Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ask.com, ToSeekA, and 404 Error Redirects for Firefox


  • This topic is locked This topic is locked
6 replies to this topic

#1 Twistendo

Twistendo

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 31 August 2009 - 12:03 PM

A couple of days ago, I got this nasty "Fake Windows Security Alert" virus that attempted to force me into using an obviously phony scanner. It also blocked me from going to anti-virus websites (i.e. Microsoft, Malware Anti-Bytes) on IE/Firefox, it slowed down my computer greatly, it blocked me from using Chrome, my firewall or installing any new anti-virus programs that needed access to the internet (AVG), and it installed porn links onto my computer.

Thankfully, I had Spybot S&D which got rid of most of the virus applications. The annoying pop-ups are gone, but I still have constant redirects from any anti-virus website, and restriction from Chrome. And, whenever I try to search for help, Google redirects me to ToSeekA, which I've never installed as an add-on. I've went through an array of anti-virus programs (Ad-Aware, HijackThis, Malware Anti-Bytes, Spyware Doctor, Spybot S&D [again], and GooredFix), but all of them failed. Please help.
*Using Windows XP, and Firefox as a browser

Edited by The weatherman, 31 August 2009 - 12:06 PM.
Moved from XP to a more appropriate forum. Tw


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,725 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:33 AM

Posted 31 August 2009 - 01:35 PM

Hello,did they fail to run or found nothing?

Some types of malware will disable MBAM (MalwareBytes) and other security tools. If MBAM will not install, try renaming it.

Before saving any of your security programs, rename them first. For example, before you save Malwarebytes', rename it to something like MBblah.exe and then click on Save and save it to your desktop. Same thing after you install it. Before running it, rename the main executable file first
***
Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run..


MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.

alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


If Still no joy then...
We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Twistendo

Twistendo
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 31 August 2009 - 04:35 PM

When I said it failed, it never got rid of the virus.
And these anti-virus programs didn't work as I'm still stuck with ToSeekA/404 redirects.
:<

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 5.1.2600 Service Pack 3

8/28/2009 3:00:01 PM
mbam-log-2009-08-28 (15-00-01).txt

Scan type: Quick Scan
Objects scanned: 139038
Time elapsed: 36 minute(s), 16 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 15
Registry Values Infected: 24
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 45

Memory Processes Infected:
C:\WINDOWS\sc.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Memory Modules Infected:
c:\WINDOWS\system32\evdoserver.dll (Backdoor.Bot) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{92c2b887-c066-4678-b6e0-cb39205718b7} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{92c2b887-c066-4678-b6e0-cb39205718b7} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cxxamp32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winprocsm (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Backdoor.Bot) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\guid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\D3 (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\pr (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\BN (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\gd (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\D1 (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MSN\D2 (Spyware.Ambler) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security center (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ms18_word (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mEv (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\Seekapp (Adware.Seekapp) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\system32\evdoserver.dll (Backdoor.Bot) -> Delete on reboot.
C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiwow64.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dvdpaly.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\EvdoServer.dllx (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\t4m0_437360155357.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\t4m0_70344519952.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tmp0_237698515209.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tmp0_89541775564.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\VRT1B.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0QT4NTA8\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0QT4NTA8\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0QT4NTA8\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\320U66GO\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\320U66GO\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\AJN89U15\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\AJN89U15\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\AJN89U15\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\EJYH55YM\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\EJYH55YM\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Seekapp\seekapp122.exe (Adware.Seekapp) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Seekapp\seekapp125.exe (Adware.Seekapp) -> Quarantined and deleted successfully.
C:\Documents and Settings\Hassan\ms18_word.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\ms18_word.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\3.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\7.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\9.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\B.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\c2d.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\idm.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Hassan\oashdihasidhasuidhiasdhiashdiuasdhasd (Trace.Pandex) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\oashdihasidhasuidhiasdhiashdiuasdhasd (Trace.Pandex) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\oashdihasidhasuidhiasdhiashdiuasdhasd (Trace.Pandex) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiawow32.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\sc.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/31 17:01
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEEB6A000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF8B20000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PCI_PNP0756
Image Path: \Driver\PCI_PNP0756
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEDBFF000 Size: 49152 File Visible: No Signed: -
Status: -

Name: sphf.sys
Image Path: sphf.sys
Address: 0xF8456000 Size: 1052672 File Visible: No Signed: -
Status: -

Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\Program Files\imageCATDR0I9.jpg
Status: Locked to the Windows API!

