEmptyUSKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A44)
[Address] ***@*** (SHRegDeleteEmptyUSKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A34)
[Address] ***@*** (SHRegDeleteUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A24)
[Address] ***@*** (SHRegDeleteUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829A14)
[Address] ***@*** (SHRegDuplicateHKey) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A1F0)
[Address] ***@*** (SHRegEnumUSKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8299FC)
[Address] ***@*** (SHRegEnumUSKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8299DC)
[Address] ***@*** (SHRegEnumUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829998)
[Address] ***@*** (SHRegEnumUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812590)
[Address] ***@*** (SHRegGetBoolUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829984)
[Address] ***@*** (SHRegGetBoolUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81C220)
[Address] ***@*** (SHRegGetBoolValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816330)
[Address] ***@*** (SHRegGetIntW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A1E0)
[Address] ***@*** (SHRegGetPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A1C0)
[Address] ***@*** (SHRegGetPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A240)
[Address] ***@*** (SHRegGetUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829948)
[Address] ***@*** (SHRegGetUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A280)
[Address] ***@*** (SHRegGetValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A2A4)
[Address] ***@*** (SHRegGetValueFromHKCUHKLM) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816EBC)
[Address] ***@*** (SHRegGetValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8121B0)
[Address] ***@*** (SHRegOpenUSKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829928)
[Address] ***@*** (SHRegOpenUSKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829908)
[Address] ***@*** (SHRegQueryInfoUSKeyA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8298E0)
[Address] ***@*** (SHRegQueryInfoUSKeyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812610)
[Address] ***@*** (SHRegQueryUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8298A0)
[Address] ***@*** (SHRegQueryUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829860)
[Address] ***@*** (SHRegSetPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A1A0)
[Address] ***@*** (SHRegSetPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A180)
[Address] ***@*** (SHRegSetUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829838)
[Address] ***@*** (SHRegSetUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829810)
[Address] ***@*** (SHRegWriteUSValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8297E4)
[Address] ***@*** (SHRegWriteUSValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8125E0)
[Address] ***@*** (SHRegisterValidateTemplate) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8458E0)
[Address] ***@*** (SHReleaseThreadRef) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A08C)
[Address] ***@*** (SHRunIndirectRegClientCommand) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82C95C)
[Address] ***@*** (SHSendMessageBroadcastA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83A27C)
[Address] ***@*** (SHSendMessageBroadcastW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812CC0)
[Address] ***@*** (SHSetThreadRef) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815B10)
[Address] ***@*** (SHSetValueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A14C)
[Address] ***@*** (SHSetValueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8163D0)
[Address] ***@*** (SHSkipJunction) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812E20)
[Address] ***@*** (SHStrDupA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81A260)
[Address] ***@*** (SHStrDupW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811070)
[Address] ***@*** (SHStripMneumonicA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83A900)
[Address] ***@*** (SHStripMneumonicW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812DB0)
[Address] ***@*** (SHUnicodeToAnsi) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8132E0)
[Address] ***@*** (SHUnicodeToAnsiCP) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B81F7B9)
[Address] ***@*** (SHUnicodeToUnicode) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82A300)
[Address] ***@*** (SHUnlockShared) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83F818)
[Address] ***@*** (ShellMessageBoxA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82C604)
[Address] ***@*** (ShellMessageBoxW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F54C)
[Address] ***@*** (StrCSpnA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829EEC)
[Address] ***@*** (StrCSpnIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829EDC)
[Address] ***@*** (StrCSpnIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829ECC)
[Address] ***@*** (StrCSpnW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B815A30)
[Address] ***@*** (StrCatBuffA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FDC)
[Address] ***@*** (StrCatBuffW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FEC)
[Address] ***@*** (StrCatChainW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829DCC)
[Address] ***@*** (StrCatW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FCF8)
[Address] ***@*** (StrChrA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FCC)
[Address] ***@*** (StrChrIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F9C)
[Address] ***@*** (StrChrIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110E0)
[Address] ***@*** (StrChrNIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F8C)
[Address] ***@*** (StrChrNW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FBC)
[Address] ***@*** (StrChrW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811080)
[Address] ***@*** (StrCmpCA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829DEC)
[Address] ***@*** (StrCmpCW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812C90)
[Address] ***@*** (StrCmpICA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811100)
[Address] ***@*** (StrCmpICW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110F0)
[Address] ***@*** (StrCmpIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813650)
