Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with IE / Google redirect virus


  • This topic is locked This topic is locked
26 replies to this topic

#1 tbateman

tbateman

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 25 October 2009 - 08:03 PM

Last Monday I wanted to watch Monday Night Football on my PC, and upon browsing to one of the sites (marked green by McAfee site advisor) I got a threat warning from McAfee that something tried to change the registry. I denied two registry attempts, but after that I recall some weirdness (can't remember specifically), but that prompted me to do a scan. I scanned my PC with McAfee, and it cleaned out some usual stuff (cookies, etc), and I think it found one malicious program, which it quarantined. After that, my browser developed the all-too-familiar redirect bug: Google looks legit, but when you click on search results, you get random websites (occasionally the one you want). I use Google, but the same thing happens with Yahoo, so I think its a browser hijacker. Since then I have downloaded the following tools:

AdAware
Spybot S&D
SpywareBlaster
Malwarebytes
SUPERAntiSpyware

And none of them found anything.

I have a really clean PC - I don't like add-ins, toolbars, etc, and I try to keep the system tray clean so my PC runs fast.

I currently have WinXP SP2 (I don't use automatic updates), and whilst trying to fix the problem, I attempted to update to SP3, but the file atapi.sys is blocking update of Windows. I suspect this file has something to do with it, but since it's a critical system file (disk I/O), it cannot be deleted, without disatrous consequences.

In poking around in the registry to find out what was using atapi.sys, I came upon a registry key for Search Assistant. Maybe that has something do do with it (see attached screenshot)

At this point I'm ready to "nuke" it by reinstalling Windows, but this being a particularly annoying virus, I would get much more satisfaction out of killing it and it alone...

Thanks in advance for any help you can provide.

DDS.txt:

DDS (Ver_09-10-24.04) - NTFSx86
Run by Tom at 15:33:50.45 on Sun 10/25/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3327.2554 [GMT -8:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\MATLAB7\webserver\bin\win32\matlabserver.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\regedit.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Tom\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
mLocal Page = hxxp://www.google.com/
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\progra~1\mcafee\viruss~1\scriptsn.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\autoca~1.lnk - c:\program files\common files\autodesk shared\acstart16.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-10-22 64288]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [2008-7-22 151592]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-10-12 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 74480]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2009-5-4 203280]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;c:\windows\system32\drivers\AtiHdmi.sys [2009-6-21 93184]
R3 L1e;Miniport Driver for Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1e51x86.sys [2009-6-20 38400]
R3 mosuport;USB Serial/Parallel Ports;c:\windows\system32\drivers\mosuport.sys [2009-9-20 900736]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 7408]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-9-24 1170768]

=============== Created Last 30 ================

2009-10-25 22:35:35 0 d-----w- c:\program files\SpywareBlaster
2009-10-25 20:53:56 0 d-----w- c:\windows\system32\CatRoot_bak
2009-10-25 05:51:20 0 d-----w- C:\ComboFix
2009-10-25 03:53:06 0 d-----w- c:\windows\pss
2009-10-25 01:42:31 0 d-sha-r- C:\cmdcons
2009-10-25 01:30:10 98816 ----a-w- c:\windows\sed.exe
2009-10-25 01:30:10 236544 ----a-w- c:\windows\PEV.exe
2009-10-25 01:30:10 161792 ----a-w- c:\windows\SWREG.exe
2009-10-24 20:47:50 0 d-----w- c:\program files\Trend Micro
2009-10-24 20:47:49 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-10-24 20:47:48 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-10-24 18:45:26 0 d-----w- c:\program files\SUPERAntiSpyware
2009-10-24 18:45:26 0 d-----w- c:\docume~1\tom\applic~1\SUPERAntiSpyware.com
2009-10-24 05:32:06 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-10-24 05:32:06 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-10-23 07:55:17 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-10-23 06:30:27 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-23 06:29:17 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-10-23 06:29:07 0 d-----w- c:\program files\Lavasoft
2009-10-23 06:07:33 0 d-----w- c:\docume~1\tom\applic~1\Malwarebytes
2009-10-23 06:07:29 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-23 06:07:28 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-23 06:07:28 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-23 06:07:28 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-09-30 02:32:10 0 d-----w- c:\program files\ExpressPCB

==================== Find3M ====================

2009-09-16 17:22:48 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-09-16 17:22:48 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-09-16 17:22:48 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-09-16 17:22:48 214664 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-09-16 17:22:14 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2006-06-24 06:48:54 32768 ----a-r- c:\windows\inf\UpdateUSB.exe

============= FINISH: 15:34:20.96 ===============

Attached Files


Edited by tbateman, 25 October 2009 - 08:19 PM.


BC AdBot (Login to Remove)

 


#2 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 01 November 2009 - 04:27 PM

Hello ,
And :( to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.

You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------
If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

-------------------------------------------------------------
Please be patient and I'd be grateful if you would note the following
  • The cleaning process is not instant. DDS logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new DDS log
  • GMER log


Please give me some time to review your logs and take the steps necessary with you to get your machine back in working order clean and free of malware.