Path: c:\windows\ie7\ie4uinit.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\ie7\iedw.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\ie7\mshta.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\ie7\iexplore.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntuninstallkb958215$\iedw.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntuninstallkb923561$\wordpad.exe
Status: Allocation size mismatch (API: 151552, Raw: 131072)

Path: c:\windows\$ntuninstallkb939683$\unregmp2.exe
Status: Allocation size mismatch (API: 184320, Raw: 172032)

Path: c:\windows\$ntuninstallkb956572$\sc.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntuninstallkb956572$\services.exe
Status: Allocation size mismatch (API: 98304, Raw: 77824)

Path: c:\windows\$ntuninstallkb956572$\wmiprvse.exe
Status: Allocation size mismatch (API: 147456, Raw: 126976)

Path: c:\windows\$ntservicepackuninstall$\migload.exe
Status: Allocation size mismatch (API: 94208, Raw: 73728)

Path: c:\windows\$ntservicepackuninstall$\migregdb.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\migwiz.exe
Status: Allocation size mismatch (API: 139264, Raw: 118784)

Path: c:\windows\$ntservicepackuninstall$\mmc.exe
Status: Allocation size mismatch (API: 544768, Raw: 524288)

Path: c:\windows\$ntservicepackuninstall$\mnmsrvc.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\mobsync.exe
Status: Allocation size mismatch (API: 122880, Raw: 102400)

Path: c:\windows\$ntservicepackuninstall$\telnet.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\tlntadmn.exe
Status: Allocation size mismatch (API: 61440, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\tlntsess.exe
Status: Allocation size mismatch (API: 77824, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\tlntsvr.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\tourstart.exe
Status: Allocation size mismatch (API: 212992, Raw: 192512)

Path: c:\windows\$ntservicepackuninstall$\tourstrt.exe
Status: Allocation size mismatch (API: 212992, Raw: 192512)

Path: c:\windows\$ntservicepackuninstall$\tracerpt.exe
Status: Allocation size mismatch (API: 167936, Raw: 163840)

Path: c:\windows\$ntservicepackuninstall$\tracert.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\services.exe
Status: Allocation size mismatch (API: 98304, Raw: 77824)

Path: c:\windows\$ntservicepackuninstall$\sessmgr.exe
Status: Allocation size mismatch (API: 114688, Raw: 94208)

Path: c:\windows\$ntservicepackuninstall$\sethc.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\setup.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\setup50.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\shmgrate.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\shrpubw.exe
Status: Allocation size mismatch (API: 53248, Raw: 32768)

Path: c:\windows\$ntservicepackuninstall$\shtml.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\perfmon.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\pinball.exe
Status: Allocation size mismatch (API: 200704, Raw: 180224)

Path: c:\windows\$ntservicepackuninstall$\ping.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\ctfmon.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\extrac32.exe
Status: Allocation size mismatch (API: 61440, Raw: 40960)

Path: c:\windows\$ntservicepackuninstall$\forcedos.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\fxsclnt.exe
Status: Allocation size mismatch (API: 114688, Raw: 94208)

Path: c:\windows\$ntservicepackuninstall$\icwconn1.exe
Status: Allocation size mismatch (API: 122880, Raw: 102400)

Path: c:\windows\$ntservicepackuninstall$\net.exe
Status: Allocation size mismatch (API: 53248, Raw: 32768)

Path: c:\windows\$ntservicepackuninstall$\net1.exe
Status: Allocation size mismatch (API: 114688, Raw: 106496)

