Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirecting Virus


  • Please log in to reply
17 replies to this topic

#1 forcetri777

forcetri777

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 09 July 2009 - 04:26 PM

Hey,

I think my computer has a virus. Whenever I go on google and click on a link, it redirects me to another site such as overclick.com. Also, my background is all black, and my computer is acting slow in general.

If anyone could help that would be great!

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 09 July 2009 - 05:01 PM

Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 FEAPsycho

FEAPsycho

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 09 July 2009 - 05:07 PM

I'm not staff or anything, so i'm not authorized to help you. but, you should have hijackthis and malwarebytes

If you already have those, do a scan with HJT, and a QuickScan with MBAM, and have the logs from those scans ready to post at request of an authorized BC staff member.

EDIT: Haha, he posted a reply within the time i was writing this. okay bye now :thumbsup:

Edited by FEAPsycho, 09 July 2009 - 05:12 PM.


#4 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 09 July 2009 - 07:43 PM

HJT logs are not permitted in this area. Please do not post its log. Thanks!

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#5 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 11 July 2009 - 11:26 PM

Ok, here is the log from smitfraudfix:

SmitFraudFix v2.423

Scan done at 0:23:49.23, Sun 07/12/2009
Run from C:\Documents and Settings\Owner\My Documents\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\AVG\AVG8\avgcsrvx.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\Program Files\AVG\AVG8\avgcsrvx.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\AIM6\aim6.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\FinePixViewer\QuickDCF.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Java\jre1.6.0_05\bin\jucheck.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\internet explorer\iexplore.exe
c:\program files\aim toolbar\aimtbServer.exe
C:\WINDOWS\system32\cmd.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\WINDOWS\system32\LogFiles


C:\Documents and Settings\Owner


C:\DOCUME~1\Owner\LOCALS~1\Temp


C:\Documents and Settings\Owner\Application Data


Start Menu


C:\DOCUME~1\Owner\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"


o4Patch
!!!Attention, following keys are not inevitably infected!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix
!!!Attention, following keys are not inevitably infected!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
"LoadAppInit_DLLs"=dword:00000001


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"

RK

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""




DNS

Description: Realtek RTL8139 Family PCI Fast Ethernet NIC - Packet Scheduler Miniport
DNS Server Search Order: 24.92.226.40
DNS Server Search Order: 24.92.226.41

HKLM\SYSTEM\CCS\Services\Tcpip\..\{8422F602-73E2-4C57-A072-8FBF0CC0F9CA}: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS1\Services\Tcpip\..\{8422F602-73E2-4C57-A072-8FBF0CC0F9CA}: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS2\Services\Tcpip\..\{8422F602-73E2-4C57-A072-8FBF0CC0F9CA}: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS3\Services\Tcpip\..\{8422F602-73E2-4C57-A072-8FBF0CC0F9CA}: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=24.92.226.40 24.92.226.41
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=24.92.226.40 24.92.226.41


Scanning for wininet.dll infection


End

Thanks again for you time! :thumbsup:

#6 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 13 July 2009 - 02:03 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and unheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#7 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 14 July 2009 - 03:58 PM

Hey,

Here is the log from Dr. Web:

