Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan.Vundo Hijack.Sound .....Malwarebytes freezes and can't remove?


  • This topic is locked This topic is locked
21 replies to this topic

#1 thevicar

thevicar

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 16 November 2009 - 02:49 PM

On upgrading google chrome versions it stopped working, looking at various forums suggested that there might be a virus/Trojan at the root cause, having run McAfee and superantispyware with no detections, I ran Malwarebytes and sure enough a virus was found however the removal only partically deleted items and froze the program. After several re-runs I was able to not select some items for deletion and remove the others but am still left with a virus problem. The log does not seem to be stored when I try and remove all so have added the partial removal log below.

I would welcome any advice.

First the mbam log run several days ago (note this suggests some items not selected for removal, this was just to prevent to freezing problem, if I try and removal thee program locks and I didnt get a log):

Malwarebytes' Anti-Malware 1.41
Database version: 2775
Windows 5.1.2600 Service Pack 3

09/11/2009 19:53:26
mbam-log-2009-11-09 (19-53-26).txt

Scan type: Quick Scan
Objects scanned: 134876
Time elapsed: 33 minute(s), 24 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 9
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32.exe (Trojan.Agent) -> Not selected for removal.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: dusihcr.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\aux1 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\aux2 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\midi1 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\midi2 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\mixer1 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\mixer2 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\wave1 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\wave2 (Hijack.Sound) -> Bad: (C:\DOCUME~1\Nigel\APPLIC~1\MACROM~1\Common\ba61a0241.dll) Good: (wdmaud.drv) -> Not selected for removal.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\dusihcr.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\Documents and Settings\Nigel\Application Data\Macromedia\Common\ba61a0241.dll (Hijack.Sound) -> Quarantined and deleted successfully.
C:\Documents and Settings\Nigel\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv541254600698.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\msacm32.drv (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\wuasirvy.dll (Trojan.Banker) -> Quarantined and deleted successfully.


Next the hijaack this log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:19:01, on 15/11/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16915)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\KService\KService.exe
C:\WINDOWS\system32\lxdicoms.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\BT Broadband Desktop Help\btbb_wcm\McciTrayApp.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe
C:\Program Files\Common Files\Nokia\MPlatform\NokiaMServer.exe
C:\Program Files\Lexmark 3500-4500 Series\lxdimon.exe
C:\Program Files\Lexmark 3500-4500 Series\lxdiamon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
C:\WINDOWS\kdx\KHost.exe
C:\Program Files\Archos\ArchosLink\ArchosLink.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Orb Networks\Orb\bin\OrbTray.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\WINDOWS\system32\CTPdeSrv.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\PROGRA~1\Yahoo!\YOP\secstat.exe
C:\Program Files\Java\jre1.6.0_06\bin\jucheck.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Downloads\Anti - Virus, spyware, malware software\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/customi...fo/bt_side.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.red.clientapps.yahoo.com/customi...arch.yahoo.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www1.euro.dell.com/content/default....;l=en&s=gen
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - URLSearchHook: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: McAfee Phishing Filter - {27B4851A-3207-45A2-B947-BE8AFE6163AB} - c:\PROGRA~1\mcafee\msk\mskapbho.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\common\yiesrvc.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\PROGRA~1\mcafee\VIRUSS~1\scriptsn.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: {35cde401-d88a-5019-13d4-bfc506ab71ca} - {ac17ba60-5cfb-4d31-9105-a88d104edc53} - (no file)
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_B7C5AC242193BB3E.dll
O2 - BHO: SidebarAutoLaunch Class - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [ISUSPM Startup] "c:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE
O4 - HKLM\..\Run: [DSLAGENTEXE] C:\Program Files\BT Voyager 205 ADSL Router\Adsl\dslagent.exe
O4 - HKLM\..\Run: [GSISETUP] C:\DOCUME~1\Nigel\LOCALS~1\Temp\GsiInst.exe INSTALL C:\DOCUME~1\Nigel\LOCALS~1\Temp\.\V205Res 13
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [YBrowser] C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
O4 - HKLM\..\Run: [btbb_wcm_McciTrayApp] "C:\Program Files\BT Broadband Desktop Help\btbb_wcm\McciTrayApp.exe"
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [btbb_McciTrayApp] "C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe"
O4 - HKLM\..\Run: [NokiaMServer] C:\Program Files\Common Files\Nokia\MPlatform\NokiaMServer /watchfiles
O4 - HKLM\..\Run: [NokiaMusic FastStart] "C:\Program Files\Nokia\Nokia Music\NokiaMusic.exe" /command:faststart
O4 - HKLM\..\Run: [lxdimon.exe] "C:\Program Files\Lexmark 3500-4500 Series\lxdimon.exe"
O4 - HKLM\..\Run: [lxdiamon] "C:\Program Files\Lexmark 3500-4500 Series\lxdiamon.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup
O4 - HKCU\..\Run: [Yahoo! Pager] C:\PROGRA~1\Yahoo!\MESSEN~1\ypager.exe -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Creative Detector] "C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe" /R
O4 - HKCU\..\Run: [kdx] C:\WINDOWS\kdx\KHost.exe -all
O4 - HKCU\..\Run: [ArchosLink] C:\Program Files\Archos\ArchosLink\ArchosLink.exe /swmin
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [Orb] "C:\Program Files\Orb Networks\Orb\bin\OrbTray.exe" /background
O4 - HKCU\..\Run: [WAB] C:\Documents and Settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [Google Update] "C:\Documents and Settings\Lucy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [rundll32.exe] (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1008\..\Run: [WAB] C:\Documents and Settings\Lucy\Application Data\Macromedia\Common\ba61a02419.exe (User 'Lucy')
O4 - HKUS\S-1-5-21-4276667404-64940656-2914313638-1009\..\Run: [DellSupport] "C:\Program Files\Dell Support\DSAgnt.exe" /startup (User 'Jake')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Digital Line Detect.lnk = ?
O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: BT Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper2007261.dll
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1209745478421
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: urqrPjIC - urqrPjIC.dll (file missing)
O23 - Service: McAfee Application Installer Cleanup (0038651257908636) (0038651257908636mcinstcleanup) - McAfee, Inc. - C:\WINDOWS\TEMP\003865~1.EXE
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: KService - Kontiki Inc. - C:\Program Files\KService\KService.exe
O23 - Service: lxdiCATSCustConnectService - Lexmark International, Inc. - C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\\lxdiserv.exe
O23 - Service: lxdi_device - - C:\WINDOWS\system32\lxdicoms.exe
O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
O23 - Service: McAfee SiteAdvisor Service - McAfee, Inc. - C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee SpamKiller Service (MSK80Service) - McAfee, Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: ServiceLayer - Nokia. - C:\Program Files\Nokia\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: YPCService - Yahoo! Inc. - C:\WINDOWS\system32\YPCSER~1.EXE

--
End of file - 16879 bytes


Looking forward to your suggestions...

BC AdBot (Login to Remove)

 


#2 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 24 November 2009 - 04:45 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

Please include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.
  • Please download OTL from following mirror:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized
In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. I suggest you do this and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.

regards _temp_

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#3 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 25 November 2009 - 05:58 PM

Hi

Thanks for the response, understand you are busy and really appreciate the help.

Have tried to run the OTL.exe unfortunately I keep getting error messages (OLT.exe - Bad Image, with reference to a .tmp file - different one everytime, that is says is not a valid windows image and that I should check against an installation disk!) This has happened in excess of 40 times and each time requires manual intervention to proceed so I figured it was best to go back to you for your thoughts on how I proceed

Any ideas?

Ps I am away until friday lunchtime so wont respond until then.
Thanks

#4 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 25 November 2009 - 07:00 PM

Hi,

could you please try to run TFC:

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
TFC (Temp File Cleaner) will clear out all temp folders for all user accounts (temp, IE temp, java, FF, Opera, Chrome, Safari), including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder. It also cleans out the %systemroot%\temp folder and checks for .tmp files in the %systemdrive% root folder, %systemroot%, and the system32 folder (both 32bit and 64bit on 64bit OSs). It shows the amount removed for each location found (in bytes) and the total removed (in MB). Before running, it will stop Explorer and all other running apps. When finished, if a reboot is required the user must reboot to finish clearing any in-use temp files.

TFC only cleans temp folders. TFC will not clean URL history, prefetch, or cookies. Depending on how often someone cleans their temp folders, their system hardware, and how many accounts are present, it can take anywhere from a few seconds to a minute or more. TFC will completely clear all temp files where other temp file cleaners may fail. TFC requires a reboot immediately after running. Be sure to save any unsaved work before running TFC.

And then try to run OTL again.

Also please try to create a log with gmer:
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

I'll keep your log open over the week-end, thanks for letting me know.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#5 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 28 November 2009 - 04:16 AM

Hi

GMER log attached below....

GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-11-28 09:08:27
Windows 5.1.2600 Service Pack 3
Running: pk35njqn.exe; Driver: C:\DOCUME~1\Nigel\LOCALS~1\Temp\fxdyifog.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xB0F2E0B0]

Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateFile [0xB0E7078A]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateKey [0xB0E70821]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcess [0xB0E70738]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcessEx [0xB0E7074C]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwDeleteKey [0xB0E70835]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwDeleteValueKey [0xB0E70861]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwEnumerateKey [0xB0E708CF]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwEnumerateValueKey [0xB0E708B9]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwMapViewOfSection [0xB0E707CA]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwNotifyChangeKey [0xB0E708FB]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenKey [0xB0E7080D]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenProcess [0xB0E70710]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenThread [0xB0E70724]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwProtectVirtualMemory [0xB0E7079E]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwQueryKey [0xB0E70937]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwQueryMultipleValueKey [0xB0E708A3]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwQueryValueKey [0xB0E7088D]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwRenameKey [0xB0E7084B]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwReplaceKey [0xB0E70923]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwRestoreKey [0xB0E7090F]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetContextThread [0xB0E70776]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetInformationProcess [0xB0E70762]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetValueKey [0xB0E70877]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwTerminateProcess [0xB0E707F9]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwUnloadKey [0xB0E708E5]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0xB0E707E0]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwYieldExecution [0xB0E707B4]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtCreateFile
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtMapViewOfSection
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenProcess
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenThread
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtSetInformationProcess

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!_abnormal_termination + 451 804E2AAD 3 Bytes [E0, F2, B0]
.text ntoskrnl.exe!ZwYieldExecution 804F0EA6 7 Bytes JMP B0E707B8 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwOpenKey 80568EE9 5 Bytes JMP B0E70811 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwQueryValueKey 8056A382 7 Bytes JMP B0E70891 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtCreateFile 8056F600 5 Bytes JMP B0E7078E \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtSetInformationProcess 80570441 5 Bytes JMP B0E70766 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwCreateKey 80572E9D 5 Bytes JMP B0E70825 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwQueryKey 805732AD 7 Bytes JMP B0E7093B \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwEnumerateKey 805735A4 7 Bytes JMP B0E708D3 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtOpenProcess 805741D0 5 Bytes JMP B0E70714 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwProtectVirtualMemory 8057457F 7 Bytes JMP B0E707A2 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwUnmapViewOfSection 80578606 5 Bytes JMP B0E707E4 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtMapViewOfSection 80578A81 7 Bytes JMP B0E707CE \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwSetValueKey 80579A43 7 Bytes JMP B0E7087B \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwCreateProcessEx 80581030 7 Bytes JMP B0E70750 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwTerminateProcess 805836B0 5 Bytes JMP B0E707FD \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtOpenThread 8058B58D 5 Bytes JMP B0E70728 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwNotifyChangeKey 8058BA5D 5 Bytes JMP B0E708FF \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwEnumerateValueKey 80590669 7 Bytes JMP B0E708BD \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwDeleteValueKey 80592D50 7 Bytes JMP B0E70865 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwDeleteKey 805952BE 7 Bytes JMP B0E70839 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwCreateProcess 805B136A 3 Bytes JMP B0E7073C \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwCreateProcess + 4 805B136E 1 Byte [30]
PAGE ntoskrnl.exe!ZwSetContextThread 8062DD47 5 Bytes JMP B0E7077A \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwUnloadKey 8064DA6E 7 Bytes JMP B0E708E9 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwQueryMultipleValueKey 8064E394 7 Bytes JMP B0E708A7 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwRenameKey 8064E812 7 Bytes JMP B0E7084F \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwRestoreKey 8064ED05 5 Bytes JMP B0E70913 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwReplaceKey 8064F16E 5 Bytes JMP B0E70927 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
init C:\WINDOWS\system32\drivers\senfilt.sys entry point in "init" section [0xB9932F80]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\rundll32.exe[380] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00A80000
.text C:\WINDOWS\system32\rundll32.exe[380] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00A50000
.text C:\WINDOWS\system32\rundll32.exe[380] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00A30000
.text C:\WINDOWS\system32\rundll32.exe[380] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 01950000
.text C:\WINDOWS\system32\rundll32.exe[380] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 01700000
.text C:\WINDOWS\system32\rundll32.exe[380] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 01930000
.text C:\WINDOWS\system32\rundll32.exe[380] WS2_32.dll!send 71AB4C27 5 Bytes JMP 016A0000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 01660000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 00F90000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 00AA0000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 00FB0000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 00FD0000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 01620000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 00FF0000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 00E70000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00E50000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 01640000
.text C:\WINDOWS\system32\rundll32.exe[380] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 01680000
.text C:\Program Files\Orb Networks\Orb\bin\OrbTray.exe[420] kernel32.dll!SetUnhandledExceptionFilter 7C84495D 5 Bytes JMP 00413C60 C:\Program Files\Orb Networks\Orb\bin\OrbTray.exe (Orb/Orb Networks)
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01280000
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01280F6F
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01280064
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01280F8A
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 0128003D
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01280FA5
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 012800AD
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 0128009C
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 012800E3
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 01280F4A
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 012800F4
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 0128002C
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01280FE5
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 0128007F
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 01280FC0
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 01280011
.text C:\WINDOWS\system32\services.exe[676] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 012800BE
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 01270FCD
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 01270F6B
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 01270FDE
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 0127000A
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 01270F7C
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 01270FEF
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 01270F97
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [47, 89]
.text C:\WINDOWS\system32\services.exe[676] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 01270FB2
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01260FAB
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!system 77C293C7 5 Bytes JMP 01260FBC
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01260FD7
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01260000
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01260022
.text C:\WINDOWS\system32\services.exe[676] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01260011
.text C:\WINDOWS\system32\services.exe[676] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00FF0000
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01800FE5
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01800067
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01800056
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01800F72
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 01800F8D
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01800FB9
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 01800F57
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 0180009F
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 01800F21
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 018000BA
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 018000D5
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 01800F9E
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01800FD4
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01800082
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 01800025
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 0180000A
.text C:\WINDOWS\system32\lsass.exe[688] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 01800F3C
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 017F0025
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 017F0F9B
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 017F0FD4
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 017F000A
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 017F0062
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 017F0FEF
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 017F0047
.text C:\WINDOWS\system32\lsass.exe[688] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 017F0036
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 017E0F95
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!system 77C293C7 5 Bytes JMP 017E0FB0
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 017E000C
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!_open 77C2F566 5 Bytes JMP 017E0FEF
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 017E0FC1
.text C:\WINDOWS\system32\lsass.exe[688] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 017E0FDE
.text C:\WINDOWS\system32\lsass.exe[688] WS2_32.dll!socket 71AB4211 5 Bytes JMP 017D0FE5
.text C:\WINDOWS\system32\lsass.exe[688] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 017C0000
.text C:\WINDOWS\system32\lsass.exe[688] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 017C001B
.text C:\WINDOWS\system32\lsass.exe[688] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 017C0FE5
.text C:\WINDOWS\system32\lsass.exe[688] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 017C0036
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01730000
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 0173008E
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 0173007D
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01730FAF
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 0173006C
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01730FCA
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 01730F6D
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 017300A9
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 017300FC
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 017300EB
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 01730117
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 0173005B
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01730FE5
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01730F7E
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 01730036
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 01730025
.text C:\WINDOWS\system32\svchost.exe[864] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 017300D0
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 01720036
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 01720076
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 0172001B
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 0172000A
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 01720FB9
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 01720FEF
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 01720FCA
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [92, 89]
.text C:\WINDOWS\system32\svchost.exe[864] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 01720051
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00FF0044
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!system 77C293C7 5 Bytes JMP 00FF0FC3
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00FF0FDE
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00FF0FEF
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00FF0033
.text C:\WINDOWS\system32\svchost.exe[864] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00FF0018
.text C:\WINDOWS\system32\svchost.exe[864] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00EA0FE5
.text C:\WINDOWS\system32\svchost.exe[864] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 00E90000
.text C:\WINDOWS\system32\svchost.exe[864] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00E90011
.text C:\WINDOWS\system32\svchost.exe[864] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00E90FDB
.text C:\WINDOWS\system32\svchost.exe[864] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 00E90FC0
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00A7000A
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00A7005D
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00A7004C
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00A70F68
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00A7001B
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00A70F9E
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00A70F43
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00A7008B
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00A70F1E
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00A700B7
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00A70F03
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00A70F79
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00A70FE5
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00A7006E
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00A70FB9
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00A70FCA
.text C:\WINDOWS\system32\svchost.exe[960] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00A7009C
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00A60025
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00A60F7C
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00A60FDE
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00A60FEF
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00A60F8D
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00A60000
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00A60F9E
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [C6, 88]
.text C:\WINDOWS\system32\svchost.exe[960] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00A60FB9
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00A5004E
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!system 77C293C7 5 Bytes JMP 00A5003D
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00A50011
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00A50000
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00A50022
.text C:\WINDOWS\system32\svchost.exe[960] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00A50FD7
.text C:\WINDOWS\system32\svchost.exe[960] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00A40000
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 030D0000
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 030D0F8A
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 030D0FA5
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 030D007F
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 030D0FB6
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 030D0047
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 030D00C1
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 030D00A4
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 030D0F4A
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 030D00ED
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 030D00FE
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 030D0058
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateFileW 7C810800 3 Bytes JMP 030D0011
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateFileW + 4 7C810804 1 Byte [86]
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreatePipe 7C81D83F 3 Bytes JMP 030D0F79
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreatePipe + 4 7C81D843 1 Byte [86]
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 030D0FDB
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 030D002C
.text C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 030D00DC
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 02C40FDB
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 02C40F9B
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 02C40022
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 02C40011
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 02C40062
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 02C40000
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 02C40FC0
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [E4, 8A] {IN AL, 0x8a}
.text C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 02C4003D
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 02C30027
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!system 77C293C7 5 Bytes JMP 02C30F9C
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 02C30FC8
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!_open 77C2F566 5 Bytes JMP 02C30FEF
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 02C30FAD
.text C:\WINDOWS\System32\svchost.exe[1068] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 02C3000C
.text C:\WINDOWS\System32\svchost.exe[1068] WS2_32.dll!socket 71AB4211 5 Bytes JMP 02C20FEF
.text C:\WINDOWS\System32\svchost.exe[1068] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 02540FEF
.text C:\WINDOWS\System32\svchost.exe[1068] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 02540FCA
.text C:\WINDOWS\System32\svchost.exe[1068] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 0254000A
.text C:\WINDOWS\System32\svchost.exe[1068] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 02540FB9
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 006C0000
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 006C00A4
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 006C0FAF
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 006C0089
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 006C006C
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 006C0FCA
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 006C00BF
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 006C0F83
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 006C00EB
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 006C0F48
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 006C0F37
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 006C0047
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 006C0FE5
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 006C0F94
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 006C0036
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 006C001B
.text C:\WINDOWS\system32\svchost.exe[1112] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 006C00D0
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00670040
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00670FC0
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00670025
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00670014
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00670073
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00670FEF
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 00670062
.text C:\WINDOWS\system32\svchost.exe[1112] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00670051
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00660FCF
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!system 77C293C7 5 Bytes JMP 0066005A
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00660038
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00660000
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00660049
.text C:\WINDOWS\system32\svchost.exe[1112] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 0066001D
.text C:\WINDOWS\system32\svchost.exe[1112] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00650FEF
.text C:\WINDOWS\system32\svchost.exe[1112] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 00640FEF
.text C:\WINDOWS\system32\svchost.exe[1112] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00640FDE
.text C:\WINDOWS\system32\svchost.exe[1112] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00640014
.text C:\WINDOWS\system32\svchost.exe[1112] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 00640025
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00BD0000
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00BD0F3F
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00BD0F5A
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00BD0F6B
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00BD0F7C
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00BD0FA8
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00BD0087
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00BD0076
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00BD00BD
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00BD0F1A
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00BD00CE
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00BD0F8D
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00BD0FE5
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00BD0059
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00BD0FB9
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00BD0FCA
.text C:\WINDOWS\system32\svchost.exe[1224] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00BD0098
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00BC0FC3
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00BC0F6B
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00BC0FDE
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00BC0FEF
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00BC0F86
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00BC000A
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00BC0FA1
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [DC, 88]
.text C:\WINDOWS\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00BC0FB2
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00BB003D
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!system 77C293C7 5 Bytes JMP 00BB0FB2
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00BB0011
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00BB0FEF
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00BB0022
.text C:\WINDOWS\system32\svchost.exe[1224] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00BB0000
.text C:\WINDOWS\system32\svchost.exe[1224] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00B90FEF
.text C:\WINDOWS\system32\svchost.exe[1224] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00B90FD4
.text C:\WINDOWS\system32\svchost.exe[1224] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00B9000A
.text C:\WINDOWS\system32\svchost.exe[1224] WININET.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 00B90025
.text C:\WINDOWS\system32\svchost.exe[1224] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00BA0FE5
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 009C0000
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 009C0F4D
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 009C004C
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 009C0F72
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 009C0F83
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 009C002F
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 009C0F1C
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 009C006E
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 009C00A1
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 009C0090
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 009C00BC
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 009C0FA8
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 009C0FE5
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 009C005D
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 009C0FC3
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 009C0FD4
.text C:\WINDOWS\system32\svchost.exe[1296] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 009C007F
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 009B002F
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 009B005B
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 009B0014
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 009B0FDE
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 009B004A
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 009B0FEF
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 009B0FA8
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [BB, 88]
.text C:\WINDOWS\system32\svchost.exe[1296] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 009B0FB9
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 009A0047
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!system 77C293C7 5 Bytes JMP 009A0FBC
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 009A0FCD
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!_open 77C2F566 5 Bytes JMP 009A0000
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 009A0022
.text C:\WINDOWS\system32\svchost.exe[1296] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 009A0011
.text C:\WINDOWS\system32\svchost.exe[1296] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00990FE5
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00840000
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 008400B8
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00840FB9
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00840087
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00840076
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00840047
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00840F86
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00840F97
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 008400FA
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 008400DF
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00840F46
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00840FCA
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 0084001B
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00840FA8
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00840FDB
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00840036
.text C:\WINDOWS\system32\svchost.exe[1984] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00840F61
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00830FC0
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00830F91
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00830FDB
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00830011
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 0083004E
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00830000
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 0083003D
.text C:\WINDOWS\system32\svchost.exe[1984] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 0083002C
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00820064
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!system 77C293C7 5 Bytes JMP 00820049
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0082001D
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!_open 77C2F566 5 Bytes JMP 0082000C
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00820038
.text C:\WINDOWS\system32\svchost.exe[1984] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00820FEF
.text C:\WINDOWS\system32\svchost.exe[1984] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00810000
.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[2372] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 0041C130 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[2372] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 0041C1B0 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 021B0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 02190000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 02170000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 02720000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 026E0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 02700000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 02600000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 02360000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 02300000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 02380000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 023A0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 023E0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 023C0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 02340000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 02320000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 025E0000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 02620000
.text C:\PROGRA~1\Yahoo!\YOP\yop.exe[2756] ws2_32.dll!send 71AB4C27 5 Bytes JMP 02640000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00FB0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00F90000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00F70000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 014F0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 01480000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 014D0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WS2_32.dll!send 71AB4C27 5 Bytes JMP 01340000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 01300000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 01030000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 00FD0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 01050000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 01170000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 012C0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 012A0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 01010000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00FF0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 012E0000
.text C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe[2868] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 01320000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00250FE5
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00250F29
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00250F3A
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00250F55
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 0025001E
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00250F83
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00250F18
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00250060
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 002500B1
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 002500A0
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00250F07
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00250F72
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00250FCA
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 02510000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreatePipe 7C81D83F 1 Byte [E9]
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00250043
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00250F94
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00250FB9
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 0025007B
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00340FA8
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00340F8D
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00340FB9
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00340FD4
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 0034004A
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00340FE5
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 02E60000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 02DF0000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 0034002F
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 0034000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 02E40000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4B9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E351FF7 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E351F78 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E351FBC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E351F04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E351F3E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E352032 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E2017EA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 0035003B
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!system 77C293C7 5 Bytes JMP 00350020
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00350FC1
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00350FEF
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00350FB0
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00350FD2
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E3521F4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 02D50000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 02BB0000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 02550000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 02BD0000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 01600FEF
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 02BF0000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 01600FD4
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 0160000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 02C30000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 02C10000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 02B90000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 02570000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 02C50000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 01600FAF
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 02D70000
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ws2_32.dll!socket 71AB4211 5 Bytes JMP 01C1000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2912] ws2_32.dll!send 71AB4C27 5 Bytes JMP 02D90000
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001A0FE5
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001A0075
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001A0F8A
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001A0064
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001A0047
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001A001B
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001A0F4F
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001A0097
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001A00E8
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001A00CD
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001A0F34
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001A002C
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001A0000
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00D60000
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001A0086
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001A0FAF
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001A0FD4
.text C:\WINDOWS\Explorer.EXE[2992] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001A00B2
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00290FCD
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00290F75
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 0029001E
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00290FDE
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00290F86
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00290FEF
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00290F97
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [49, 88]
.text C:\WINDOWS\Explorer.EXE[2992] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00290FA8
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 002A0066
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!system 77C293C7 5 Bytes JMP 002A0055
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 002A0029
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!_open 77C2F566 5 Bytes JMP 002A000C
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 002A003A
.text C:\WINDOWS\Explorer.EXE[2992] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 002A0FEF
.text C:\WINDOWS\Explorer.EXE[2992] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 002C0FE5
.text C:\WINDOWS\Explorer.EXE[2992] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 002C000A
.text C:\WINDOWS\Explorer.EXE[2992] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 002C0025
.text C:\WINDOWS\Explorer.EXE[2992] WININET.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 002C0FCA
.text C:\WINDOWS\Explorer.EXE[2992] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00CA000A
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01740FEF
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01740F84
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01740F95
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 0174006F
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 0174005E
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01740FC3
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 017400A5
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 0174008A
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 01740F31
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 017400C0
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 017400E5
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 01740FB2
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 0174000A
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01740F5F
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 0174002F
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 01740FD4
.text C:\WINDOWS\system32\svchost.exe[3368] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 01740F42
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 0173001E
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 01730F8D
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 01730FCD
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 01730FDE
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 0173004A
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 01730FEF
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 01730FB2
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [93, 89]
.text C:\WINDOWS\system32\svchost.exe[3368] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 0173002F
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01720049
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!system 77C293C7 5 Bytes JMP 0172002E
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0172001D
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01720000
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01720FBE
.text C:\WINDOWS\system32\svchost.exe[3368] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01720FE3
.text C:\WINDOWS\system32\svchost.exe[3368] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00FF0FEF
.text C:\WINDOWS\system32\svchost.exe[3368] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 00CA0000
.text C:\WINDOWS\system32\svchost.exe[3368] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00CA0011
.text C:\WINDOWS\system32\svchost.exe[3368] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00CA0022
.text C:\WINDOWS\system32\svchost.exe[3368] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 00CA0FD1
.text C:\WINDOWS\system32\rundll32.exe[3632] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00A90000
.text C:\WINDOWS\system32\rundll32.exe[3632] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00A70000
.text C:\WINDOWS\system32\rundll32.exe[3632] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00A30000
.text C:\WINDOWS\system32\rundll32.exe[3632] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 01A20000
.text C:\WINDOWS\system32\rundll32.exe[3632] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 019A0000
.text C:\WINDOWS\system32\rundll32.exe[3632] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 01A00000
.text C:\WINDOWS\system32\rundll32.exe[3632] WS2_32.dll!send 71AB4C27 5 Bytes JMP 01940000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 016D0000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 01610000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 00E40000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 01630000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 01650000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 01690000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 01670000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 00E80000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00E60000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 016B0000
.text C:\WINDOWS\system32\rundll32.exe[3632] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 016F0000
.text C:\WINDOWS\kdx\KHost.exe[3700] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01C40000
.text C:\WINDOWS\kdx\KHost.exe[3700] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01C20000
.text C:\WINDOWS\kdx\KHost.exe[3700] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 01C00000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 01D80000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 01CC0000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 01C60000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 01CE0000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 01D00000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 01D40000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 01D20000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 01CA0000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 01C80000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 01D60000
.text C:\WINDOWS\kdx\KHost.exe[3700] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 02080000
.text C:\WINDOWS\kdx\KHost.exe[3700] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 02180000
.text C:\WINDOWS\kdx\KHost.exe[3700] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 02110000
.text C:\WINDOWS\kdx\KHost.exe[3700] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 02160000
.text C:\WINDOWS\kdx\KHost.exe[3700] WS2_32.dll!send 71AB4C27 5 Bytes JMP 020B0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01170000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01150000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 01100000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 01DB0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 01D40000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 01D90000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] WS2_32.dll!send 71AB4C27 5 Bytes JMP 01CD0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 01AB0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 019F0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 01190000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 01A10000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 01A30000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 01A70000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 01A50000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 019D0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 011B0000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 01A90000
.text C:\Program Files\Analog Devices\Core\smax4pnp.exe[4636] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 01CB0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001A0FEF
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001A0076
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001A0065
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001A0054
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001A0F97
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001A0FB2
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001A0F41
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001A0F5C
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001A00AE
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001A0F15
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001A0EFA
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001A0039
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001A0FDE
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00BD0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001A0087
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001A001E
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001A0FCD
.text C:\Program Files\Messenger\msmsgs.exe[4776] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001A0F26
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00290047
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!system 77C293C7 5 Bytes JMP 0029002C
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00290FD7
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00290000
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00290FC6
.text C:\Program Files\Messenger\msmsgs.exe[4776] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00290011
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 002A0F9E
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 002A0F61
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 002A0FAF
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 002A0FCA
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 002A0014
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 002A0FE5
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 011D0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 00FB0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 002A0F7C
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [4A, 88]
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 002A0F8D
.text C:\Program Files\Messenger\msmsgs.exe[4776] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 011B0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WS2_32.dll!socket 71AB4211 5 Bytes JMP 002B0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00F50000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 00E30000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 00C70000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 00C10000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 00C90000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 002C0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 00DB0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 002C001B
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 002C0FDB
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 00DF0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 00DD0000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 00C50000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00C30000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 00E10000
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 002C0FCA
.text C:\Program Files\Messenger\msmsgs.exe[4776] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 00E50000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 017D0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 017B0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00E60000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 02320000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 02290000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 02300000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] WS2_32.dll!send 71AB4C27 5 Bytes JMP 02050000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 02010000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 01850000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 017F0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 01F70000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 01F90000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 01FD0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 01FB0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 01830000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 01810000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 01FF0000
.text C:\Program Files\Real\RealPlayer\RealPlay.exe[5180] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 02030000
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001B0000
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001B0F92
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001B0FA3
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001B0087
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001B0076
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001B005B
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001B00C9
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001B0F81
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001B0F4B
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001B0F70
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001B00FF
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001B0FD4
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001B0025
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00BC0000
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001B00A2
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001B0040
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001B0FEF
.text C:\WINDOWS\system32\wuauclt.exe[5764] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001B00E4
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 002A0049
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!system 77C293C7 5 Bytes JMP 002A0038
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 002A0FE3
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!_open 77C2F566 5 Bytes JMP 002A000C
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 002A0FBE
.text C:\WINDOWS\system32\wuauclt.exe[5764] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 002A001D
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 002B001B
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 002B0FAF
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 002B0000
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 002B0FCA
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 002B006C
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 002B0FEF
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 01190000
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 01120000
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 002B0051
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 002B002C
.text C:\WINDOWS\system32\wuauclt.exe[5764] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 01170000
.text C:\WINDOWS\system32\wuauclt.exe[5764] WS2_32.dll!socket 71AB4211 5 Bytes JMP 003D0FE5
.text C:\WINDOWS\system32\wuauclt.exe[5764] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00DD0000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 00D90000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 00C60000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 00C00000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 00CF0000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetOpenA 3D953081 5 Bytes JMP 00A0000A
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 00D10000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00A00FEF
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00A00FD4
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 00D50000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 00D30000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 00C40000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00C20000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 00D70000
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!InternetOpenUrlW 3D998439 5 Bytes JMP 00A00FB9
.text C:\WINDOWS\system32\wuauclt.exe[5764] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 00DB0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 096C0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 096A0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 09650000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 09800000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 09740000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!InternetReadFile 3D9513D4 5 Bytes JMP 096E0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 09760000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!HttpSendRequestA 3D953558 5 Bytes JMP 09780000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 097C0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 097A0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 09720000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!InternetReadFileExA 3D963384 5 Bytes JMP 09700000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 097E0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WININET.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 09830000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 09C00000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 09B90000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 09BE0000
.text C:\Program Files\iTunes\iTunesHelper.exe[5864] WS2_32.dll!send 71AB4C27 5 Bytes JMP 09B30000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 009B0000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00990000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] kernel32.dll!ExitProcess 7C81CB12 5 Bytes JMP 00970000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] ADVAPI32.dll!CryptDeriveKey 77DE9FFD 5 Bytes JMP 01260000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] ADVAPI32.dll!CryptImportKey 77DEA1F1 5 Bytes JMP 01010000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] ADVAPI32.dll!CryptGenKey 77E11849 5 Bytes JMP 01030000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00FB0000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!HttpAddRequestHeadersA 3D94632F 5 Bytes JMP 00F70000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!InternetConnectA 3D94B0D2 5 Bytes JMP 00A80000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!InternetReadFile 3D9513D4 5 Bytes JMP 009E0000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!InternetQueryDataAvailable 3D951615 5 Bytes JMP 00BD0000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!HttpSendRequestA 3D953558 5 Bytes JMP 00BF0000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!CommitUrlCacheEntryA 3D95E9AA 5 Bytes JMP 00C30000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!HttpSendRequestW 3D95FDF9 5 Bytes JMP 00C10000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!InternetReadFileExW 3D96334C 5 Bytes JMP 00A20000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!InternetReadFileExA 3D963384 5 Bytes JMP 00A00000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!CommitUrlCacheEntryW 3D976F94 5 Bytes JMP 00F50000
.text C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe[5912] wininet.dll!HttpAddRequestHeadersW 3D9AA4C5 5 Bytes JMP 00F90000