Path: c:\windows\$ntservicepackuninstall$\netdde.exe
Status: Allocation size mismatch (API: 98304, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\netsetup.exe
Status: Allocation size mismatch (API: 331776, Raw: 311296)

Path: c:\windows\$ntservicepackuninstall$\netsh.exe
Status: Allocation size mismatch (API: 57344, Raw: 36864)

Path: c:\windows\$ntservicepackuninstall$\diskpart.exe
Status: Allocation size mismatch (API: 135168, Raw: 114688)

Path: c:\windows\$ntservicepackuninstall$\dllhost.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\dmadmin.exe
Status: Allocation size mismatch (API: 184320, Raw: 163840)

Path: c:\windows\$ntservicepackuninstall$\dmremote.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\dplaysvr.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\wbemtest.exe
Status: Allocation size mismatch (API: 98304, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\wiaacmgr.exe
Status: Allocation size mismatch (API: 299008, Raw: 278528)

Path: c:\windows\$ntservicepackuninstall$\wscntfy.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\wscript.exe
Status: Allocation size mismatch (API: 90112, Raw: 73728)

Path: c:\windows\$ntservicepackuninstall$\winver.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\wmic.exe
Status: Allocation size mismatch (API: 245760, Raw: 225280)

Path: c:\windows\$ntservicepackuninstall$\userinit.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\utilman.exe
Status: Allocation size mismatch (API: 57344, Raw: 40960)

Path: c:\windows\$ntservicepackuninstall$\vssvc.exe
Status: Allocation size mismatch (API: 180224, Raw: 159744)

Path: c:\windows\$ntservicepackuninstall$\wab.exe
Status: Allocation size mismatch (API: 53248, Raw: 32768)

Path: c:\windows\$ntservicepackuninstall$\wabmig.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\uploadm.exe
Status: Allocation size mismatch (API: 122880, Raw: 102400)

Path: c:\windows\$ntservicepackuninstall$\upnpcont.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\ups.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\sysinfo.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\sysocmgr.exe
Status: Allocation size mismatch (API: 77824, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\systeminfo.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\ssmyst.scr
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\sspipes.scr
Status: Allocation size mismatch (API: 409600, Raw: 389120)

Path: c:\windows\$ntservicepackuninstall$\ssstars.scr
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\sstext3d.scr
Status: Allocation size mismatch (API: 483328, Raw: 462848)

Path: c:\windows\$ntservicepackuninstall$\stimon.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\svchost.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\spnpinst.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\spoolsv.exe
Status: Allocation size mismatch (API: 57344, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\sigverif.exe
Status: Allocation size mismatch (API: 53248, Raw: 32768)

Path: c:\windows\$ntservicepackuninstall$\skeys.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\smbinst.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\smi2smir.exe
Status: Allocation size mismatch (API: 172032, Raw: 151552)

Path: c:\windows\$ntservicepackuninstall$\smlogsvc.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\reg.exe
Status: Allocation size mismatch (API: 53248, Raw: 36864)

Path: c:\windows\$ntservicepackuninstall$\schtasks.exe
Status: Allocation size mismatch (API: 90112, Raw: 86016)

Path: c:\windows\$ntservicepackuninstall$\scrcons.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\scrnsave.scr
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\sctasks.exe
Status: Allocation size mismatch (API: 90112, Raw: 86016)

Path: c:\windows\$ntservicepackuninstall$\sdbinst.exe
Status: Allocation size mismatch (API: 77824, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\secedit.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\rcimlby.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\rcp.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\rdpclip.exe
Status: Allocation size mismatch (API: 65536, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\rdsaddin.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\rdshost.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\qprocess.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\oemig50.exe
Status: Allocation size mismatch (API: 65536, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\oobebaln.exe
Status: Allocation size mismatch (API: 57344, Raw: 40960)

Path: c:\windows\$ntservicepackuninstall$\openfiles.exe
Status: Allocation size mismatch (API: 65536, Raw: 45056)