SmitfraudFix.exe\SmitfraudFix\Process.exe;C:\Documents and Settings\KIDS\My Documents\Downloads\SmitfraudFix.exe;Tool.Prockill;;
SmitfraudFix.exe\SmitfraudFix\restart.exe;C:\Documents and Settings\KIDS\My Documents\Downloads\SmitfraudFix.exe;Tool.ShutDown.14;;
SmitfraudFix.exe;C:\Documents and Settings\KIDS\My Documents\Downloads;Archive contains infected objects;Moved.;
Process.exe;C:\Documents and Settings\Owner\My Documents\SmitfraudFix;Tool.Prockill;Incurable.Moved.;
restart.exe;C:\Documents and Settings\Owner\My Documents\SmitfraudFix;Tool.ShutDown.14;Incurable.Moved.;
driver.dll.vir;C:\Qoobox\Quarantine\C\Program Files\driver;BackDoor.Siggen.204;Deleted.;
hjgruibrxlthes.dll.vir;C:\Qoobox\Quarantine\C\WINDOWS\system32;BackDoor.Tdss.265;Deleted.;
hjgruixjnmefxk.dll.vir;C:\Qoobox\Quarantine\C\WINDOWS\system32;BackDoor.Tdss.265;Deleted.;
hjgruivxbfdiod.sys.vir;C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers;BackDoor.Tdss.266;Deleted.;
A0111247.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP294;Trojan.Fakealert.4405;Deleted.;
A0111248.exe;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP294;Trojan.Fakealert.4332;Deleted.;
A0111290.exe;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP294;Trojan.DownLoader.59802;Deleted.;
A0115835.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP317;Trojan.Fakealert.4405;Deleted.;
A0115837.sys;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP317;BackDoor.Siggen.204;Deleted.;
A0115839.exe;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP317;BackDoor.Siggen.204;Deleted.;
A0115840.exe;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP317;Trojan.Fakealert.4435;Deleted.;
A0116212.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP317;BackDoor.Siggen.204;Deleted.;
A0117549.sys;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP323;BackDoor.Tdss.266;Deleted.;
A0117551.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP323;BackDoor.Tdss.265;Deleted.;
A0117575.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP323;BackDoor.Siggen.204;Deleted.;
A0118864.dll;C:\System Volume Information\_restore{8BB20CFC-EBE5-425A-9D0E-22999148DD09}\RP329;BackDoor.Tdss.265;Deleted.;
Process.exe;C:\WINDOWS\system32;Tool.Prockill;Incurable.Moved.;

Thanks! :thumbsup:

#8 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 14 July 2009 - 06:22 PM

Good ... Now let's do a few things.
Let's flush system restore...

Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok"
  • Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" Tab.
  • Click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Please rerun Dr.WebCureit and post a fresh log.

Next...

Install RootRepeal

Click here - Official Rootrepeal Site, and download RootRepeal.zip. I recommend downloading to your desktop.
Fatdcuk at Malwarebytes posted a comprehensive tutorial - Self Help guide can be found here if needed.: Malwarebytes Removal and Self Help Guides.
Click RootRepeal.exe to open the scanner.
Click the Report tab, now click on Scan. A Window will open asking what to include in the scan.
Check the following items:
Drivers
Files
Processes
SSDT
Stealth Objects
Hidden Services

Click OK
Scan your C Drive (Or your current system drive) and click OK. The scan will begin. This my take a moment, so please be patient. When the scan completes, click Save Report.
Name the log RootRepeal.txt and save it to your Documents folder - (Default folder).
Paste the log into your next reply.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#9 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 21 July 2009 - 07:58 PM

Alright,

I did disk cleanup and flushed system restore.

Then, I scanned my computer with Dr. Web again, but it didn't detect anything and didn't give me any log to save.

I then downloaded RootRepeal. Upon clicking on the program, a dialog box appeared saying, "Could not read the boot sector. Try adjusting the disk acess level in the options dialog." I adjusting the level to high, but it still wouldn't run a scan for me. After trying to scan, it gave me a log anyways, unless this is the one you're looking for. I don't know but here is the log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/07/21 20:47
Program Version: Version 1.3.2.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name:
Image Path:
Address: 0xF73D9000 Size: 98304 File Visible: No Signed: -
Status: -

Name:
Image Path:
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF3D89000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B34000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PCI_PNP6580
Image Path: \Driver\PCI_PNP6580
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB9038000 Size: 49152 File Visible: No Signed: -
Status: -

Name: spaz.sys
Image Path: spaz.sys
Address: 0xF748D000 Size: 1048576 File Visible: No Signed: -
Status: -

Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Stealth Objects
-------------------
Object: Hidden Module [Name: geyekrnqtqmrlt.dll]
Process: svchost.exe (PID: 788) Address: 0x008e0000 Address: 49152

Object: Hidden Module [Name: geyekrnkiccfgobd.tmpll]
Process: svchost.exe (PID: 788) Address: 0x10000000 Address: 28672

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x86eceb60 Address: 11

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x86f671f8 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CREATE]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CLOSE]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_READ]
Process: System Address: 0x85e66f30 Address: 11

Object: Hidden Code [Driver: Fastfat, IRP_MJ_WRITE]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_EA]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_EA]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CLEANUP]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_PNP]
Process: System Address: 0x86177500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CREATE]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CLOSE]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_READ]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_WRITE]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_POWER]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_PNP]
Process: System Address: 0x8608a500 Address: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_READ]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_WRITE]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_EA]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_EA]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CLEANUP]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_POWER]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_PNP]
Process: System Address: 0x86c59278 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_EA]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_EA]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLEANUP]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x86c7a990 Address: 99