Thanks and again sorry for the delay
.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#3 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 06 November 2009 - 05:35 AM

Due to lack of feedback, this topic will now be closed.

If you are the original topic starter and you need this topic to be re-opened, please send me a PM.

Everyone else, please start a new topic.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 19 December 2009 - 12:58 PM

Re-opened upon users request.

Please post dds.txt, attach.txt and gmer.log

I would be very grateful if you could just paste the logs in the reply box instead of attaching them, thanks!

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 19 December 2009 - 10:26 PM

DDS (Ver_09-12-01.01) - NTFSx86
Run by Tom at 11:26:23.51 on Sat 12/19/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3327.2758 [GMT -8:00]

AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\savedump.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\MATLAB7\webserver\bin\win32\matlabserver.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\mdm.exe
C:\Documents and Settings\Tom\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
mLocal Page = hxxp://www.google.com/
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\autoca~1.lnk - c:\program files\common files\autodesk shared\acstart16.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: AtiExtEvent - Ati2evxx.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-10-22 64288]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [2008-7-22 151592]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-5-4 214664]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2009-5-4 203280]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2009-5-4 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2009-5-4 144704]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-5-4 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-5-4 35272]
R3 mosuport;USB Serial/Parallel Ports;c:\windows\system32\drivers\mosuport.sys [2009-9-20 900736]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-9-24 1184912]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2009-5-4 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2009-5-4 40552]
S4 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2009-5-4 606736]

=============== Created Last 30 ================


==================== Find3M ====================

2009-10-30 07:30:50 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-10-11 15:10:09 236544 ----a-w- c:\windows\PEV.exe
2006-06-24 06:48:54 32768 ----a-r- c:\windows\inf\UpdateUSB.exe

============= FINISH: 11:26:52.60 ===============

UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT

DDS (Ver_09-12-01.01)

Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume2
Install Date: 6/20/2009 10:04:52 AM
System Uptime: 12/19/2009 11:23:00 AM (0 hours ago)

Motherboard: ASUSTeK Computer INC. | | P5Q
Processor: Intel Pentium III Xeon processor | LGA 775 | 2833/333mhz
Processor: Intel Pentium III Xeon processor | LGA 775 | 2833/333mhz
Processor: Intel Pentium III Xeon processor | LGA 775 | 2833/333mhz
Processor: Intel Pentium III Xeon processor | LGA 775 | 2833/333mhz

==== Disk Partitions =========================

A: is Removable
C: is FIXED (NTFS) - 298 GiB total, 192.913 GiB free.
D: is FIXED (FAT32) - 11 GiB total, 1.66 GiB free.
E: is CDROM ()

==== Disabled Device Manager Items =============

==== System Restore Points ===================

RP36: 9/18/2009 8:17:29 PM - System Checkpoint
RP37: 9/20/2009 10:52:46 AM - Unsigned driver install
RP38: 9/20/2009 10:56:03 AM - Unsigned driver install
RP39: 9/29/2009 7:32:07 PM - Installed ExpressPCB.
RP40: 10/9/2009 1:26:12 AM - System Checkpoint
RP41: 10/17/2009 9:03:33 AM - System Checkpoint
RP42: 10/20/2009 12:26:11 AM - System Checkpoint
RP43: 10/21/2009 9:38:39 PM - System Checkpoint
RP44: 10/23/2009 6:35:54 AM - System Checkpoint
RP45: 10/24/2009 10:16:52 AM - Restore Operation
RP46: 10/24/2009 10:20:00 AM - Restore Operation
RP47: 10/24/2009 10:32:33 AM - Restore Operation
RP48: 10/24/2009 10:36:11 AM - Restore Operation
RP49: 10/24/2009 11:25:44 AM - Restore Operation
RP50: 10/24/2009 11:45:25 AM - Installed SUPERAntiSpyware Free Edition
RP51: 10/24/2009 1:49:24 PM - Restore Operation
RP52: 10/24/2009 9:53:07 PM - Restore Operation
RP53: 10/26/2009 9:03:16 PM - System Checkpoint
RP54: 10/28/2009 12:18:43 AM - System Checkpoint
RP55: 11/5/2009 9:55:38 PM - System Checkpoint
RP56: 11/8/2009 9:41:41 PM - System Checkpoint
RP57: 11/9/2009 11:00:00 PM - System Checkpoint
RP58: 11/22/2009 2:33:08 PM - System Checkpoint
RP59: 11/29/2009 11:34:59 AM - System Checkpoint
RP60: 12/6/2009 9:36:17 PM - System Checkpoint
RP61: 12/7/2009 10:17:27 PM - System Checkpoint
RP62: 12/9/2009 10:20:49 PM - System Checkpoint
RP63: 12/10/2009 11:16:16 PM - System Checkpoint
RP64: 12/14/2009 7:53:58 PM - Removed SUPERAntiSpyware Free Edition
RP65: 12/19/2009 9:49:07 AM - System Checkpoint