Path: c:\windows\$ntservicepackuninstall$\ntbackup.exe
Status: Allocation size mismatch (API: 798720, Raw: 778240)

Path: c:\windows\$ntservicepackuninstall$\msdtc.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\mtstocom.exe
Status: Allocation size mismatch (API: 94208, Raw: 73728)

Path: c:\windows\$ntservicepackuninstall$\muisetup.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\narrator.exe
Status: Allocation size mismatch (API: 61440, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\nddeapir.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\ndis.sys
Status: Size mismatch (API: 182656, Raw: 182912)

Path: c:\windows\$ntservicepackuninstall$\mstinit.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\mstsc.exe
Status: Allocation size mismatch (API: 245760, Raw: 225280)

Path: c:\windows\$ntservicepackuninstall$\msoobe.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\mspaint.exe
Status: Allocation size mismatch (API: 249856, Raw: 229376)

Path: c:\windows\$ntservicepackuninstall$\msiexec.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\msiregmv.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\msmsgs.exe
Status: Allocation size mismatch (API: 1159168, Raw: 1138688)

Path: c:\windows\$ntservicepackuninstall$\mofcomp.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\moviemk.exe
Status: Allocation size mismatch (API: 2293760, Raw: 2273280)

Path: c:\windows\$ntservicepackuninstall$\mplay32.exe
Status: Allocation size mismatch (API: 106496, Raw: 98304)

Path: c:\windows\$ntservicepackuninstall$\mplayer2.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\mqbkup.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\locator.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\logman.exe
Status: Allocation size mismatch (API: 61440, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\logon.scr
Status: Allocation size mismatch (API: 90112, Raw: 69632)

Path: c:\windows\$ntservicepackuninstall$\logonui.exe
Status: Allocation size mismatch (API: 274432, Raw: 266240)

Path: c:\windows\$ntservicepackuninstall$\ipv6.exe
Status: Allocation size mismatch (API: 65536, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\ipxroute.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\hscupd.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\pintlphr.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\rasphone.exe
Status: Allocation size mismatch (API: 57344, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\fp98sadm.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\fp98swin.exe
Status: Allocation size mismatch (API: 86016, Raw: 65536)

Path: c:\windows\$ntservicepackuninstall$\fpadmcgi.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\fpcount.exe
Status: Allocation size mismatch (API: 131072, Raw: 122880)

Path: c:\windows\$ntservicepackuninstall$\fpremadm.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\fsquirt.exe
Status: Allocation size mismatch (API: 98304, Raw: 94208)

Path: c:\windows\$ntservicepackuninstall$\ftp.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\eudcedit.exe
Status: Allocation size mismatch (API: 151552, Raw: 147456)

Path: c:\windows\$ntservicepackuninstall$\evcreate.exe
Status: Allocation size mismatch (API: 45056, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\eventcreate.exe
Status: Allocation size mismatch (API: 45056, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\eventtriggers.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\evntcmd.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\evntwin.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\evtrig.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\explorer.exe
Status: Allocation size mismatch (API: 634880, Raw: 618496)

Path: c:\windows\$ntservicepackuninstall$\dumprep.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\dvdupgrd.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\dwwin.exe
Status: Allocation size mismatch (API: 155648, Raw: 139264)

Path: c:\windows\$ntservicepackuninstall$\dxdiag.exe
Status: Allocation size mismatch (API: 667648, Raw: 655360)

Path: c:\windows\$ntservicepackuninstall$\dpnsvr.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\dpvsetup.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\driverquery.exe
Status: Allocation size mismatch (API: 61440, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\drvqry.exe
Status: Allocation size mismatch (API: 61440, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\defrag.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\dfrgfat.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\dfrgntfs.exe
Status: Allocation size mismatch (API: 98304, Raw: 77824)

Path: c:\windows\$ntservicepackuninstall$\dialer.exe
Status: Allocation size mismatch (API: 303104, Raw: 282624)