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x86d55500 Address: 121

Object: Hidden Code [Driver: d347prt, IRP_MJ_CREATE]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_CLOSE]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_READ]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_WRITE]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_QUERY_EA]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SET_EA]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_CLEANUP]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_POWER]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: d347prt, IRP_MJ_PNP]
Process: System Address: 0x86b13ac0 Address: 99

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x86f691f8 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x86d60500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x86d6a500 Address: 121

Object: Hidden Code [Driver: Rdbss, IRP_MJ_READ]
Process: System Address: 0x86b596d8 Address: 11

Object: Hidden Code [Driver: Srv, IRP_MJ_READ]
Process: System Address: 0x86bc17c0 Address: 11

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x86b44810 Address: 11

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x86bb3440 Address: 121

Object: Hidden Code [Driver: Program Fil, IRP_MJ_READ]
Process: System Address: 0x86bab710 Address: 11

Object: Hidden Code [Driver: NTPN, IRP_MJ_READ]
Process: System Address: 0x86b5b7a8 Address: 11

Object: Hidden Code [Driver: Fs_Rec, IRP_MJ_READ]
Process: System Address: 0x86ac1f20 Address: 11

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_CREATE]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_CLOSE]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_READ]
Process: System Address: 0x86c27d90 Address: 11

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_CLEANUP]
Process: System Address: 0x8621b500 Address: 121

Object: Hidden Code [Driver: Cdfs؅ః瑎て蠠輨꼩᤻(, IRP_MJ_PNP]
Process: System Address: 0x8621b500 Address: 121

==EOF==

Thanks! :thumbsup:

#10 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 21 July 2009 - 08:09 PM

Let's take a look with a second tool. There are two items that need to be verified.

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#11 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 03 August 2009 - 05:33 PM

Hey,

Sorry for the delay of this response. I was on vacation.

Ok, here is the log from gmer:

GMER 1.0.15.15011 [vgs4nz1s.exe] - http://www.gmer.net
Rootkit scan 2009-08-03 18:22:42
Windows 5.1.2600 Service Pack 3


---- System - GMER 1.0.15 ----

INT 0x62 ? 86F68BF8
INT 0x63 ? 86DC6F00
INT 0x73 ? 86DC6F00
INT 0x82 ? 86F68BF8
INT 0x83 ? 86F68BF8
INT 0x83 ? 86F68BF8
INT 0x83 ? 86DC6F00
INT 0x83 ? 86F68BF8
INT 0xB4 ? 86DC6F00

Code 86D2C3F0 ZwEnumerateKey
Code 86F354B8 ZwFlushInstructionCache
Code 86CD41DE ZwSaveKey
Code 86DD229E ZwSaveKeyEx
Code 86D2482E IofCallDriver
Code 86D25A36 IofCompleteRequest

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!IofCallDriver 804E13A7 5 Bytes JMP 86D24833
.text ntoskrnl.exe!IofCompleteRequest 804E17BD 5 Bytes JMP 86D25A3B
PAGE ntoskrnl.exe!ZwEnumerateKey 80578E14 5 Bytes JMP 86D2C3F4
PAGE ntoskrnl.exe!ZwFlushInstructionCache 80587BFB 5 Bytes JMP 86F354BC
PAGE ntoskrnl.exe!ZwSaveKey 8065616E 5 Bytes JMP 86CD41E2
PAGE ntoskrnl.exe!ZwSaveKeyEx 80656259 5 Bytes JMP 86DD22A2
? spqf.sys The system cannot find the file specified. !
.text USBPORT.SYS!DllUnload F72558AC 5 Bytes JMP 86DC64E0

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\winlogon.exe[236] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 0066000A
.text C:\WINDOWS\system32\services.exe[284] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 003A000A
.text C:\WINDOWS\system32\lsass.exe[296] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 0067000A
.text C:\WINDOWS\system32\svchost.exe[464] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 0066000A
.text C:\WINDOWS\system32\svchost.exe[640] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 0066000A
.text ...