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW] [63602723] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryA] [63602640] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [636022E2] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryW] [63602687] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryExW] [63602723] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryA] [63602640] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [636022E2] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryW] [63602687] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryA] [63602640] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryW] [63602687] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!GetProcAddress] [636022E2] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExW] [63602723] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExA] [636026CE] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TrackPopupMenuEx] [636015B4] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!DefWindowProcA] [63601F71] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetSysColor] [63601EA6] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!DefWindowProcW] [63601F47] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TrackPopupMenu] [6360158D] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExA] [636026CE] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExW] [63602723] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryW] [63602687] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryA] [63602640] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [636022E2] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!DefWindowProcA] [63601F71] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!DefWindowProcW] [63601F47] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!GetSysColor] [63601EA6] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TrackPopupMenu] [6360158D] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TrackPopupMenuEx] [636015B4] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\PSAPI.DLL [KERNEL32.dll!LoadLibraryA] [63602640] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe[1312] @ C:\WINDOWS\system32\PSAPI.DLL [KERNEL32.dll!GetProcAddress] [636022E2] C:\Program Files\Yahoo!\Shared\YbSkin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)

Device \FileSystem\Cdfs \Cdfs DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\000a3a51d929
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\000a3a51d929@001fe4800717 0x03 0x9B 0xFF 0x0D ...
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\000a3a51d929 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\000a3a51d929@001fe4800717 0x03 0x9B 0xFF 0x0D ...
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls@C:\Program Files\Textease\Resource Banks\French\Au café et au restaurant \x2013 Eating out.te 1

---- EOF - GMER 1.0.15 ----


I also ran the cleaner tool TFC as per instruction and ran the OTL program I still got the error message although not as often (it referred to a .tmp file that the program was creating updating and deleting?) - but at the end after the scan finished I got an out of memory warning and no log file popped up - are they stored somewhere so I can go and copy or or do I need to re-run?

Thanks

#6 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 28 November 2009 - 01:06 PM

Hi,

a copy of these files should be stored in C:\_OTL. Please check if you can find them.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#7 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 29 November 2009 - 05:23 AM

Hi Myrti

unfortunately there is no _OTL directory, so it looks like it either didnt complete or perhaps when I turned mcAfee back on it did say removing trojan OTL.exe, so maybe that cleared it out?

I could try to run again but it requires me to sit with the PC for a couple of hours. There error message I was getting was saying that the file ba61a0242.tmp was not a valid image file - this appeared to be continually created and deleted by the app? Once I cleared the message it would continue the scan but stop again with the same error shortly after.

PC runs pretty slow and a key symptom is that google Chrome does not load unless I load it with the --no-sandbox option, then it works ok, but a little slower than usual, this is what pointed me towards a virus of some form.

Are there any other tools I can run?

Thanks again for your assistance

#8 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 29 November 2009 - 02:54 PM

Hi

since OTL won't work please try running DDS:
Please run a scan with DDS:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
    DDS.scr
    DDS.pif
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results, click no to the Optional_Scan
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.

Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.


Information on A/V control HERE

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#9 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 30 November 2009 - 02:15 PM

Hi Myrti

here is the DDS file:


DDS (Ver_09-11-29.01) - NTFSx86
Run by Nigel at 19:07:16.25 on 30/11/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_06
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.513 [GMT 0:00]

AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
svchost.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\KService\KService.exe
C:\WINDOWS\system32\lxdicoms.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\rundll32.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\PROGRA~1\Yahoo!\browser\ybrwicon.exe
C:\PROGRA~1\Yahoo!\YOP\yop.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\BT Broadband Desktop Help\btbb_wcm\McciTrayApp.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe
C:\PROGRA~1\Yahoo!\browser\ycommon.exe
C:\Program Files\Common Files\Nokia\MPlatform\NokiaMServer.exe
C:\Program Files\Lexmark 3500-4500 Series\lxdimon.exe
C:\Program Files\Lexmark 3500-4500 Series\lxdiamon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
C:\WINDOWS\kdx\KHost.exe
C:\Program Files\Archos\ArchosLink\ArchosLink.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Orb Networks\Orb\bin\OrbTray.exe
C:\PROGRA~1\Yahoo!\YOP\secstat.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\WINDOWS\system32\CTPdeSrv.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Nigel\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\wuauclt.exe
c:\PROGRA~1\mcafee\msc\mcshell.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\Nigel\Desktop\dds.scr

============== Pseudo HJT Report ===============

uSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uStart Page = hxxp://www.google.co.uk/
uInternet Connection Wizard,ShellNext = hxxp://www1.euro.dell.com/content/default.aspx?c=uk&l=en&s=gen
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
uURLSearchHooks: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - c:\progra~1\mcafee\msk\mskapbho.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\progra~1\yahoo!\common\yiesrvc.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_06\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: {ac17ba60-5cfb-4d31-9105-a88d104edc53} - No File
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Google Dictionary Compression sdch: {c84d72fe-e17d-4195-bb24-76c02e2e7c4e} - c:\program files\google\google toolbar\component\fastsearch_B7C5AC242193BB3E.dll
BHO: SidebarAutoLaunch Class: {f2aa9440-6328-4933-b7c9-a6ccdf9cbf6d} - c:\program files\yahoo!\browser\YSidebarIEBHO.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No File
uRun: [DellSupport] "c:\program files\dell support\DSAgnt.exe" /startup
uRun: [Yahoo! Pager] c:\progra~1\yahoo!\messen~1\ypager.exe -quiet
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Creative Detector] "c:\program files\creative\mediasource\detector\CTDetect.exe" /R
uRun: [kdx] c:\windows\kdx\KHost.exe -all
uRun: [ArchosLink] c:\program files\archos\archoslink\ArchosLink.exe /swmin
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Google Update] "c:\documents and settings\nigel\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [Orb] "c:\program files\orb networks\orb\bin\OrbTray.exe" /background
uRun: [rundll32.exe]
uRun: [WAB] c:\documents and settings\nigel\application data\macromedia\common\ba61a02419.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [ISUSPM Startup] "c:\program files\common files\installshield\updateservice\isuspm.exe" -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [DSLAGENTEXE] c:\program files\bt voyager 205 adsl router\adsl\dslagent.exe
mRun: [GSISETUP] c:\docume~1\nigel\locals~1\temp\gsiinst.exe install c:\docume~1\nigel\locals~1\temp\.\V205Res 13
mRun: [REGSHAVE] c:\program files\regshave\REGSHAVE.EXE /AUTORUN
mRun: [YBrowser] c:\progra~1\yahoo!\browser\ybrwicon.exe
mRun: [YOP] c:\progra~1\yahoo!\yop\yop.exe /autostart
mRun: [Adobe Photo Downloader] "c:\program files\adobe\photoshop album starter edition\3.0\apps\apdproxy.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [SunJavaUpdateSched] "c:\program files\java\jre1.6.0_06\bin\jusched.exe"
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [btbb_wcm_McciTrayApp] "c:\program files\bt broadband desktop help\btbb_wcm\McciTrayApp.exe"
mRun: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
mRun: [RealTray] c:\program files\real\realplayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [btbb_McciTrayApp] "c:\program files\bt broadband desktop help\btbb\BTHelpNotifier.exe"
mRun: [NokiaMServer] c:\program files\common files\nokia\mplatform\NokiaMServer /watchfiles
mRun: [NokiaMusic FastStart] "c:\program files\nokia\nokia music\NokiaMusic.exe" /command:faststart
mRun: [lxdimon.exe] "c:\program files\lexmark 3500-4500 series\lxdimon.exe"
mRun: [lxdiamon] "c:\program files\lexmark 3500-4500 series\lxdiamon.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\winzip~1.lnk - c:\program files\winzip\WZQKPICK.EXE
uPolicies-system: EnableProfileQuota = 1 (0x1)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_06\bin\ssv.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\progra~1\yahoo!\common\yiesrvc.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper2007261.dll
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1209745478421
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
Notify: urqrPjIC - urqrPjIC.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll,
LSA: Authentication Packages = msv1_0 c:\windows\system32\ljJDUnLd

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\nigel\applic~1\mozilla\firefox\profiles\wb1p5bz8.default\
FF - component: c:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: dom.disable_open_during_load - false // Popupblocker control handled by McAfee Privacy Service

============= SERVICES / DRIVERS ===============

R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2007-6-6 214664]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-10-12 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 74480]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2007-6-6 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2007-6-6 35272]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 7408]
S3 iadusb;BT Voyager 205 ADSL Router;c:\windows\system32\drivers\glauiad.sys [2006-6-4 30371]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2007-6-6 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2007-6-6 40552]
S3 nmwcdnsu;Nokia USB Flashing Phone Parent;c:\windows\system32\drivers\nmwcdnsu.sys [2009-8-15 136704]
S3 nmwcdnsuc;Nokia USB Flashing Generic;c:\windows\system32\drivers\nmwcdnsuc.sys [2009-8-15 8320]

============== File Associations ===============

regfile=regedit.exe "%1" %*
scrfile="%1" %*

=============== Created Last 30 ================

2009-11-26 15:58:28 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-11-26 02:05:22 0 d-----w- c:\program files\MSXML 4.0
2009-11-14 11:08:24 3250 ----a-w- c:\windows\system32\wbem\Outlook_01ca651ac8371a90.mof
2009-11-08 14:30:12 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-11-06 18:14:32 0 d-----w- c:\windows\system32\drivers\AVGIDSErHrw7x.sys
2009-11-05 19:09:40 0 d--h--w- C:\$AVG
2009-11-05 19:07:42 0 d-----w- c:\docume~1\alluse~1\applic~1\avg9
2009-11-05 19:03:12 0 d-----w- c:\program files\AVG
2009-11-05 17:43:41 54156 ---ha-w- c:\windows\QTFont.qfn
2009-11-05 17:43:41 1409 ----a-w- c:\windows\QTFont.for
2009-11-05 16:49:25 1136 ----a-w- c:\windows\chrome.exe.lnk
2009-11-05 15:26:05 36 ----a-w- c:\windows\rasqervy.dll
2009-11-05 15:26:03 8 ----a-w- c:\windows\sdfinacs.dll
2009-11-05 15:25:58 5 ----a-w- c:\windows\sdfixwcs.dll

==================== Find3M ====================

2009-10-21 04:08:54 3598336 ------w- c:\windows\system32\dllcache\mshtml.dll
2009-10-02 17:38:13 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_00_00.Wdf
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-11 14:18:39 136192 ------w- c:\windows\system32\dllcache\msv1_0.dll
2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-04 21:03:36 58880 ------w- c:\windows\system32\dllcache\msasn1.dll
2008-06-24 15:07:55 5632 --sha-w- c:\program files\Thumbs.db
2007-03-19 11:47:30 88 --sh--r- c:\windows\system32\691A32CDBA.sys
2007-03-10 22:50:29 56 --sh--r- c:\windows\system32\BACD321A69.sys
2008-04-28 15:45:11 408979 --sha-w- c:\windows\system32\dLnUDJjl.ini2
2006-05-03 09:06:54 163328 --sh--r- c:\windows\system32\flvDX.dll
2008-05-06 12:10:13 10856 --sha-w- c:\windows\system32\KGyGaAvL.sys
2007-02-21 10:47:16 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 12:30:52 216064 --sh--r- c:\windows\system32\nbDX.dll
2008-05-19 14:12:59 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008051920080520\index.dat

============= FINISH: 19:09:14.62 ===============

and as instructed I have attached the attach.txt file

thanks again for your help

Attached Files



#10 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 01 December 2009 - 09:12 AM

Hi,

I'm afraid I have bad news:

Your logs reveal an information stealing trojan.


I recommend that you disconnect this PC from the Internet immediately, and only reconnect to download any tools that are required to clean your PC.

If you do any banking or other financial transactions on the PC or it if it contains any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation as soon as possible.

If you do not have access to a known clean computer, you will still need to change your passwords, and all other sensitive information, but only once your system is deemed clean.