[Address] ***@*** (StrCmpLogicalW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829DDC)
[Address] ***@*** (StrCmpNA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829EBC)
[Address] ***@*** (StrCmpNCA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E0C)
[Address] ***@*** (StrCmpNCW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829DFC)
[Address] ***@*** (StrCmpNIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829EAC)
[Address] ***@*** (StrCmpNICA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8160A0)
[Address] ***@*** (StrCmpNICW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812B70)
[Address] ***@*** (StrCmpNIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813670)
[Address] ***@*** (StrCmpNW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813770)
[Address] ***@*** (StrCmpW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110B0)
[Address] ***@*** (StrCpyNW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FFC)
[Address] ***@*** (StrCpyW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FD38)
[Address] ***@*** (StrDupA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E4C)
[Address] ***@*** (StrDupW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B812B50)
[Address] ***@*** (StrFormatByteSize64A) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FC00)
[Address] ***@*** (StrFormatByteSizeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FBF4)
[Address] ***@*** (StrFormatByteSizeEx) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8132D0)
[Address] ***@*** (StrFormatByteSizeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FC60)
[Address] ***@*** (StrFormatKBSizeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FB74)
[Address] ***@*** (StrFormatKBSizeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FBE0)
[Address] ***@*** (StrFromTimeIntervalA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B838AC8)
[Address] ***@*** (StrFromTimeIntervalW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B838A44)
[Address] ***@*** (StrIsIntlEqualA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E3C)
[Address] ***@*** (StrIsIntlEqualW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E2C)
[Address] ***@*** (StrNCatA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FCB8)
[Address] ***@*** (StrNCatW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FC74)
[Address] ***@*** (StrPBrkA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F5C)
[Address] ***@*** (StrPBrkW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8161E0)
[Address] ***@*** (StrRChrA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829FAC)
[Address] ***@*** (StrRChrIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F7C)
[Address] ***@*** (StrRChrIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F6C)
[Address] ***@*** (StrRChrW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816210)
[Address] ***@*** (StrRStrIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E9C)
[Address] ***@*** (StrRStrIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E8C)
[Address] ***@*** (StrRetToBSTR) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8160D0)
[Address] ***@*** (StrRetToBufA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82F9E8)
[Address] ***@*** (StrRetToBufW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811110)
[Address] ***@*** (StrRetToStrA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82FA98)
[Address] ***@*** (StrRetToStrW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813330)
[Address] ***@*** (StrSpnA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F0C)
[Address] ***@*** (StrSpnW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829EFC)
[Address] ***@*** (StrStrA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E7C)
[Address] ***@*** (StrStrIA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B816490)
[Address] ***@*** (StrStrIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110D0)
[Address] ***@*** (StrStrNIW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E5C)
[Address] ***@*** (StrStrNW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E6C)
[Address] ***@*** (StrStrW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813660)
[Address] ***@*** (StrToInt64ExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F2C)
[Address] ***@*** (StrToInt64ExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F3C)
[Address] ***@*** (StrToIntA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F4C)
[Address] ***@*** (StrToIntExA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829F1C)
[Address] ***@*** (StrToIntExW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8161F0)
[Address] ***@*** (StrToIntW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8110A0)
[Address] ***@*** (StrTrimA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829E1C)
[Address] ***@*** (StrTrimW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813320)
[Address] ***@*** (UrlApplySchemeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829760)
[Address] ***@*** (UrlApplySchemeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829750)
[Address] ***@*** (UrlCanonicalizeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829740)
[Address] ***@*** (UrlCanonicalizeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8136B0)
[Address] ***@*** (UrlCombineA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829728)
[Address] ***@*** (UrlCombineW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813750)
[Address] ***@*** (UrlCompareA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829714)
[Address] ***@*** (UrlCompareW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829704)
[Address] ***@*** (UrlCreateFromPathA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8296F4)
[Address] ***@*** (UrlCreateFromPathW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813BF0)
[Address] ***@*** (UrlEscapeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8296E4)
[Address] ***@*** (UrlEscapeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813720)
[Address] ***@*** (UrlFixupW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8296D4)
[Address] ***@*** (UrlGetLocationA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8296C4)
[Address] ***@*** (UrlGetLocationW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8296B4)
[Address] ***@*** (UrlGetPartA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82969C)