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \WINDOWS\System32\Drivers\SCSIPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 86F6A2D8
IAT pci.sys[ntoskrnl.exe!IoDetachDevice] [F74BFC4C] spqf.sys
IAT pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [F74BFCA0] spqf.sys
IAT \SystemRoot\system32\DRIVERS\USBPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 86DC65E0
IAT \SystemRoot\system32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [F749F048] spqf.sys

---- Modules - GMER 1.0.15 ----

Module _________ F73D9000-F73F1000 (98304 bytes)
---- Processes - GMER 1.0.15 ----

Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\system32\winlogon.exe [236] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\system32\services.exe [284] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\system32\lsass.exe [296] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [556] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [640] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [876] 0x10000000
Library \\?\globalroot\systemroot\system32\geyekrlgkvccad.dll (*** hidden *** ) @ C:\Documents and Settings\KIDS\My Documents\Downloads\vgs4nz1s.exe [980] 0x10000000

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\system32\drivers\geyekrryojuxwo.sys (*** hidden *** ) [SYSTEM] geyekrejsuqapw <-- ROOTKIT !!!

---- EOF - GMER 1.0.15 ----

Thanks for your time! :thumbsup:

#12 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 03 August 2009 - 06:32 PM

We still have a rootkit present

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
  • Make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#13 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 04 August 2009 - 06:59 PM

Ok,

After scanning with Sophos, they didn't recommend any removal of files just to let you know.

Here is the log:


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/4/2009 at 18:17:18 PM
User "KIDS" on computer "TD-935573C850EC"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\geyekrejsuqapw
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\geyekrejsuqapw
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Grisoft
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run\AVG7_Run
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\WINDOWS\temp\geyekrhyluxtbqrf.tmp
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7EXCZNSS\mMG-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=5633;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3DrkHXFDP22GD%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\47YCO8VZ\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=537617;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3DiF8G-UdhawH%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\KIDS\My Documents\My Videos\_Copy of WD Sync 04-18-2008\C\Documents and Settings\Owner\My Documents\My Music\iTunes\iTunes Music\Various Artists\Tony Hawk's American Wasteland\AlbumArt_{4343B3D3-98FA-43A9-84DD-C84ED9948FC2}_Large.jpg
Hidden: file C:\Documents and Settings\KIDS\My Documents\My Videos\_Copy of WD Sync 04-18-2008\C\Documents and Settings\Owner\My Documents\My Music\iTunes\iTunes Music\Various Artists\Tony Hawk's American Wasteland\AlbumArt_{4343B3D3-98FA-43A9-84DD-C84ED9948FC2}_Small.jpg
Hidden: file C:\WINDOWS\system32\geyekrlcuxgvyl.dat
Hidden: file C:\WINDOWS\system32\drivers\sptd.sys
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\38DGYG6T\;net=cm;u=cm-40931599_1248999651,1104d01fa609444,nfl,cm.nfl_L-cm.DE_CG_trk;;ord1=795346;sz=300x250;contx=nfl;btg=cm.nfl_L;btg=cm.DE_CG_trk;ord=0[1].3474262286511919
Hidden: file C:\WINDOWS\system32\geyekrufuoelal.dat
Hidden: file C:\WINDOWS\system32\drivers\geyekrryojuxwo.sys
Hidden: file C:\WINDOWS\system32\geyekrnqtqmrlt.dll
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CITDTWOC\be_sports;net=q1;u=q1-57130381_1248999972,1104d01fa609444,nfl,cm.nfl_L-cm.DE_CG_trk;;ord1=439076;sz=728x90;contx=nfl;btg=cm.nfl_L;btg=cm[1].DE_CG_trk;ord=999971943
Hidden: file C:\WINDOWS\system32\geyekrlgkvccad.dll
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7EXCZNSS\article;s1=news;s2=article;slot=right;nfl=ad;pos=;tile=3;sz=300x250;url=news_article_3_practice_notes___day_7_fd95e78f_d4dc_4975_9d6a_057c2766c55d;ord=271280[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ATGVFGJK\r;s1=news;s2=coaches_corner;slot=right;nfl=ad;pos=;tile=2;sz=235x90;url=news_article_3_practice_notes___day_8_7ef3cc73_0d70_4fa4_b14e_85dafe987a46;ord=5089064[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\38DGYG6T\other;s1=buf;s2=other;slot=top;nfl=ad;pos=;tile=1;sz=728x90;url=news_article_3_edwards_prepared_for_long_haul_f32c2d4e_1c0c_4efa_82bd_b97771ba3df2;ord=1878928[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\38DGYG6T\s;s2=coaches_corner;slot=right;nfl=ad;pos=;tile=2;sz=235x90;url=news_article_3_edwards_prepared_for_long_haul_f32c2d4e_1c0c_4efa_82bd_b97771ba3df2;ord=1878928[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CITDTWOC\s1=news;s2=article;slot=right;nfl=ad;pos=;tile=3;sz=300x250;url=news_article_3_edwards_prepared_for_long_haul_f32c2d4e_1c0c_4efa_82bd_b97771ba3df2;ord=1878928[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\icle;s1=news;s2=article;slot=companion;nfl=ad;pos=;tile=4;sz=300x60;url=news_article_3_practice_notes___day_8_7ef3cc73_0d70_4fa4_b14e_85dafe987a46;ord=7647437[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CITDTWOC\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=432888;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3DkW5uGv-zBNF%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7EXCZNSS\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=963606;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3DkWGzIHdw1RD%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\6X3FZE5W\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=163121;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3D_265_dYgLbF%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=706079;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3DJn7pVwpm0xA%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7EXCZNSS\G-MnAanPzGh1a1G6M2HPaH,GhAG-PmMG-MnAan,GhAG-PmMG-MnAan,tt4P6h1PBMa,tt4P6h1PBMa;ts=437793;smuid=t9oHZv9bwc9L0C;p=ui%3Dt9oHZv9bwc9L0C%3Btr%3Dqa6A7RGmAKA%3Btm%3D0-0[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\7EXCZNSS\net=cm;u=cm-84973225_1249132720,1104d01fa609444,none,cm.nfl_M-cm.DE_CG_trk;;ord1=491746;sz=300x250;contx=none;btg=cm.nfl_M;btg=cm.DE_CG_trk;ord=0[1].8316030328704849
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\38DGYG6T\er;s1=news;s2=coaches_corner;slot=right;nfl=ad;pos=;tile=2;sz=235x90;url=news_article_3_practice_notes___day_7_fd95e78f_d4dc_4975_9d6a_057c2766c55d;ord=271280[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\gs=nil;gd=nil;tods=nil;tode=nil;tf=nil;tp=nil;dow=nil;atf=nil;cg=40;af=10;il=2782;sz=300x250;tile=2;u=il-2782_ID-08131AB4FC260B9FDAE321[1].E9BBA;ord=5584727876523649
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\N5K62N34\1945,1104d01fa609444,nfl,cm.sports_L-cm.nfl_M-cm.DE_CG_trk;;ord1=168123;sz=300x250;contx=nfl;btg=cm.sports_L;btg=cm.nfl_M;btg=cm.DE_CG_trk;ord=0[1].17064085543281537
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\71957,1104d01fa609444,nfl,cm.sports_L-cm.nfl_M-cm.DE_CG_trk;;ord1=492855;sz=300x250;contx=nfl;btg=cm.sports_L;btg=cm.nfl_M;btg=cm.DE_CG_trk;ord=0[1].8848235352902716
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\article;s1=news;s2=article;slot=right;nfl=ad;pos=;tile=3;sz=300x250;url=news_article_3_practice_notes___day_8_7ef3cc73_0d70_4fa4_b14e_85dafe987a46;ord=5089064[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\BOSB529Y\r;s1=news;s2=coaches_corner;slot=right;nfl=ad;pos=;tile=2;sz=235x90;url=news_article_3_practice_notes___day_8_7ef3cc73_0d70_4fa4_b14e_85dafe987a46;ord=7647437[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\BOSB529Y\article;s1=news;s2=article;slot=right;nfl=ad;pos=;tile=3;sz=300x250;url=news_article_3_practice_notes___day_8_7ef3cc73_0d70_4fa4_b14e_85dafe987a46;ord=7647437[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EG0245WX\_main.js.v48851.48851.48851.48851.48851.38771.48851.48851.75181.38771.71746.71745.62864.38771.66362.74013.74643.69832.38771.63688.38771.73289.67088.55944.73491[1].14
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\N5K62N34\,1104d01fa609444,music,cm.sports_L-cm.nfl_M-cm.DE_CG_trk;;ord1=889826;sz=160x600;contx=music;btg=cm.sports_L;btg=cm.nfl_M;btg=cm.DE_CG_trk;ord=0[1].12250872460642253
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\BOSB529Y\cm.music_L-cm.nfl_M-cm.sports_L-cm.DE_CG_trk;;ord1=792580;sz=300x250;contx=nfl;btg=cm.music_L;btg=cm.nfl_M;btg=cm.sports_L;btg=cm.DE_CG_trk;ord=0[1].5657436653469245
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\BOSB529Y\m.music_L-cm.nfl_M-cm.sports_L-cm.DE_CG_trk;;ord1=124414;sz=300x250;contx=nfl;btg=cm.music_L;btg=cm.nfl_M;btg=cm.sports_L;btg=cm.DE_CG_trk;ord=0[1].09022167822771143
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\CITDTWOC\d_ctrapp,mod_scrwh,mod_zoom,mod_exdom,mod_kbrd,mod_tfcapp,mod_lyctr,mod_lyrs,mod_qdt,mod_trtlr,mod_cbl,mod_attr,mod_act,mod_sha1,mod_act_s,mod_mssvt,mod_appiw}[1].js
Info: Starting disk scan of E: (NTFS).
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\pft5~tmp\Setup.exe
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\MacroMix\MacroMix.x32
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\SWA\swadcmpr.x32
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\SWA\SWASTRM.X32
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\DirectSound\DirectSound.x32
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\SoundControl\Sound Control.x32