Please download ComboFix from one of these locations:

Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Temporarily disable isable your AntiVirus and AntiSpyware applications. They may otherwise interfere with our tools
    Usually this can be done via a right click on the System Tray icon, check this tutorial for disabling the most common security programs: Link

  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#11 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 01 December 2009 - 03:39 PM

Hi Myrti

thanks for the rather worrying diagnosis, will do as you request. Here is the combofix log:

ComboFix 09-12-01.01 - Nigel 01/12/2009 19:53.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.1037 [GMT 0:00]
Running from: c:\documents and settings\Nigel\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Nigel\Application Data\inst.exe
c:\documents and settings\Nigel\Local Settings\Temporary Internet Files\mcc20A.tmp
c:\documents and settings\Nigel\Local Settings\Temporary Internet Files\mcc67E.tmp
c:\documents and settings\Nigel\Local Settings\Temporary Internet Files\mccAA3.tmp
c:\documents and settings\Nigel\Local Settings\Temporary Internet Files\mccF68.tmp
c:\windows\rasqervy.dll
c:\windows\sdfinacs.dll
c:\windows\sdfixwcs.dll
c:\windows\system32\config\systemprofile\Application Data\Macromedia\Common
c:\windows\system32\config\systemprofile\Application Data\Macromedia\Common\ba61a02419.exe
c:\windows\system32\dLnUDJjl.ini
c:\windows\system32\dLnUDJjl.ini2
c:\windows\system32\myxsujhm.ini

c:\windows\system32\proquota.exe was missing
Restored copy from - c:\windows\ServicePackFiles\i386\proquota.exe

.
((((((((((((((((((((((((( Files Created from 2009-11-01 to 2009-12-01 )))))))))))))))))))))))))))))))
.

2009-12-01 20:05 . 2008-04-14 00:12 50176 ----a-w- c:\windows\system32\proquota.exe
2009-12-01 20:05 . 2008-04-14 00:12 50176 ----a-w- c:\windows\system32\dllcache\proquota.exe
2009-12-01 18:38 . 2009-12-01 18:46 18432 ----a-w- c:\documents and settings\Jake\Application Data\Macromedia\Common\ba61a02419.exe
2009-11-26 15:58 . 2009-11-26 15:58 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-11-26 02:05 . 2009-11-26 02:05 -------- d-----w- c:\program files\MSXML 4.0
2009-11-11 19:21 . 2009-11-11 19:21 -------- d-----w- c:\documents and settings\Jake\Application Data\Malwarebytes
2009-11-10 16:39 . 2009-11-10 16:39 -------- d-----w- c:\documents and settings\Lucy\Application Data\Malwarebytes
2009-11-10 00:13 . 2009-11-10 00:14 16384 ----a-w- c:\documents and settings\LocalService\Application Data\Macromedia\Common\ba61a02419.exe
2009-11-09 21:08 . 2009-12-01 13:18 18432 ----a-w- c:\documents and settings\NetworkService\Application Data\Macromedia\Common\ba61a02419.exe
2009-11-08 14:35 . 2009-11-08 14:35 117760 ----a-w- c:\documents and settings\Nigel\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-08 14:30 . 2009-11-08 14:30 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-06 18:14 . 2009-11-06 18:14 -------- d-----w- c:\windows\system32\drivers\AVGIDSErHrw7x.sys
2009-11-05 19:09 . 2009-11-05 19:50 -------- d-----w- C:\$AVG
2009-11-05 19:07 . 2009-11-06 18:13 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2009-11-05 19:03 . 2009-11-05 19:03 -------- d-----w- c:\program files\AVG
2009-11-05 17:42 . 2009-12-01 18:37 18432 ----a-w- c:\documents and settings\Lucy\Application Data\Macromedia\Common\ba61a02419.exe
2009-11-05 15:18 . 2009-12-01 17:35 18432 ----a-w- c:\documents and settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-26 13:46 . 2006-05-24 13:46 -------- d-----w- c:\program files\McAfee
2009-11-11 19:31 . 2009-01-11 10:51 -------- d--h--r- c:\documents and settings\Jake\Application Data\yahoo!
2009-11-08 14:30 . 2008-04-28 15:25 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-08 14:30 . 2008-04-28 15:25 -------- d-----w- c:\documents and settings\Nigel\Application Data\SUPERAntiSpyware.com
2009-11-07 16:32 . 2008-05-02 09:06 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-07 16:27 . 2008-05-09 15:53 4045527 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-11-06 02:45 . 2007-06-11 09:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Motive
2009-11-04 18:21 . 2006-07-08 09:48 -------- d-----w- c:\program files\Textease
2009-10-30 02:53 . 2008-03-09 20:21 -------- d-----w- c:\program files\Archos MP4SP
2009-10-21 17:42 . 2009-10-21 17:42 8224 ----a-w- c:\documents and settings\Jake\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-20 19:28 . 2009-01-11 10:46 -------- d-----w- c:\documents and settings\Jake\Application Data\Motive
2009-10-15 19:49 . 2007-01-29 10:05 -------- d-----w- c:\documents and settings\Nigel\Application Data\Motive
2009-10-13 13:59 . 2007-09-16 14:07 -------- d-----w- c:\documents and settings\Nigel\Application Data\uTorrent
2009-10-08 17:21 . 2006-06-04 17:43 -------- d-----w- c:\documents and settings\Nigel\Application Data\AdobeUM
2009-09-29 13:38 . 2009-08-15 15:36 336840 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-09-20 10:34 . 2009-08-16 09:28 664 ----a-w- c:\documents and settings\Nigel\Local Settings\Application Data\d3d9caps.dat
2009-09-19 16:35 . 2009-09-19 16:35 5519752 ----a-w- c:\documents and settings\Nigel\Application Data\TVU networks\TVU AutoUpgrade\TVUPlayer2.4.7.2.exe
2009-09-19 09:39 . 2006-07-08 09:51 63464 ----a-w- c:\documents and settings\Lucy\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-16 09:22 . 2007-06-06 13:52 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-09-16 09:22 . 2007-06-06 13:52 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-09-16 09:22 . 2007-06-06 13:52 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-09-16 09:22 . 2007-06-06 13:52 214664 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-09-16 09:22 . 2007-06-06 13:52 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-09-11 14:18 . 2004-08-10 11:51 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-10 14:54 . 2008-12-29 18:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 . 2008-05-09 15:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-09-04 21:03 . 2004-08-10 11:51 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-24 15:07 . 2007-08-12 17:47 5632 --sha-w- c:\program files\Thumbs.db
2007-03-19 11:47 . 2006-06-17 16:55 88 --sh--r- c:\windows\system32\691A32CDBA.sys
2007-03-10 22:50 . 2006-09-15 15:11 56 --sh--r- c:\windows\system32\BACD321A69.sys
2006-05-03 09:06 . 2009-08-17 18:19 163328 --sh--r- c:\windows\system32\flvDX.dll
2008-05-06 12:10 . 2008-03-09 20:52 10856 --sha-w- c:\windows\system32\KGyGaAvL.sys
2007-02-21 10:47 . 2009-08-17 18:19 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 12:30 . 2009-08-17 18:19 216064 --sh--r- c:\windows\system32\nbDX.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\Dell Support\DSAgnt.exe" [2004-07-19 306688]
"Yahoo! Pager"="c:\progra~1\Yahoo!\MESSEN~1\ypager.exe" [2005-08-31 2478080]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"Creative Detector"="c:\program files\Creative\MediaSource\Detector\CTDetect.exe" [2004-12-02 102400]
"kdx"="c:\windows\kdx\KHost.exe" [2006-03-08 2236416]
"ArchosLink"="c:\program files\Archos\ArchosLink\ArchosLink.exe" [2007-08-02 1867776]
"Google Update"="c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2008-09-03 133104]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-05 39408]
"Orb"="c:\program files\Orb Networks\Orb\bin\OrbTray.exe" [2008-05-14 507904]
"WAB"="c:\documents and settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe" [2009-12-01 18432]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-10-12 2000112]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RealTray"="c:\program files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER" [X]
"NokiaMServer"="c:\program files\Common Files\Nokia\MPlatform\NokiaMServer" [X]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-04-05 94208]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-04-05 77824]
"Persistence"="c:\windows\system32\igfxpers.exe" [2005-04-05 114688]
"ISUSPM Startup"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2005-06-10 249856]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2005-06-10 81920]
"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-09-08 122940]
"REGSHAVE"="c:\program files\REGSHAVE\REGSHAVE.EXE" [2002-02-04 53248]
"YBrowser"="c:\progra~1\Yahoo!\browser\ybrwicon.exe" [2006-07-21 129536]
"YOP"="c:\progra~1\Yahoo!\YOP\yop.exe" [2006-08-31 448040]
"Adobe Photo Downloader"="c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe" [2005-06-06 57344]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-06-29 286720]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_06\bin\jusched.exe" [2008-03-25 144784]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-10-29 1218008]
"McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2009-07-07 1176808]
"btbb_wcm_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb_wcm\McciTrayApp.exe" [2008-08-28 1516032]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2007-07-31 271672]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2008-09-11 1517056]
"NokiaMusic FastStart"="c:\program files\Nokia\Nokia Music\NokiaMusic.exe" [2009-07-22 2331936]
"lxdimon.exe"="c:\program files\Lexmark 3500-4500 Series\lxdimon.exe" [2007-07-16 434864]
"lxdiamon"="c:\program files\Lexmark 3500-4500 Series\lxdiamon.exe" [2007-07-16 25264]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"BluetoothAuthenticationAgent"="bthprops.cpl" - c:\windows\system32\bthprops.cpl [2008-04-14 110592]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-5-24 24576]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2008-4-3 415072]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 15:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YPAGER.EXE"=
"c:\\Program Files\\Yahoo!\\Messenger\\yserver.exe"=
"c:\\Program Files\\Yahoo!\\browser\\ybrowser.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"c:\\WINDOWS\\kdx\\KHost.exe"=
"c:\\Program Files\\KService\\KService.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Abbyy FineReader 6.0 Sprint\\Scan\\ScanMan6.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\Wireless\\lxdiwpss.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\lxdiih.exe"=
"c:\\Program Files\\TVUPlayer\\TVUPlayer.exe"=
"c:\\Program Files\\TVAnts\\Tvants.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\Orb.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbTray.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbStreamerClient.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\xmltv.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbChannelScan.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"c:\\WINDOWS\\system32\\lxdicoms.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\lxdiamon.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\App4R.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdiwbgw.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\lxdimon.exe"=
"c:\\WINDOWS\\system32\\lxdicfg.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdipswx.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxditime.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdijswx.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [12/10/2009 21:24 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/10/2009 21:24 74480]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/10/2009 21:24 7408]
S2 0039631259243236mcinstcleanup;McAfee Application Installer Cleanup (0039631259243236);c:\windows\TEMP\003963~1.EXE c:\progra~1\COMMON~1\McAfee\INSTAL~1\cleanup.ini -cleanup -nolog -service --> c:\windows\TEMP\003963~1.EXE c:\progra~1\COMMON~1\McAfee\INSTAL~1\cleanup.ini -cleanup -nolog -service [?]
S3 iadusb;BT Voyager 205 ADSL Router;c:\windows\system32\drivers\glauiad.sys [04/06/2006 11:16 30371]
S3 nmwcdnsu;Nokia USB Flashing Phone Parent;c:\windows\system32\drivers\nmwcdnsu.sys [15/08/2009 15:13 136704]
S3 nmwcdnsuc;Nokia USB Flashing Generic;c:\windows\system32\drivers\nmwcdnsuc.sys [15/08/2009 15:13 8320]
.
Contents of the 'Scheduled Tasks' folder