[Address] ***@*** (UrlGetPartW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B813700)
[Address] ***@*** (UrlHashA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829688)
[Address] ***@*** (UrlHashW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829678)
[Address] ***@*** (UrlIsA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829668)
[Address] ***@*** (UrlIsNoHistoryA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8295EC)
[Address] ***@*** (UrlIsNoHistoryW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B811150)
[Address] ***@*** (UrlIsOpaqueA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B82960C)
[Address] ***@*** (UrlIsOpaqueW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8295FC)
[Address] ***@*** (UrlIsW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8136A0)
[Address] ***@*** (UrlUnescapeA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B829658)
[Address] ***@*** (UrlUnescapeW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8136D0)
[Address] ***@*** (WhichPlatform) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B83A6D0)
[Address] ***@*** (wnsprintfA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8393AC)
[Address] ***@*** (wnsprintfW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B839318)
[Address] ***@*** (wvnsprintfA) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B8393F8)
[Address] ***@*** (wvnsprintfW) : urlmon.dll -> HOOKED (C:\windows\system32\SHLWAPI.dll @ 0x5B839368)
[Address] ***@*** (BiChangeApplicationStateForPackageName) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x5213AB80)
[Address] ***@*** (BiChangeSessionState) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521553D8)
[Address] ***@*** (BiNotifyNewSession) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52156F0C)
[Address] ***@*** (BiPtActivateWorkItem) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABCE0)
[Address] ***@*** (BiPtAssociateActivationProxy) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x5215A7EC)
[Address] ***@*** (BiPtAssociateApplicationExtensionClass) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABBD0)
[Address] ***@*** (BiPtCreateEventForPackageName) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABAC0)
[Address] ***@*** (BiPtDeleteEvent) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABA50)
[Address] ***@*** (BiPtDisassociateWorkItem) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB9B0)
[Address] ***@*** (BiPtEnumerateBrokeredEvents) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52156A70)
[Address] ***@*** (BiPtEnumerateWorkItemsForPackageName) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB8C0)
[Address] ***@*** (BiPtFreeMemory) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52135FE0)
[Address] ***@*** (BiPtQueryBrokeredEvent) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52135DF0)
[Address] ***@*** (BiPtQuerySystemStateBroadcastChannels) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52156A0C)
[Address] ***@*** (BiPtQueryWorkItem) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB804)
[Address] ***@*** (BiPtSignalEvent) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB738)
[Address] ***@*** (BiPtSignalMultipleEvents) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB660)
[Address] ***@*** (BiResetActiveSessionForPackage) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB57C)
[Address] ***@*** (BiSetActiveSessionForPackage) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB4E0)
[Address] ***@*** (BiUpdateLockScreenApplications) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521AB430)
[Address] ***@*** (DllCanUnloadNow) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52131340)
[Address] ***@*** (DllGetActivationFactory) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52132F60)
[Address] ***@*** (DllGetClassObject) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52132110)
[Address] ***@*** (PsmBlockAppStateChangeCompletion) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABDD4)
[Address] ***@*** (PsmIsProcessInApplication) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52147D60)
[Address] ***@*** (PsmQueryApplicationInformation) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521373F0)
[Address] ***@*** (PsmQueryApplicationList) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52132770)
[Address] ***@*** (PsmQueryCurrentAppState) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABD70)
[Address] ***@*** (PsmQueryProcessList) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521324F0)
[Address] ***@*** (PsmRegisterAppStateChangeNotification) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x5213CF00)
[Address] ***@*** (PsmRegisterApplicationNotification) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521371E0)
[Address] ***@*** (PsmSetApplicationState) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x5213A870)
[Address] ***@*** (PsmShutdownApplication) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABEC0)
[Address] ***@*** (PsmUnblockAppStateChangeCompletion) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABE0C)
[Address] ***@*** (PsmUnregisterAppStateChangeNotification) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x52140A68)
[Address] ***@*** (PsmWaitForAppResume) : AUDIOSES.DLL -> HOOKED (C:\Windows\System32\twinapi.dll @ 0x521ABE5C)

¤¤¤ Ruches Externes: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ Fichier HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost
::1 localhost


¤¤¤ MBR Verif: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) TOSHIBA MQ01ABF050 +++++
--- User ---
[MBR] a84dd93b5b19931ceaddbccc47850486
[BSP] df4f83c1f72e36823a12b0dfc7617313 : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!

Termine : << RKreport[0]_D_03252014_155855.txt >>
RKreport[0]_S_03252014_155750.txt
0
billmaxime Messages postés 50583 Date d'inscription   Statut Contributeur Dernière intervention   6 047
 
re

c'est bien, tu as supprimé ce qui a été trouvé a la fin du scan >>
Mode : Suppression -- Date : 03/25/2014 15:58:56

fait 1 scan rapide avec MBAM

exécute le en tant qu'administrateur (clic droit)

met le a jour (3ème bouton)

fais 1 scan rapide

si MBAM trouve quelque chose supprime la sélection

vérifie que tout soit bien cocher avant de supprimer

si MBAM demande le redémarrage du pc, fais le

poste le rapport via 1 copier/coller

le rapport s'affichera sur ton bureau et dans rapport/log de MBAM

merci

@+
0