==== Installed Programs ======================

Acrobat.com
Ad-Aware
Adobe AIR
Adobe Flash Player 10 ActiveX
Adobe Reader 9.1
Atheros Communications Inc.® AR8121/AR8113/AR8114 Gigabit/Fast Ethernet Driver
ATI - Software Uninstall Utility
ATI Catalyst Control Center
ATI Display Driver
AutoCAD 2005 - English
Autodesk DWF Viewer
Blender (remove only)
Brother HL-5240
Catalyst Control Center - Branding
Catalyst Control Center Core Implementation
Catalyst Control Center Graphics Full Existing
Catalyst Control Center Graphics Full New
Catalyst Control Center Graphics Light
Catalyst Control Center Graphics Previews Common
Catalyst Control Center Localization Chinese Standard
Catalyst Control Center Localization French
Catalyst Control Center Localization German
Catalyst Control Center Localization Spanish
ccc-core-preinstall
ccc-core-static
ccc-utility
CCC Help Chinese Standard
CCC Help English
CCC Help French
CCC Help German
CCC Help Spanish
ExpressPCB
GIMP 2.6.6
High Definition Audio Driver Package - KB888111
InstallShield for Microsoft Visual C++ 6
marvell 61xx
MATLAB Family of Products Release 14
McAfee SecurityCenter
Microsoft .NET Framework 1.1
Microsoft .NET Framework 2.0
Microsoft Office 2000 SR-1 Premium
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual Studio 6.0 Enterprise Edition
Microsoft Web Publishing Wizard 1.53
Python 2.6.2
Realtek AC'97 Audio
Realtek High Definition Audio Driver
REFLEX Model Flight Simulator
SANYO Digital Camera Driver
Skins
SpeedFan (remove only)
USB Compound Device
WebFldrs XP
Windows Installer 3.1 (KB893803)

==== Event Viewer Messages From Past Week ========

12/17/2009 7:28:34 PM, error: Service Control Manager [7002] - The BrPar service depends on the Parallel arbitrator group and no member of this group started.
12/17/2009 7:28:34 PM, error: Service Control Manager [7000] - The Parallel port driver service failed to start due to the following error: The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
12/16/2009 5:46:00 PM, error: ipnathlp [32003] - The Network Address Translator (NAT) was unable to request an operation of the kernel-mode translation module. This may indicate misconfiguration, insufficient resources, or an internal error. The data is the error code.
12/16/2009 5:46:00 PM, error: Dhcp [1002] - The IP address lease 192.168.1.64 for the Network Card with network address 00248C36A87C has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).

==== End Of File ===========================
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-19 19:12:36
Windows 5.1.2600 Service Pack 2
Running: jseto2o1.exe; Driver: C:\DOCUME~1\Tom\LOCALS~1\Temp\ugqiikow.sys


---- System - GMER 1.0.15 ----

SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwCreateKey [0xBA11887E]
SSDT Lbd.sys (Boot Driver/Lavasoft AB) ZwSetValueKey [0xBA118BFE]

Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateFile [0xAC70E78A]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcess [0xAC70E738]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcessEx [0xAC70E74C]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwMapViewOfSection [0xAC70E7CA]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenProcess [0xAC70E710]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenThread [0xAC70E724]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwProtectVirtualMemory [0xAC70E79E]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetContextThread [0xAC70E776]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetInformationProcess [0xAC70E762]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwTerminateProcess [0xAC70E7F9]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0xAC70E7E0]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwYieldExecution [0xAC70E7B4]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtCreateFile
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtMapViewOfSection
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenProcess
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenThread
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtSetInformationProcess

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwYieldExecution 80503DBC 7 Bytes JMP AC70E7B8 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtCreateFile 80577E5E 5 Bytes JMP AC70E78E \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtMapViewOfSection 805B09CE 7 Bytes JMP AC70E7CE \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwUnmapViewOfSection 805B17DC 5 Bytes JMP AC70E7E4 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwProtectVirtualMemory 805B6DA2 7 Bytes JMP AC70E7A2 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenProcess 805C9C46 5 Bytes JMP AC70E714 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenThread 805C9ED2 5 Bytes JMP AC70E728 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtSetInformationProcess 805CC690 5 Bytes JMP AC70E766 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcessEx 805CF966 7 Bytes JMP AC70E750 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcess 805CFA1C 5 Bytes JMP AC70E73C \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwSetContextThread 805CFF26 5 Bytes JMP AC70E77A \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwTerminateProcess 805D1170 5 Bytes JMP AC70E7FD \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
.rsrc C:\WINDOWS\system32\drivers\atapi.sys entry point in ".rsrc" section [0xB9F21380]
.text C:\WINDOWS\system32\DRIVERS\ati2mtag.sys section is writeable [0xB9186000, 0x1A9158, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[552] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 0041C130 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[552] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 0041C1B0 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00B80FEF
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00B80F77
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00B8006C
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 00B8005B
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00B80FA8
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00B80FB9
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00B800A2
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00B80091
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00B80F35
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00B800C4
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 00B800E9
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00B80040
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00B80000
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00B80F66
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00B80FCA
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00B8001B
.text C:\WINDOWS\system32\services.exe[824] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 00B800B3
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00B2002C
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!system 77C293C7 5 Bytes JMP 00B20FAB
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00B20011
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00B20000
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00B20FBC
.text C:\WINDOWS\system32\services.exe[824] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00B20FD7
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00B30FCA
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00B3005B
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 00B30FE5
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 00B30011
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00B30036
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00B30F9E
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 00B30000
.text C:\WINDOWS\system32\services.exe[824] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00B30FAF
.text C:\WINDOWS\system32\services.exe[824] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 00B10FEF
.text C:\WINDOWS\system32\services.exe[824] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 00B10027
.text C:\WINDOWS\system32\services.exe[824] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 00B1000A
.text C:\WINDOWS\system32\services.exe[824] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 00B10038
.text C:\WINDOWS\system32\services.exe[824] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 00B00000
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00E20FEF
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00E20F9E
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00E20093
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 00E20082
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00E20FB9
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00E2004A
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00E20F55
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00E20F70
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00E200DD
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00E200B8
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 00E20F29
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00E2005B
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00E20FDE
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00E20F8D
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00E2002F
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00E20014
.text C:\WINDOWS\system32\lsass.exe[844] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 00E20F44
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00E1001B
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00E1005B
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 00E1000A
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 00E10FCA
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00E10F9E
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00E10FAF
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 00E10FE5
.text C:\WINDOWS\system32\lsass.exe[844] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00E10036
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00DB0042
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!system 77C293C7 5 Bytes JMP 00DB0FB7
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00DB0FD2
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00DB0FEF
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00DB0027
.text C:\WINDOWS\system32\lsass.exe[844] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00DB000C
.text C:\WINDOWS\system32\lsass.exe[844] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 00CD000A
.text C:\WINDOWS\system32\lsass.exe[844] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 00DA0FEF
.text C:\WINDOWS\system32\lsass.exe[844] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 00DA0000
.text C:\WINDOWS\system32\lsass.exe[844] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 00DA0FCA
.text C:\WINDOWS\system32\lsass.exe[844] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 00DA0FAD
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00E50000
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00E50F70
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00E50F81
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 00E50F92
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00E50051
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00E50FC0
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00E500B6
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00E5009B
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00E500F3
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00E500E2
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 00E5010E
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00E50FAF
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00E50FE5
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00E5008A
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00E5002C
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00E5001B
.text C:\WINDOWS\system32\svchost.exe[1040] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 00E500C7
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00DB002F
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00DB0080
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 00DB0014
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 00DB0FDE
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00DB006F
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00DB0FC3
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 00DB0FEF
.text C:\WINDOWS\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00DB0040
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00DA0FBE
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!system 77C293C7 5 Bytes JMP 00DA0049
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00DA0027
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00DA000C
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00DA0038
.text C:\WINDOWS\system32\svchost.exe[1040] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00DA0FEF
.text C:\WINDOWS\system32\svchost.exe[1040] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 00D9000A
.text C:\WINDOWS\system32\svchost.exe[1040] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 00D90FEF
.text C:\WINDOWS\system32\svchost.exe[1040] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 00D9001B
.text C:\WINDOWS\system32\svchost.exe[1040] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 00D90FD4
.text C:\WINDOWS\system32\svchost.exe[1040] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 00B80FEF
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00BA0FEF
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00BA0082
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00BA0071
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 00BA0F8D
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00BA0F9E
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00BA0FAF
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00BA00AE
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00BA0F68
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00BA00F5
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00BA00DA
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 00BA0106
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00BA0036
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00BA0FCA
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00BA0093
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00BA001B
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00BA000A
.text C:\WINDOWS\system32\svchost.exe[1116] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 00BA00BF
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00B90036
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00B90F94
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 00B90FDB
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 00B9001B
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00B90FA5
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00B90047
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 00B90000
.text C:\WINDOWS\system32\svchost.exe[1116] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00B90FC0
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00B80FC6
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!system 77C293C7 5 Bytes JMP 00B80047
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00B8001B
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00B80000
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00B80036
.text C:\WINDOWS\system32\svchost.exe[1116] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00B80FD7
.text C:\WINDOWS\system32\svchost.exe[1116] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 00B70000
.text C:\WINDOWS\system32\svchost.exe[1116] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 00B70FD4
.text C:\WINDOWS\system32\svchost.exe[1116] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 00B70FE5
.text C:\WINDOWS\system32\svchost.exe[1116] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 00B70FC3
.text C:\WINDOWS\system32\svchost.exe[1116] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 00B10FEF
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 040E0000
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 040E0070
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 040E0F7B
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 040E0F96
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 040E005F
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 040E003D
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 040E00B9
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 040E00A8
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 040E0F3B
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 040E00D4
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 040E0F20
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 040E004E
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 040E0011
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 040E0081