Path: c:\windows\$ntservicepackuninstall$\diantz.exe
Status: Allocation size mismatch (API: 86016, Raw: 65536)

Path: c:\windows\$ntservicepackuninstall$\davcdata.exe
Status: Allocation size mismatch (API: 53248, Raw: 32768)

Path: c:\windows\$ntservicepackuninstall$\dcomcnfg.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\ddeshare.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\conf.exe
Status: Allocation size mismatch (API: 544768, Raw: 528384)

Path: c:\windows\$ntservicepackuninstall$\conime.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\cscript.exe
Status: Allocation size mismatch (API: 77824, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\comrepl.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\comrereg.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\winhlp32.exe
Status: Allocation size mismatch (API: 233472, Raw: 212992)

Path: c:\windows\$ntservicepackuninstall$\rsnotify.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\rstrui.exe
Status: Allocation size mismatch (API: 241664, Raw: 233472)

Path: c:\windows\$ntservicepackuninstall$\rtcshare.exe
Status: Allocation size mismatch (API: 81920, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\rundll32.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\runonce.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\savedump.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\scardsvr.exe
Status: Allocation size mismatch (API: 86016, Raw: 65536)

Path: c:\windows\$ntservicepackuninstall$\netstat.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\notepad.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\nppagent.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\nslookup.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\inetin51.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\inetwiz.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\ipconfig.exe
Status: Allocation size mismatch (API: 53248, Raw: 45056)

Path: c:\windows\$ntservicepackuninstall$\gpresult.exe
Status: Allocation size mismatch (API: 94208, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\gprslt.exe
Status: Allocation size mismatch (API: 94208, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\grpconv.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntservicepackuninstall$\help.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\helpctr.exe
Status: Allocation size mismatch (API: 512000, Raw: 491520)

Path: c:\windows\$ntservicepackuninstall$\helpsvc.exe
Status: Allocation size mismatch (API: 495616, Raw: 475136)

Path: c:\windows\$ntservicepackuninstall$\hh.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\fxscover.exe
Status: Allocation size mismatch (API: 163840, Raw: 143360)

Path: c:\windows\$ntservicepackuninstall$\fxssvc.exe
Status: Allocation size mismatch (API: 212992, Raw: 192512)

Path: c:\windows\$ntservicepackuninstall$\getmac.exe
Status: Allocation size mismatch (API: 61440, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\wmiprvse.exe
Status: Allocation size mismatch (API: 147456, Raw: 126976)

Path: c:\windows\$ntservicepackuninstall$\wordpad.exe
Status: Allocation size mismatch (API: 151552, Raw: 126976)

Path: c:\windows\$ntservicepackuninstall$\wpabaln.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\wpnpinst.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\lsass.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\magnify.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\makecab.exe
Status: Allocation size mismatch (API: 86016, Raw: 65536)

Path: c:\windows\$ntservicepackuninstall$\tzchange.exe
Status: Allocation size mismatch (API: 65536, Raw: 61440)

Path: c:\windows\$ntservicepackuninstall$\powercfg.exe
Status: Allocation size mismatch (API: 57344, Raw: 40960)

Path: c:\windows\$ntservicepackuninstall$\progman.exe
Status: Allocation size mismatch (API: 65536, Raw: 45056)

Path: c:\windows\$ntservicepackuninstall$\proquota.exe
Status: Allocation size mismatch (API: 61440, Raw: 45056)

Path: c:\windows\$ntservicepackuninstall$\proxycfg.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\mqsvc.exe
Status: Allocation size mismatch (API: 24576, Raw: 4096)

Path: c:\windows\$ntservicepackuninstall$\mqtgsvc.exe
Status: Allocation size mismatch (API: 98304, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\odbcad32.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\icwconn2.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntservicepackuninstall$\icwrmind.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\iexpress.exe
Status: Allocation size mismatch (API: 98304, Raw: 81920)