Hidden: file E:\Documents and Settings\Tim\Application Data\Macromedia\Shockwave Player\xtras\download\MacromediaInc\FlashAsset\Flash Asset.x32
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\OBJPJCUW\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[1].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\Tim\Desktop\OpenOffice.org 2.1 Installation Files\instmsia.exe
Hidden: file E:\Documents and Settings\Tim\Desktop\OpenOffice.org 2.1 Installation Files\instmsiw.exe
Hidden: file E:\Documents and Settings\Tim\Desktop\OpenOffice.org 2.1 Installation Files\setup.exe
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\PMI0J8MS\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[2].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[4].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\OBJPJCUW\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[3].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\B3U4IURR\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[1].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\Tim\My Documents\iTunesSetup.exe
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\B3U4IURR\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[2].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[5].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\ADMInstaller.exe
Hidden: file E:\Documents and Settings\Tim\My Documents\wmp11-windowsxp-x86-enu.exe
Hidden: file E:\7b4e0acd83df3b179850b49f\update\updspapi.dll
Hidden: file E:\7b4e0acd83df3b179850b49f\update\wpdinstallutil.dll
Hidden: file E:\7b4e0acd83df3b179850b49f\update\update.exe
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\MSWD3.tmp
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\MSWD6.tmp
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[1].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\PMI0J8MS\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[1].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\OBJPJCUW\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[2].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[1].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Dskunkdevil93
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\B3U4IURR\k,MBEAAIEAAACKHgkANUADAAIABAAAAP8AAAAGDwIABgOZAAAAD18CAPn0BAAAAAAAAAAAAAAAAAAAAAAAAAAAALsabEcAAAAA,,http%3A%2F%2Fwww.sing365.com%2Fartist%2Fa[1].html,;ord=1198267067
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\OBJPJCUW\AABLFBAAAAAAAAAAAAAAAAAAAAAAAAAAAAEwbbEcAAAAA,,http%3A%2F%2Fwww.sing365.com%2Fmusic%2Flyric[1].nsf%2Fatreyu-lyrics%2Fac9f809b7d3402a948256c490019a925,;ord=1198267212
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[2].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Dskunkdevil93
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[2].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\kids\Local Settings\Temporary Internet Files\Content.IE5\426FD80K\dref=http%253A%252F%252Fwww.aim.com%252Fredirects%252Finclient%252FAIM_UAC[3].adp%253Fmagic%253D93236874%2526width%253D120%2526height%253D90%2526sn%253Djohnnyice929
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\DJ6LFPGT\ss;ad=bb;ad=hp;sz=160x600,300x250,336x850;fromrss=n;rss=n;poe=yes;page=article;cn=yes;pnode=admin;tile=2;wpid=adminmerchandise_clsadsearchcgi;ord=379877005233870650[1]
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\EXVUL0NP\%252520broken%252520heart%2526results-process%253Ddefault%2526dispatch%253Dsearch%252Fref%253Dpd_sl_aw_tops-1_music_26900167_1%2526results-process%253Ddefault[1].htm
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\MSS6YE3K\BNAAAAP8AAAACEgAABgLE-QAAOocDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKtZrkYAAAAA,,http%3A%2F%2Fwww.ultimate-guitar.com%2Ftabs%2Fbreaking_benjamin_tabs3[1].htm,;ord=1185831339
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\V1BLPGQF\Bsecure[1].exe
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\rbSolnUpdateENU.2.4.1.exe
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temp\rbSolnUpdateENU.2.1.0.exe
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\7IZF9F17\teningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=leaderboard;sz=728x90;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=5809037;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\4BOSU6W7\Instrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=sponsorshipheader;sz=726x25;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=4022244;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\MPH5K1R4\nEasyListeningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=A1;sz=174x150;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=8679789;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\8HEN4PU7\teningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].sharepage;placement=leaderboard;sz=728x90;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=3147153;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\KXAV0XI3\teningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].sharepage;placement=skyscraper;sz=160x600;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=5610012;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\MPH5K1R4\steningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=leaderboard;sz=728x90;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=805110;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\7IZF9F17\Instrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=sponsorshipheader;sz=726x25;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=2799141;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\PNRNRCM5\nEasyListeningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=A1;sz=174x150;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=5375734;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\KXAV0XI3\teningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=leaderboard;sz=728x90;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=6729400;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\FRQM8Z4F\Instrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=sponsorshipheader;sz=726x25;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=6603601;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\Y3G7FGTP\nEasyListeningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=A1;sz=174x150;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=3949393;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\4BOSU6W7\teningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=leaderboard;sz=728x90;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=3799091;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\29RTESQL\Instrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=sponsorshipheader;sz=726x25;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=5724347;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\FRQM8Z4F\nEasyListeningInstrumental;toplevelgenre=ChristianGospel;loc=rotw[1].albumpage;placement=A1;sz=174x150;subplan=0;pmt=n;login=false;rhapx=false;anon=false;ord=1359259;
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\KXAV0XI3\copagenumZ1QQflocZ1QQfromZR10QQfsooZ2QQfsopZ2QQftrtZ1QQftrvZ1QQsabfmtsZ1QQsacatZ619QQsaobfmtsZinsifQQsaprchiZQQsaprcloZQQsaslcZ2QQsbrexpZWD2SQQssPageNameZWD2S[1].htm
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\V1BLPGQF\%252520broken%252520heart%2526results-process%253Ddefault%2526dispatch%253Dsearch%252Fref%253Dpd_sl_aw_tops-1_music_26900167_1%2526results-process%253Ddefault[1].htm
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\7IZF9F17\favicon[4].ico
Hidden: file E:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\8TIVCHY3\FD%3Dsports%2FS%3D95858717%3ALREC%2F_ylt%3DAmVfif6oRw_wr8SLMv9RZdMdsLYF%2FY%3DYAHOO%2FEXP%3D1196908315%2FA%3D4940782%2FR%3D0%2F%2A%24,http%3A%2F%2Fsports.yahoo[1].htm
Stopped logging on 8/4/2009 at 19:39:49 PM