2009-12-01 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 12:42]

2009-12-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1006Core.job
- c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 14:50]

2009-12-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1006UA.job
- c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 14:50]

2009-12-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1008Core.job
- c:\documents and settings\Lucy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-12 19:37]

2009-12-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1008UA.job
- c:\documents and settings\Lucy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-12 19:37]

2009-11-15 c:\windows\Tasks\McDefragTask.job
- c:\program files\mcafee\mqc\QcConsol.exe [2007-06-06 11:22]

2009-12-01 c:\windows\Tasks\McQcTask.job
- c:\program files\mcafee\mqc\QcConsol.exe [2007-06-06 11:22]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uStart Page = hxxp://www.google.co.uk/
uInternet Connection Wizard,ShellNext = hxxp://www1.euro.dell.com/content/default.aspx?c=uk&l=en&s=gen
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Nigel\Application Data\Mozilla\Firefox\Profiles\wb1p5bz8.default\
FF - component: c:\program files\McAfee\SiteAdvisor\components\McFFPlg.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: dom.disable_open_during_load - false // Popupblocker control handled by McAfee Privacy Service
.
- - - - ORPHANS REMOVED - - - -

BHO-{ac17ba60-5cfb-4d31-9105-a88d104edc53} - (no file)
HKCU-Run-rundll32.exe - (no file)
HKLM-Run-DSLAGENTEXE - c:\program files\BT Voyager 205 ADSL Router\Adsl\dslagent.exe
Notify-urqrPjIC - urqrPjIC.dll
AddRemove-Archos MPG4 Translator V3.0.12 - c:\program files\Archos MP4SP\Uninstal.exe
AddRemove-HijackThis - c:\downloads\Anti - Virus
AddRemove-RealPlayer 6.0 - c:\program files\Common Files\Real\Update\\rnuninst.exe RealNetworks|RealPlayer|6.0



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-01 20:12
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(636)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2880)
c:\windows\system32\WININET.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\windows\system32\CTsvcCDA.EXE
c:\program files\KService\KService.exe
c:\windows\system32\lxdicoms.exe
c:\program files\McAfee\SiteAdvisor\McSACore.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\progra~1\McAfee\MSC\mcmscsvc.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
c:\progra~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
c:\progra~1\McAfee\VIRUSS~1\mcshield.exe
c:\program files\McAfee\MPF\MPFSrv.exe
c:\program files\McAfee\MSK\MskSrver.exe
c:\progra~1\mcafee.com\agent\mcagent.exe
c:\windows\system32\rundll32.exe
c:\progra~1\Yahoo!\browser\ycommon.exe
c:\windows\system32\rundll32.exe
c:\program files\Real\RealPlayer\RealPlay.exe
c:\program files\Common Files\Nokia\MPlatform\NokiaMServer.exe
c:\progra~1\Yahoo!\YOP\secstat.exe
c:\windows\system32\CTPdeSrv.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2009-12-01 20:22 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-01 20:22

Pre-Run: 14,755,471,360 bytes free
Post-Run: 14,629,974,016 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 00E6DC11A839736AD4771E50EC99C0BD


I Notice when I ran Combo fix that at the restart a program tried to open in a dos (C:\ window) that referred to ...\Macromon~1\Common\BA61A0~1.exe which I hadnt seen before - was this part of the trojan?

Anyway, what next?

Thanks
Nigel

#12 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 01 December 2009 - 04:25 PM

Hi Myrti

a further post, I ran Malwarebytes afterwards and it found a couple of problems - and quarantined them as below, hope thats ok and I have not caused any problems by doing so!


Malwarebytes' Anti-Malware 1.41
Database version: 3269
Windows 5.1.2600 Service Pack 3

01/12/2009 21:22:09
mbam-log-2009-12-01 (21-22-09).txt

Scan type: Quick Scan
Objects scanned: 145140
Time elapsed: 10 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wab (Trojan.Dropper) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

#13 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 02 December 2009 - 04:49 PM

Hi,

please don't run programs on your own, it makes the cleaning more difficult for me.

The file you mentioned is part of the infection, it is usually called SilentBanker and an infection that specialises in retrieving information of your banc accounts.

There are still a couple of leftovers, we need to remove:

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
c:\documents and settings\LocalService\Application Data\Macromedia\Common\ba61a02419.exe
c:\documents and settings\NetworkService\Application Data\Macromedia\Common\ba61a02419.exe
c:\documents and settings\Lucy\Application Data\Macromedia\Common\ba61a02419.exe
c:\documents and settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#14 thevicar

thevicar
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:19 PM

Posted 02 December 2009 - 06:36 PM

Thanks again Myrti

Sorry, got a bit too keen to scan my pc.

As requested the Combofix log created is enclosed below:

ComboFix 09-12-02.05 - Nigel 02/12/2009 23:02.2.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.915 [GMT 0:00]
Running from: c:\documents and settings\Nigel\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Nigel\Desktop\CFScript.txt
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

FILE ::
"c:\documents and settings\LocalService\Application Data\Macromedia\Common\ba61a02419.exe"
"c:\documents and settings\Lucy\Application Data\Macromedia\Common\ba61a02419.exe"
"c:\documents and settings\NetworkService\Application Data\Macromedia\Common\ba61a02419.exe"
"c:\documents and settings\Nigel\Application Data\Macromedia\Common\ba61a02419.exe"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Lucy\Application Data\Macromedia\Common\ba61a02419.exe
c:\documents and settings\NetworkService\Application Data\Macromedia\Common\ba61a02419.exe
c:\documents and settings\Nigel\Local Settings\Temporary Internet Files\mcc1C.tmp

.
((((((((((((((((((((((((( Files Created from 2009-11-02 to 2009-12-02 )))))))))))))))))))))))))))))))
.

2009-12-01 20:05 . 2008-04-14 00:12 50176 ----a-w- c:\windows\system32\proquota.exe
2009-12-01 20:05 . 2008-04-14 00:12 50176 ----a-w- c:\windows\system32\dllcache\proquota.exe
2009-11-26 15:58 . 2009-11-26 15:58 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-11-26 02:05 . 2009-11-26 02:05 -------- d-----w- c:\program files\MSXML 4.0
2009-11-11 19:21 . 2009-11-11 19:21 -------- d-----w- c:\documents and settings\Jake\Application Data\Malwarebytes
2009-11-10 16:39 . 2009-11-10 16:39 -------- d-----w- c:\documents and settings\Lucy\Application Data\Malwarebytes
2009-11-08 14:35 . 2009-11-08 14:35 117760 ----a-w- c:\documents and settings\Nigel\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-08 14:30 . 2009-11-08 14:30 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-06 18:14 . 2009-11-06 18:14 -------- d-----w- c:\windows\system32\drivers\AVGIDSErHrw7x.sys
2009-11-05 19:09 . 2009-11-05 19:50 -------- d-----w- C:\$AVG
2009-11-05 19:07 . 2009-11-06 18:13 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2009-11-05 19:03 . 2009-11-05 19:03 -------- d-----w- c:\program files\AVG