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateNamedPipeW 7C82631D 3 Bytes JMP 040E002C
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateNamedPipeW + 4 7C826321 1 Byte [87]
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 040E0FDB
.text C:\WINDOWS\System32\svchost.exe[1220] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 040E0F4C
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 040D0FA8
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 040D0036
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 040D0FC3
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 040D0FD4
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 040D0025
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 040D0014
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 040D0FEF
.text C:\WINDOWS\System32\svchost.exe[1220] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 040D0F8D
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 040C005D
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!system 77C293C7 5 Bytes JMP 040C0042
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 040C0027
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!_open 77C2F566 5 Bytes JMP 040C0000
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 040C0FD2
.text C:\WINDOWS\System32\svchost.exe[1220] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 040C0FE3
.text C:\WINDOWS\System32\svchost.exe[1220] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 040B0FEF
.text C:\WINDOWS\System32\svchost.exe[1220] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 040B0FC3
.text C:\WINDOWS\System32\svchost.exe[1220] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 040B0FDE
.text C:\WINDOWS\System32\svchost.exe[1220] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 040B0016
.text C:\WINDOWS\System32\svchost.exe[1220] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 040A0000
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00960000
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00960069
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00960F74
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 0096004E
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00960F91
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00960033
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00960095
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00960F59
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00960F17
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00960F28
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 009600CB
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00960FA2
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00960011
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00960084
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00960022
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00960FD1
.text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 009600A6
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00950FDB
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00950F91
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 0095002C
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 0095001B
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00950058
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00950FB6
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 0095000A
.text C:\WINDOWS\system32\svchost.exe[1344] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00950047
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00940F9C
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!system 77C293C7 5 Bytes JMP 00940FAD
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0094000C
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00940FEF
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 0094001D
.text C:\WINDOWS\system32\svchost.exe[1344] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00940FD2
.text C:\WINDOWS\system32\svchost.exe[1344] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 006E0FE5
.text C:\WINDOWS\system32\svchost.exe[1344] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 006E0000
.text C:\WINDOWS\system32\svchost.exe[1344] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 006E0FCA
.text C:\WINDOWS\system32\svchost.exe[1344] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 006E0027
.text C:\WINDOWS\system32\svchost.exe[1344] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 006D0000
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 00C50000
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 00C50F9E
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00C50093
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 00C50FB9
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 00C50076
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 00C50FD4
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 00C500D5
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 00C500B8
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 00C500E6
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00C50F4D
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 00C50F32
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 00C5005B
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 00C50025
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 00C50F8D
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 00C50FEF
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 00C50040
.text C:\WINDOWS\system32\svchost.exe[1416] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 00C50F72
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 00C4000A
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 00C40051
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 00C40FB9
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 00C40FD4
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 00C40F94
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 00C40036
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 00C40FEF
.text C:\WINDOWS\system32\svchost.exe[1416] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 00C40025
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00C3004E
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!system 77C293C7 5 Bytes JMP 00C30FC3
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00C30022
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00C30FEF
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00C3003D
.text C:\WINDOWS\system32\svchost.exe[1416] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00C30FDE
.text C:\WINDOWS\system32\svchost.exe[1416] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 00C20FEF
.text C:\WINDOWS\system32\svchost.exe[1416] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 00C20FD4
.text C:\WINDOWS\system32\svchost.exe[1416] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 00C2000A
.text C:\WINDOWS\system32\svchost.exe[1416] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 00C20FB7
.text C:\WINDOWS\system32\svchost.exe[1416] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 00C10FEF
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 01790FEF
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 01790084
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 01790F8F
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 01790FB6
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 01790073
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 0179003D
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 017900BA
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 0179009F
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 01790F21
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 01790F3C
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 01790F10
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 01790058
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 01790000
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 01790F74
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 0179002C
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 0179001B
.text C:\WINDOWS\Explorer.EXE[2000] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 01790F57
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01400F7F
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!system 77C293C7 5 Bytes JMP 01400F90
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01400FB5
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01400FEF
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01400000
.text C:\WINDOWS\Explorer.EXE[2000] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01400FC6
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 01410036
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 0141007D
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 01410FE5
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 0141001B
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 01410062
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 01410047
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 01410000
.text C:\WINDOWS\Explorer.EXE[2000] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 01410FCA
.text C:\WINDOWS\Explorer.EXE[2000] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 013F0000
.text C:\WINDOWS\Explorer.EXE[2000] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 013F002C
.text C:\WINDOWS\Explorer.EXE[2000] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 013F001B
.text C:\WINDOWS\Explorer.EXE[2000] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 013F0FCF
.text C:\WINDOWS\Explorer.EXE[2000] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 013E0000
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateFileA 7C801A24 5 Bytes JMP 001D0FEF
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001D0051
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 001D0036
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!LoadLibraryExW 7C801AF1 5 Bytes JMP 001D0F68
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!LoadLibraryExA 7C801D4F 5 Bytes JMP 001D0F83
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 001D0FA8
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!GetStartupInfoW 7C801E50 5 Bytes JMP 001D009A
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes JMP 001D007F
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001D00B5
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 001D0F1C
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!GetProcAddress 7C80AC28 5 Bytes JMP 001D00C6
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!LoadLibraryW 7C80ACD3 5 Bytes JMP 001D0025
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateFileW 7C810976 5 Bytes JMP 001D0FD4
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreatePipe 7C81DD9A 5 Bytes JMP 001D0062
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateNamedPipeW 7C82631D 5 Bytes JMP 001D0014
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!CreateNamedPipeA 7C85FA54 5 Bytes JMP 001D0FC3
.text C:\WINDOWS\system32\wuauclt.exe[3940] kernel32.dll!WinExec 7C86114D 5 Bytes JMP 001D0F2D
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 002B005C
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!system 77C293C7 5 Bytes JMP 002B004B
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 002B0FE5
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!_open 77C2F566 5 Bytes JMP 002B000C
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 002B003A
.text C:\WINDOWS\system32\wuauclt.exe[3940] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 002B0029
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegOpenKeyExW 77DD6A78 5 Bytes JMP 002C0FD4
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegCreateKeyExW 77DD7535 5 Bytes JMP 002C0062
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegOpenKeyExA 77DD761B 5 Bytes JMP 002C0FE5
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegOpenKeyW 77DD770F 5 Bytes JMP 002C001B
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegCreateKeyExA 77DDEAF4 5 Bytes JMP 002C0FA5
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegCreateKeyW 77DF8F7D 5 Bytes JMP 002C0051
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegOpenKeyA 77DFC41B 5 Bytes JMP 002C000A
.text C:\WINDOWS\system32\wuauclt.exe[3940] ADVAPI32.dll!RegCreateKeyA 77DFD5BB 5 Bytes JMP 002C0040
.text C:\WINDOWS\system32\wuauclt.exe[3940] WS2_32.dll!socket 71AB3B91 5 Bytes JMP 002E0000
.text C:\WINDOWS\system32\wuauclt.exe[3940] WININET.dll!InternetOpenA 771C6D2A 5 Bytes JMP 01380000
.text C:\WINDOWS\system32\wuauclt.exe[3940] WININET.dll!InternetOpenUrlA 771C6FDD 5 Bytes JMP 01380011
.text C:\WINDOWS\system32\wuauclt.exe[3940] WININET.dll!InternetOpenW 771D6CF3 5 Bytes JMP 01380FDB
.text C:\WINDOWS\system32\wuauclt.exe[3940] WININET.dll!InternetOpenUrlW 771D7304 5 Bytes JMP 01380FBE