Thanks!

#14 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:08:48 PM

Posted 04 August 2009 - 07:53 PM

Please rerun Sophos and delete the following files:
  • Hidden: file C:\WINDOWS\temp\geyekrhyluxtbqrf.tmp
  • Hidden: file C:\WINDOWS\system32\geyekrlcuxgvyl.dat
  • Hidden: file C:\WINDOWS\system32\geyekrufuoelal.dat
  • Hidden: file C:\WINDOWS\system32\drivers\geyekrryojuxwo.sys
  • Hidden: file C:\WINDOWS\system32\geyekrnqtqmrlt.dll
  • Hidden: file C:\WINDOWS\system32\geyekrlgkvccad.dll


It is very important that you reboot immediately after deleting these files. Upon reboot, update and rerun Malwarebytes. Post the fresh log.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#15 forcetri777

forcetri777
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Albany, NY
  • Local time:08:48 PM

Posted 06 August 2009 - 04:04 PM

Ok,

After scanning with sophos, it showed all but the first file listed. I deleted the rest.

Here is the MBAM log:

Malwarebytes' Anti-Malware 1.40
Database version: 2566
Windows 5.1.2600 Service Pack 3

8/6/2009 7:44:36 AM
mbam-log-2009-08-06 (07-44-36).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 277657
Time elapsed: 5 hour(s), 19 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{c48635ad-d6b5-3ee4-aaa2-540d5a173658} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users