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-26 13:46 . 2006-05-24 13:46 -------- d-----w- c:\program files\McAfee
2009-11-11 19:31 . 2009-01-11 10:51 -------- d--h--r- c:\documents and settings\Jake\Application Data\yahoo!
2009-11-08 14:30 . 2008-04-28 15:25 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-08 14:30 . 2008-04-28 15:25 -------- d-----w- c:\documents and settings\Nigel\Application Data\SUPERAntiSpyware.com
2009-11-07 16:32 . 2008-05-02 09:06 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-07 16:27 . 2008-05-09 15:53 4045527 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-11-06 02:45 . 2007-06-11 09:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Motive
2009-11-04 18:21 . 2006-07-08 09:48 -------- d-----w- c:\program files\Textease
2009-10-30 02:53 . 2008-03-09 20:21 -------- d-----w- c:\program files\Archos MP4SP
2009-10-21 17:42 . 2009-10-21 17:42 8224 ----a-w- c:\documents and settings\Jake\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-20 19:28 . 2009-01-11 10:46 -------- d-----w- c:\documents and settings\Jake\Application Data\Motive
2009-10-15 19:49 . 2007-01-29 10:05 -------- d-----w- c:\documents and settings\Nigel\Application Data\Motive
2009-10-13 13:59 . 2007-09-16 14:07 -------- d-----w- c:\documents and settings\Nigel\Application Data\uTorrent
2009-10-08 17:21 . 2006-06-04 17:43 -------- d-----w- c:\documents and settings\Nigel\Application Data\AdobeUM
2009-09-29 13:38 . 2009-08-15 15:36 336840 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-09-20 10:34 . 2009-08-16 09:28 664 ----a-w- c:\documents and settings\Nigel\Local Settings\Application Data\d3d9caps.dat
2009-09-19 16:35 . 2009-09-19 16:35 5519752 ----a-w- c:\documents and settings\Nigel\Application Data\TVU networks\TVU AutoUpgrade\TVUPlayer2.4.7.2.exe
2009-09-19 09:39 . 2006-07-08 09:51 63464 ----a-w- c:\documents and settings\Lucy\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-16 09:22 . 2007-06-06 13:52 40552 ----a-w- c:\windows\system32\drivers\mfesmfk.sys
2009-09-16 09:22 . 2007-06-06 13:52 35272 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2009-09-16 09:22 . 2007-06-06 13:52 79816 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2009-09-16 09:22 . 2007-06-06 13:52 214664 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-09-16 09:22 . 2007-06-06 13:52 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-09-11 14:18 . 2004-08-10 11:51 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-10 14:54 . 2008-12-29 18:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 . 2008-05-09 15:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-09-04 21:03 . 2004-08-10 11:51 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-24 15:07 . 2007-08-12 17:47 5632 --sha-w- c:\program files\Thumbs.db
2007-03-19 11:47 . 2006-06-17 16:55 88 --sh--r- c:\windows\system32\691A32CDBA.sys
2007-03-10 22:50 . 2006-09-15 15:11 56 --sh--r- c:\windows\system32\BACD321A69.sys
2006-05-03 09:06 . 2009-08-17 18:19 163328 --sh--r- c:\windows\system32\flvDX.dll
2008-05-06 12:10 . 2008-03-09 20:52 10856 --sha-w- c:\windows\system32\KGyGaAvL.sys
2007-02-21 10:47 . 2009-08-17 18:19 31232 --sh--r- c:\windows\system32\msfDX.dll
2008-03-16 12:30 . 2009-08-17 18:19 216064 --sh--r- c:\windows\system32\nbDX.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-12-01_20.12.26 )))))))))))))))))))))))))))))))))))))))))
.
+ 2006-06-04 09:58 . 2009-12-02 22:05 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2006-06-04 09:58 . 2009-12-01 18:46 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-12-01 23:32 . 2009-12-02 22:05 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2006-06-04 09:58 . 2009-12-01 18:46 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\Dell Support\DSAgnt.exe" [2004-07-19 306688]
"Yahoo! Pager"="c:\progra~1\Yahoo!\MESSEN~1\ypager.exe" [2005-08-31 2478080]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"Creative Detector"="c:\program files\Creative\MediaSource\Detector\CTDetect.exe" [2004-12-02 102400]
"kdx"="c:\windows\kdx\KHost.exe" [2006-03-08 2236416]
"ArchosLink"="c:\program files\Archos\ArchosLink\ArchosLink.exe" [2007-08-02 1867776]
"Google Update"="c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2008-09-03 133104]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-05 39408]
"Orb"="c:\program files\Orb Networks\Orb\bin\OrbTray.exe" [2008-05-14 507904]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-10-12 2000112]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RealTray"="c:\program files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER" [X]
"NokiaMServer"="c:\program files\Common Files\Nokia\MPlatform\NokiaMServer" [X]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-04-05 94208]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-04-05 77824]
"Persistence"="c:\windows\system32\igfxpers.exe" [2005-04-05 114688]
"ISUSPM Startup"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2005-06-10 249856]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2005-06-10 81920]
"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-09-08 122940]
"REGSHAVE"="c:\program files\REGSHAVE\REGSHAVE.EXE" [2002-02-04 53248]
"YBrowser"="c:\progra~1\Yahoo!\browser\ybrwicon.exe" [2006-07-21 129536]
"YOP"="c:\progra~1\Yahoo!\YOP\yop.exe" [2006-08-31 448040]
"Adobe Photo Downloader"="c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe" [2005-06-06 57344]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-06-29 286720]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_06\bin\jusched.exe" [2008-03-25 144784]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-10-29 1218008]
"McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2009-07-07 1176808]
"btbb_wcm_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb_wcm\McciTrayApp.exe" [2008-08-28 1516032]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2007-07-31 271672]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2008-09-11 1517056]
"NokiaMusic FastStart"="c:\program files\Nokia\Nokia Music\NokiaMusic.exe" [2009-07-22 2331936]
"lxdimon.exe"="c:\program files\Lexmark 3500-4500 Series\lxdimon.exe" [2007-07-16 434864]
"lxdiamon"="c:\program files\Lexmark 3500-4500 Series\lxdiamon.exe" [2007-07-16 25264]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"BluetoothAuthenticationAgent"="bthprops.cpl" - c:\windows\system32\bthprops.cpl [2008-04-14 110592]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-5-24 24576]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2008-4-3 415072]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 15:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YPAGER.EXE"=
"c:\\Program Files\\Yahoo!\\Messenger\\yserver.exe"=
"c:\\Program Files\\Yahoo!\\browser\\ybrowser.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"c:\\WINDOWS\\kdx\\KHost.exe"=
"c:\\Program Files\\KService\\KService.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Abbyy FineReader 6.0 Sprint\\Scan\\ScanMan6.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\Wireless\\lxdiwpss.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\lxdiih.exe"=
"c:\\Program Files\\TVUPlayer\\TVUPlayer.exe"=
"c:\\Program Files\\TVAnts\\Tvants.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\Orb.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbTray.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbStreamerClient.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\xmltv.exe"=
"c:\\Program Files\\Orb Networks\\Orb\\bin\\OrbChannelScan.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"c:\\WINDOWS\\system32\\lxdicoms.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\lxdiamon.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\App4R.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdiwbgw.exe"=
"c:\\Program Files\\Lexmark 3500-4500 Series\\lxdimon.exe"=
"c:\\WINDOWS\\system32\\lxdicfg.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdipswx.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxditime.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdijswx.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [12/10/2009 21:24 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/10/2009 21:24 74480]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [12/10/2009 21:24 7408]
S2 0039631259243236mcinstcleanup;McAfee Application Installer Cleanup (0039631259243236);c:\windows\TEMP\003963~1.EXE c:\progra~1\COMMON~1\McAfee\INSTAL~1\cleanup.ini -cleanup -nolog -service --> c:\windows\TEMP\003963~1.EXE c:\progra~1\COMMON~1\McAfee\INSTAL~1\cleanup.ini -cleanup -nolog -service [?]
S3 iadusb;BT Voyager 205 ADSL Router;c:\windows\system32\drivers\glauiad.sys [04/06/2006 11:16 30371]
S3 nmwcdnsu;Nokia USB Flashing Phone Parent;c:\windows\system32\drivers\nmwcdnsu.sys [15/08/2009 15:13 136704]
S3 nmwcdnsuc;Nokia USB Flashing Generic;c:\windows\system32\drivers\nmwcdnsuc.sys [15/08/2009 15:13 8320]
.
Contents of the 'Scheduled Tasks' folder

2009-12-01 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 12:42]

2009-12-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1006Core.job
- c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 14:50]

2009-12-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1006UA.job
- c:\documents and settings\Nigel\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-03 14:50]

2009-12-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1008Core.job
- c:\documents and settings\Lucy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-12 19:37]

2009-12-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4276667404-64940656-2914313638-1008UA.job
- c:\documents and settings\Lucy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-12 19:37]

2009-11-15 c:\windows\Tasks\McDefragTask.job
- c:\program files\mcafee\mqc\QcConsol.exe [2007-06-06 11:22]

2009-12-01 c:\windows\Tasks\McQcTask.job
- c:\program files\mcafee\mqc\QcConsol.exe [2007-06-06 11:22]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uStart Page = hxxp://www.google.co.uk/
uInternet Connection Wizard,ShellNext = hxxp://www1.euro.dell.com/content/default.aspx?c=uk&l=en&s=gen
uInternet Settings,ProxyOverride = 127.0.0.1
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Nigel\Application Data\Mozilla\Firefox\Profiles\wb1p5bz8.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: dom.disable_open_during_load - false // Popupblocker control handled by McAfee Privacy Service
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-02 23:23
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(632)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\igfxdev.dll

- - - - - - - > 'winlogon.exe'(3200)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\igfxdev.dll
.
Completion time: 2009-12-02 23:28
ComboFix-quarantined-files.txt 2009-12-02 23:28
ComboFix2.txt 2009-12-01 20:23

Pre-Run: 14,671,421,440 bytes free
Post-Run: 14,643,585,024 bytes free

- - End Of File - - E9FD6B9E0DF696FA733215C9EFD274EE

I will await your next post

Thanks

#15 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:04:19 PM

Posted 02 December 2009 - 07:26 PM

Hi,

I asked an Admin to check your topic, you should be getting instant notifications now.

The log from Combofix is looking pretty good. :(

To be safe I'd like to confirm this with a scan with Eset:
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users