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)

Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-3 [B9F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xfc]}
Device \Driver\atapi \Device\Ide\IdePort0 [B9F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xfc]}
Device \Driver\atapi \Device\Ide\IdePort1 [B9F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xfc]}
Device \Driver\atapi \Device\Ide\IdePort2 [B9F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xfc]}
Device \Driver\atapi \Device\Ide\IdePort3 [B9F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xfc]}

AttachedDevice \Driver\Tcpip \Device\Udp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#6 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 19 December 2009 - 10:28 PM

After running GMER, my computer became slightly unstable. Is this normal?

Regards,
Tom

#7 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 20 December 2009 - 02:33 AM

Hello tbateman,

After running GMER, my computer became slightly unstable. Is this normal?

GMER only scans, it doesn't change a thing. However, you have a nasty rootkit that hooks quite deep and doesn't take kindly to being detected, so who knows, it can be unpredictable...

BACKDOOR WARNING
------------------------------
One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.


COMBOFIX
---------------
Please download ComboFix from one of these locations:Bleepingcomputer
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on kittyfix.exe and follow the prompts.
    You will get a big disclaimer about Combofix still being in beta version, just continue there.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


In your next reply, please include the following:
  • Combofix.txt

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#8 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 20 December 2009 - 02:07 PM

Logfile attached.

From what I provided above, what indicated that I have a backdoor trojan?

Also, based on your level of concern, can you give me some background on the particular backdoor you detected? In particular, how did I get it, even though I have antivirus and anti-spyware software installed and up-to-date? I think it happened when upon visiting a particular (marked as 'green' by McAfee Siteadvisor) website, I was redirected and all hell broke loose (multiple detections, popups, etc). Right after that, I had the Google redirect problem.

When I initially ran combofix, I had disabled antivirus per the instructions, but left the firewall on and locked down. I think that caused some problems with combofix, because it said it detected a rootkit, reset the machine, then after continuing for some time, the machine rebooted again, and upon restart, I go the "blue screen of death". I did a hard reset and the machine came back up, then I physically disconnected from the internet, disabled the firewall, and re-ran combofix without incident. BTW in the instructions, I differenitate "antivirus software" from "firewall" so I left the firewall up initially.

