Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Windows Police Pro, Protection System, Total Security

  • This topic is locked This topic is locked
2 replies to this topic

#1 thrax44


  • Members
  • 31 posts
  • Local time:05:14 PM

Posted 02 September 2009 - 03:26 PM

It's taken me 3 days to get this log file, i can't really load much. Office Depot remote tech couldn't access my computer to fix it. Computer only has a 20% start rate in Safe mode - domain host controllers only. Other safe mode version hardly work. Rootrepeal shuts dows when scanning files. Sorry if I wasn;t supposed to post this log here.

ROOTREPEAL © AD, 2007-2009
Scan Start Time: 2009/09/02 15:02
Program Version: Version
Windows Version: Windows XP SP2

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB58ED000 Size: 49152 File Visible: No Signed: -
Status: -

Name: win32k.sys:1
Image Path: C:\WINDOWS\win32k.sys:1
Address: 0xB88D8000 Size: 20480 File Visible: No Signed: -
Status: -

Name: win32k.sys:2
Image Path: C:\WINDOWS\win32k.sys:2
Address: 0xB8908000 Size: 61440 File Visible: No Signed: -
Status: -

Stealth Objects
Object: Hidden Module [Name: UACmnswulvdni.dll]
Process: svchost.exe (PID: 1104) Address: 0x008e0000 Size: 65536

Object: Hidden Module [Name: UACabea.tmpvbfamt.dll]
Process: svchost.exe (PID: 1104) Address: 0x10000000 Size: 217088

Object: Hidden Module [Name: UACfthopplqqa.dll]
Process: Explorer.exe (PID: 632) Address: 0x10000000 Size: 49152

Hidden Services
Service Name: UACd.sys
Image Path: C:\WINDOWS\system32\drivers\UACkspypuxtkp.sys


BC AdBot (Login to Remove)


#2 Blade


    Strong in the Bleepforce

  • Site Admin
  • 12,785 posts
  • Gender:Male
  • Location:US
  • Local time:05:14 PM

Posted 02 September 2009 - 03:30 PM


You have an active rootkit on your machine. With the information you have provided I believe you will need help from the malware removal team. Please read the information about getting started. After you have followed the steps in that guide, I would like you to start a new thread HERE and include a link to this thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. The HJT team is very busy, so it could be several days before you receive a reply. But rest assured, help is on the way!

Due to the nature of this infection it is likely that you will be unable to run traditional scanning utilities or run a full scan with RootRepeal as directed in the Preparation Guide linked above. If this is the case, you should still create your new thread in the HJT forum, but instead of DDS and full RootRepeal logs you should post your partial RootRepeal log (the one you just generated for me), as well as a log generated by this special utility. Note that the utility takes some time to run, so don't worry if it appears that nothing is happening.

Sorry I couldn't do more for you here; they'll be able to help in HJT.


If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!

#3 Orange Blossom

Orange Blossom

    OBleepin Investigator

  • Moderator
  • 37,106 posts
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:05:14 PM

Posted 04 September 2009 - 05:54 AM


Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/255049/windows-police-pro-protection-system-total-security/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Internet Security, NoScript Firefox ext.


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users