Path: c:\windows\$ntservicepackuninstall$\iisrstas.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\imapi.exe
Status: Allocation size mismatch (API: 126976, Raw: 106496)

Path: c:\windows\$ntservicepackuninstall$\msconfig.exe
Status: Allocation size mismatch (API: 122880, Raw: 102400)

Path: c:\windows\$ntservicepackuninstall$\findstr.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\fltmc.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\fontview.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\taskkill.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\tasklist.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\taskmgr.exe
Status: Allocation size mismatch (API: 110592, Raw: 90112)

Path: c:\windows\$ntservicepackuninstall$\tcptest.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\ss3dfo.scr
Status: Allocation size mismatch (API: 512000, Raw: 495616)

Path: c:\windows\$ntservicepackuninstall$\ssbezier.scr
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\ssmarque.scr
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\odbcconf.exe
Status: Allocation size mismatch (API: 69632, Raw: 49152)

Path: c:\windows\$ntservicepackuninstall$\snmp.exe
Status: Allocation size mismatch (API: 45056, Raw: 24576)

Path: c:\windows\$ntservicepackuninstall$\snmptrap.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\sort.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\spider.exe
Status: Allocation size mismatch (API: 397312, Raw: 376832)

Path: c:\windows\$ntservicepackuninstall$\spiisupd.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\wuauclt1.exe
Status: Allocation size mismatch (API: 122880, Raw: 102400)

Path: c:\windows\$ntservicepackuninstall$\xcopy.exe
Status: Allocation size mismatch (API: 40960, Raw: 20480)

Path: c:\windows\$ntservicepackuninstall$\xpnetdiag.exe
Status: Allocation size mismatch (API: 266240, Raw: 245760)

Path: c:\windows\$ntservicepackuninstall$\opnfiles.exe
Status: Allocation size mismatch (API: 65536, Raw: 45056)

Path: c:\windows\$ntservicepackuninstall$\osk.exe
Status: Allocation size mismatch (API: 147456, Raw: 126976)

Path: c:\windows\$ntservicepackuninstall$\packager.exe
Status: Allocation size mismatch (API: 65536, Raw: 57344)

Path: c:\windows\$ntservicepackuninstall$\ntvdm.exe
Status: Allocation size mismatch (API: 339968, Raw: 319488)

Path: c:\windows\$ntservicepackuninstall$\regsvr32.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\rexec.exe
Status: Allocation size mismatch (API: 28672, Raw: 8192)

Path: c:\windows\$ntservicepackuninstall$\rsh.exe
Status: Allocation size mismatch (API: 32768, Raw: 12288)

Path: c:\windows\$ntservicepackuninstall$\regedit.exe
Status: Allocation size mismatch (API: 114688, Raw: 94208)

Path: c:\windows\$ntservicepackuninstall$\shutdown.exe
Status: Allocation size mismatch (API: 36864, Raw: 16384)

Path: c:\windows\$ntservicepackuninstall$\sndrec32.exe
Status: Allocation size mismatch (API: 114688, Raw: 94208)

Path: c:\windows\$ntservicepackuninstall$\ssmypics.scr
Status: Allocation size mismatch (API: 57344, Raw: 36864)

Path: c:\windows\$ntuninstallkb960859$\telnet.exe
Status: Allocation size mismatch (API: 73728, Raw: 53248)

Path: c:\windows\$ntuninstallkb960859$\tlntsess.exe
Status: Allocation size mismatch (API: 77824, Raw: 57344)

Path: c:\windows\$ntuninstallkb951978$\cscript.exe
Status: Allocation size mismatch (API: 114688, Raw: 94208)

Path: c:\windows\$ntuninstallkb951978$\wscript.exe
Status: Allocation size mismatch (API: 118784, Raw: 98304)

Path: c:\windows\$ntuninstallkb952069_wm9$\logagent.exe
Status: Allocation size mismatch (API: 94208, Raw: 73728)