Thanks again,
Tom

Attached Files



#9 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 20 December 2009 - 02:23 PM

First of all, I would appreciate it if you could paste your logs directly in the reply box instead of attaching them. This makes things easier for me, thanks :(

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

This indicates a nasty rootkit, named TDL3 (its part of the TDSS family). It hooks into atapi.sys and basically turns your computer in a part of its botnet. This infection causes agressive redirects in all browsers. The following blogposthas more information on it (it is a copy of an article made by someone who researched the infection).


I see indeed your security programs are up to date, but unfortunately, no application is able to catch everything. Personally I am not too impressed with McAfee and I am not surprised things escaped its detection. However there is no "perfect product".

Please post me the log you will find at c:\qoobox\combofix2.txt and let me know what problems you are still having at this point (any redirects remaining?)

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#10 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 20 December 2009 - 08:54 PM

Note the combofix2 log date of 10/25. When I initially had the problem, I attempted to run combofix to repair it.
My configuration has changed since then. At the time, combofix did not fix my problem. I see that it's a new version - has combofix been updated to include this new threat since October? What's the difference between the combofix log and the combofix2 log files?

It appears that I no longer have any redirects, and so far (time will tell) no DNSChanger!ck detects from McAfee.

BTW, McAfee did detect the event, but somehow a virus got through. Maybe there were multiple payloads on that website.

If you think McAfee is bad, can you recommend something else? I have tried Norton, but it conflicts with too many programs, and sucks up too many system resources. Also, McAfee is provided free by my ISP.

Thanks for all the help - you're awesome!!!

Regards,
Tom

ComboFix 09-10-24.01 - Tom 10/24/2009 18:45.1.4 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3327.2619 [GMT -7:00]
Running from: c:\documents and settings\Tom\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.

((((((((((((((((((((((((( Files Created from 2009-09-25 to 2009-10-25 )))))))))))))))))))))))))))))))
.

2009-10-23 06:29 . 2009-10-23 06:29 -------- d-----w- c:\program files\Lavasoft
2009-10-23 06:07 . 2009-10-23 06:07 -------- d-----w- c:\documents and settings\Tom\Application Data\Malwarebytes
2009-10-23 06:07 . 2009-09-10 21:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-10-23 06:07 . 2009-10-24 20:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-23 06:07 . 2009-10-23 06:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-10-23 06:07 . 2009-09-10 21:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-02 16:50 . 2009-10-02 16:50 -------- d-----w- c:\documents and settings\Tom\Local Settings\Application Data\Help
2009-09-30 02:32 . 2009-10-02 16:50 -------- d-----w- c:\program files\ExpressPCB
2009-09-30 02:31 . 2009-09-30 02:31 -------- d-----w- c:\documents and settings\Tom\Local Settings\Application Data\Downloaded Installations

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-25 00:51 . 2009-05-05 07:19 -------- d-----w- c:\documents and settings\LocalService\Application Data\SACore
2009-10-24 20:47 . 2009-10-24 20:47 -------- d-----w- c:\program files\Trend Micro
2009-10-24 20:47 . 2009-10-24 20:47 -------- d-----w- c:\documents and settings\LocalService\Application Data\MathWorks
2009-10-24 20:47 . 2009-10-24 20:47 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-10-24 20:47 . 2009-10-24 20:47 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-10-24 20:47 . 2009-10-24 18:45 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-10-24 20:47 . 2009-10-23 06:29 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-10-24 20:47 . 2009-10-23 06:29 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-10-24 20:47 . 2009-10-24 05:32 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-10-24 20:47 . 2009-10-24 05:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-10-24 18:45 . 2009-10-24 18:45 -------- d-----w- c:\documents and settings\Tom\Application Data\SUPERAntiSpyware.com
2009-10-24 17:16 . 2009-05-05 07:14 -------- d-----w- c:\program files\McAfee
2009-10-22 03:42 . 2009-07-28 04:03 -------- d-----w- c:\program files\REFLEX
2009-09-30 05:38 . 2009-05-05 07:09 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-09-23 12:55 . 2009-10-23 06:30 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-09-20 18:04 . 2009-09-20 18:04 -------- d-----w- c:\program files\Brownie
2009-09-20 18:04 . 2009-09-20 18:04 34 ----a-w- c:\windows\system32\BD5240.DAT
2009-09-20 18:04 . 2009-09-20 18:04 -------- d-----w- c:\program files\Brother
2009-09-20 18:04 . 2009-05-05 05:50 -------- d-----w- c:\program files\Common Files\InstallShield
2009-09-20 18:04 . 2009-05-05 05:50 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-09-17 05:05 . 2009-05-30 02:38 -------- d-----w- c:\documents and settings\Tom\Application Data\gtk-2.0
2009-09-17 03:35 . 2009-09-17 03:28 -------- d-----w- c:\program files\SANYO Digital Camera
2009-09-16 17:22 . 2009-05-05 07:15 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-09-16 17:22 . 2009-05-05 07:15 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-09-16 17:22 . 2009-05-05 07:15 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-09-16 17:22 . 2009-05-05 07:15 214664 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-09-16 17:22 . 2009-05-05 07:15 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-09-03 09:17 . 2009-10-23 07:55 15688 ----a-w- c:\windows\system32\lsdelete.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-10-13 2000112]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-09-17 645328]
"McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2009-07-08 1176808]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-28 35696]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-29 61440]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.exe [2008-07-03 16876032]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
AutoCAD Startup Accelerator.lnk - c:\program files\Common Files\Autodesk Shared\acstart16.exe [2004-2-25 10872]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/22/2009 11:30 PM 64288]
R0 mv61xx;mv61xx;c:\windows\system32\drivers\mv61xx.sys [7/22/2008 1:01 AM 151592]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [10/12/2009 9:24 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [10/12/2009 9:24 PM 74480]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\McAfee\SiteAdvisor\McSACore.exe [5/5/2009 12:17 AM 203280]
R3 L1e;Miniport Driver for Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1e51x86.sys [6/20/2009 10:28 AM 38400]
R3 mosuport;USB Serial/Parallel Ports;c:\windows\system32\drivers\mosuport.sys [9/20/2009 10:52 AM 900736]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [10/12/2009 9:24 PM 7408]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [9/24/2009 4:17 AM 1170768]
.
Contents of the 'Scheduled Tasks' folder

2009-10-25 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 06:29]

2009-05-05 c:\windows\Tasks\McDefragTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-05 19:22]

2009-05-05 c:\windows\Tasks\McQcTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-05 19:22]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
mLocal Page = hxxp://www.google.com/
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-24 18:50
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(784)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3372)
c:\program files\McAfee\SiteAdvisor\saHook.dll
.
Completion time: 2009-10-25 18:52
ComboFix-quarantined-files.txt 2009-10-25 01:52

Pre-Run: 209,154,277,376 bytes free
Post-Run: 209,709,002,752 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 0875B482C0B2C045C6E510C02D12120E

#11 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 20 December 2009 - 08:58 PM

One other thing. I got that previous version of Combofix from bleeping-computer, to the best of my recollection. However, some time (days) after I downloaded it, McAfee killed it during a random scan of my desktop. I can't remember what McAfee said, but something to the effect that it was a rootkit or something. Have you heard of this happening before?

Regards,
Tom

#12 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 20 December 2009 - 09:03 PM

BTW, if Atapi.sys was in fact the problem, how did combofix fix it without killing my HDD? Atapi.sys is one of the primary I/O drivers, and without it, Windows won't boot, as far as I know. Does combofix create a clean version of the file, or simply repair the existing one? Just curious.

Regards,
Tom

#13 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 21 December 2009 - 03:10 AM

Hello tbateman,

First of all, since McAfee is free provided by your internet provider, I would not switch to something else. Just keep in mind that it (like all other security programs) has its shortcomings.

The tools we use are often detected as malware by regular scanners. Especially McAfee is good at that.

BTW, if Atapi.sys was in fact the problem, how did combofix fix it without killing my HDD?

It looked for a replacement on your system, found one, and replaced the infected copy with a clean one. You are right that deleting without replacing would have caused booting problems.

Combofix is indeed constantly updated.

MALWAREBYTES ANTIMALWARE
-------------------------------------------
Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


In your next reply, please include the following:
  • MBAM log
  • A description of any remaining problems.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#14 tbateman

tbateman
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:40 PM

Posted 22 December 2009 - 02:20 AM

When MBAM came upon the infected items listed below, it apparently set them off like land mines - McAfee detected the presence of many trojans at that time, MBAM slowed down at that point, then continued. After that, no problems. So far, everything seems to be working fine.

Regards,
Tom

Malwarebytes' Anti-Malware 1.42
Database version: 3407
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

12/21/2009 11:06:41 PM
mbam-log-2009-12-21 (23-06-41).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 347939
Time elapsed: 1 hour(s), 20 minute(s), 55 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 18

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP51\A0017088.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP51\A0017156.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP51\A0017244.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP52\A0017651.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP59\A0021595.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP60\A0021599.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP60\A0021629.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP61\A0021689.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP61\A0021737.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP62\A0021779.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP62\A0021790.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP63\A0021852.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP63\A0021871.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP63\A0021907.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP63\A0021896.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP65\A0023499.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP65\A0024634.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{57EB49C3-33D4-486E-B785-BB65BB5D201A}\RP65\A0024790.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

#15 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:09:40 AM

Posted 22 December 2009 - 02:45 AM

Hello tbateman,

That looks good! All detections were in the System Restore points. Anyway, we will reset System Restore once I am sure you are clean.

ESET ONLINE SCANNER
----------------------------
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    Note - when ESET doesn't find any threats, no report will be created.
  • Push the Posted Image button.
  • Push Posted Image
In your next reply, please include the following:
  • ESET online scan results

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users