Path: c:\windows\$ntuninstallwmfdist11$\logagent.exe
Status: Allocation size mismatch (API: 94208, Raw: 73728)

Path: c:\windows\$ntuninstallwmfdist11$\uwdf.exe
Status: Allocation size mismatch (API: 53248, Raw: 36864)

Path: c:\windows\$ntuninstallwmfdist11$\wdfmgr.exe
Status: Allocation size mismatch (API: 49152, Raw: 28672)

Path: c:\windows\$ntuninstallwmfdist11$\wmsetsdk.exe
Status: Allocation size mismatch (API: 499712, Raw: 479232)

Path: c:\windows\$ntuninstallwmp11$\setup_wm.exe
Status: Allocation size mismatch (API: 450560, Raw: 438272)

Path: c:\windows\$ntuninstallwmp11$\unregmp2.exe
Status: Allocation size mismatch (API: 139264, Raw: 118784)

Path: c:\windows\$ntuninstallwmp11$\wmplayer.exe
Status: Allocation size mismatch (API: 65536, Raw: 45056)

Path: C:\WINDOWS\system32\kbiwkmhemuwksr.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\kbiwkmtStealth Objects
-------------------
Object: Hidden Module [Name: kbiwkmhemuwksr.dll]
Process: svchost.exe (PID: 1236) Address: 0x10000000 Size: 53248

Object: Hidden Module [Name: kbiwkmwqomiabr.dll]
Process: Explorer.EXE (PID: 1060) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3732) Address: 0x01000000 Size: 40960

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3740) Address: 0x01000000 Size: 40960

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3744) Address: 0x01000000 Size: 40960

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3768) Address: 0x01000000 Size: 40960

Object: Hidden Module [Name: kbiwkmwqomiabr.dll]
Process: firefox.exe (PID: 2788) Address: 0x007f0000 Size: 32768

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x82b511f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_CREATE]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_CLOSE]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_POWER]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: perc2, IRP_MJ_PNP]
Process: System Address: 0x82b571f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_CREATE]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_CLOSE]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_POWER]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: Ql10wnt, IRP_MJ_PNP]
Process: System Address: 0x82b601f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_CREATE]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_CLOSE]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_POWER]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: cbidf, IRP_MJ_PNP]
Process: System Address: 0x82b541f8 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_CREATE]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_CLOSE]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_POWER]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: aisf0l6k؅敓瘰䮀 霩؃ఆ䵃慖, IRP_MJ_PNP]
Process: System Address: 0x8282e500 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_CREATE]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_CLOSE]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_POWER]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ini910u, IRP_MJ_PNP]
Process: System Address: 0x82b5d1f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_CREATE]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_CLOSE]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_POWER]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: ql1280, IRP_MJ_PNP]
Process: System Address: 0x82bc91f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_CREATE]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_CLOSE]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_POWER]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc, IRP_MJ_PNP]
Process: System Address: 0x82b5f1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_CREATE]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_CLOSE]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_POWER]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: asc3350p, IRP_MJ_PNP]
Process: System Address: 0x82bcd1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x8287c1f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_CREATE]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_CLOSE]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_POWER]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: cd20xrnt, IRP_MJ_PNP]
Process: System Address: 0x82b591f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_CREATE]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_CLOSE]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_POWER]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: mraid35x, IRP_MJ_PNP]
Process: System Address: 0x82b5e1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x82bd81f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x828c51f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_CREATE]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_CLOSE]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_POWER]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: symc8xx, IRP_MJ_PNP]
Process: System Address: 0x82bcf1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_CREATE]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_CLOSE]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_POWER]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: ultra, IRP_MJ_PNP]
Process: System Address: 0x82bcc1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_CREATE]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_CLOSE]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_POWER]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: aic78u2, IRP_MJ_PNP]
Process: System Address: 0x82b5c1f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_CREATE]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_CLOSE]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_POWER]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: dac960nt, IRP_MJ_PNP]
Process: System Address: 0x82bd41f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x82b651f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_CREATE]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_CLOSE]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_POWER]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: adpu160m, IRP_MJ_PNP]
Process: System Address: 0x82b581f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_CREATE]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_CLOSE]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_POWER]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: sym_u3, IRP_MJ_PNP]
Process: System Address: 0x82bce1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_CREATE]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_CLOSE]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_POWER]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: abp480n5, IRP_MJ_PNP]
Process: System Address: 0x82b5a1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_CREATE]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_CLOSE]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_POWER]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: ql1080, IRP_MJ_PNP]
Process: System Address: 0x82bca1f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_CREATE]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_CLOSE]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_POWER]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: hpn, IRP_MJ_PNP]
Process: System Address: 0x82b551f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_CREATE]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_CLOSE]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_POWER]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: symc810, IRP_MJ_PNP]
Process: System Address: 0x82bd51f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x822991f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_CREATE]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_CLOSE]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_POWER]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: ql12160, IRP_MJ_PNP]
Process: System Address: 0x82bc81f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_CREATE]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_CLOSE]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_POWER]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: aic78xx, IRP_MJ_PNP]
Process: System Address: 0x82b611f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_CREATE]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_CLOSE]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_POWER]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: dac2w2k, IRP_MJ_PNP]
Process: System Address: 0x82b531f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_CREATE]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_CLOSE]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_POWER]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: amsint, IRP_MJ_PNP]
Process: System Address: 0x82bd31f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x828a11f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_CREATE]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_CLOSE]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_POWER]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: ql1240, IRP_MJ_PNP]
Process: System Address: 0x82bd01f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_CREATE]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_CLOSE]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_POWER]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: Sparrow, IRP_MJ_PNP]
Process: System Address: 0x82b621f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_CREATE]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_CLOSE]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_POWER]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: sym_hi, IRP_MJ_PNP]
Process: System Address: 0x82b5b1f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_CREATE]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_CLOSE]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_READ]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_WRITE]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_QUERY_EA]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SET_EA]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SHUTDOWN]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_CLEANUP]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SET_SECURITY]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_POWER]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_SET_QUOTA]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: perc2hib, IRP_MJ_PNP]
Process: System Address: 0x82b561f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_CREATE]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_CLOSE]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_POWER]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x82bd61f8 Size: 121

Object: Hidden Code [Driver: Aha154x, IRP_MJ_PNP]
Process: System AddressHidden Services
-------------------
Service Name: kbiwkmbegvptti
Image Path: C:\WINDOWS\system32\drivers\kbiwkmvpmoyafv.sys

==EOF==



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,725 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:33 AM

Posted 31 August 2009 - 08:41 PM

You have a rootkit.
As there are some new variants of rootkits in the wild right now that will require custom scripts to remove the infection, the process must be completed by HJT team member.

Failure to follow the proper removal process can and will cause serious damage to a machine. Recovery of the machine may be difficult, if not impossible.

Now ... Download this Utility and save it to your Desktop.
Double-click the Utility to run it and and let it finish.
When it states Finished! Press any key to exit, press any key to close the program.
It will save a .txt file to your desktop automatically. Double-click on the Win32kDiag.txt file that is located on your Desktop and post the entire contents of

that log as part of the reply in the topic you will create below..

Next please go here HijackThis Logs and Virus/Trojan/Spyware/Malware Removal ,click New Topic,give it a

relevant Title and post the Rootrepeal log and the above log.

Let me know how that went.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Twistendo

Twistendo
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 05 September 2009 - 08:52 PM

I followed your exact directions, and I stopped getting "ToSeekA directs."
But, I still get blocked from anti-virus websites.
The Win32k log can be found here: http://www.bleepingcomputer.com/forums/t/255475/browser-hijacker-log/

#6 Twistendo

Twistendo
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:33 AM

Posted 06 September 2009 - 09:16 PM

):

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,725 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:33 AM

Posted 06 September 2009 - 10:23 PM

Hello. I see you have posted the log. Sorry for the late reply busy weekend.

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users