Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Never before seen process (exe file) Insanely Slow, google chrome/adaware disabled/IE8 ads popping up. (HJT log) Please help


  • This topic is locked This topic is locked
17 replies to this topic

#1 disinter

disinter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 28 May 2010 - 06:06 PM

Below is the log of running files. ldckasri3g.exe (thats an L not an I) always finds its way back onto my running processes, but the file is not found in any search engine as a known process, but actually spyware doctor identifies it as FakeAV, I guess it just makes up a file name. Everything runs super slow and IE8 will occasionally pop up a web page or will sometimes start playing audio from an unknown source. It's also apparent to me that this malware keeps downloading trojans no matter what I remove.
I never get any system warnings however. nor do I get any fake adware/anti virus programs trying to run.
Programs will sometimes not start up, just take me to cmd screen and then immediately close

-Google Chrome will not work, or will open but not connect to internet (will give a page error with a folder with an unhappy face on it), only Firefox and IE8 (Chrome had always worked before)
-AdAware cannot "connect to the service"
-Spyware Doctor finds a smattering of trojans on each full sweep and removing everything is only a very temporary fix. (
-Tibs.CNA (located as win32.exe)
- Zhelatin (as smss.exe)
-Suurch
- Downloader/Generic (as login.exe)
-Windows Defender is blissfully ignorant.
-Malware-bytes Anntimalware full scan and cleanse also only temporarily fixed the problem.
-Anything in my quicklaunch bar opens up a cmd box which then closes and doesn't execute the file.


Example Site that is popped up at random on ie8 (http://server2.mediajmp.com/surveys/cpv-index.html?sub=gamecopyworld.com)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\Program Files\NETGEAR\WG311v3\WinDomainlogon.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\CTsvcCDA.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\Program Files\Google\Update\1.2.183.23\GoogleCrashHandler.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\NETGEAR\WG311v3\WinDomainlogon.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Creative\Sound Blaster X-Fi\Volume Panel\VolPanlu.exe
C:\WINDOWS\system32\Rundll32.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Oracle\Information Rights Management\Desktop\sealmon.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\ldckasri3g.exe
C:\Documents and Settings\dan\Local Settings\Application Data\Google\Update\1.2.183.23\GoogleCrashHandler.exe
C:\Documents and Settings\dan\Local Settings\Apps\2.0\22E58HLJ.M0E\ZD3TBNA1.DJN\curs..tion_eee711038731a406_0004.0000_152ef8e82e8f5a48\CurseClient.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\taskmgr.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\win32.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\drweb.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\svchost.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\system.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\DOCUME~1\dan\LOCALS~1\Temp\debug.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\services.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\hexdump.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\winamp.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\install.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\smss.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\setup.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\user.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\mdm.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\notepad.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\login.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\lsass.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\win16.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\nvsvc32.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\spoolsv.exe
C:\DOCUME~1\dan\LOCALS~1\Temp\4062766422.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/.../search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/?fr=fp-tyc8
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/?fr=fp-tyc8
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/?fr=fp-tyc8
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapps.yahoo.com/customize/...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: Vuze Remote Toolbar - {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files\Vuze_Remote\tbVuze.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: C:\WINDOWS\system32\ugbnyb0iq.dll - {C7BA40A1-74F2-52BD-F411-04B15A2C8953} - C:\WINDOWS\system32\ugbnyb0iq.dll
O3 - Toolbar: Vuze Remote Toolbar - {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files\Vuze_Remote\tbVuze.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [VolPanel] "C:\Program Files\Creative\Sound Blaster X-Fi\Volume Panel\VolPanlu.exe" /r
O4 - HKLM\..\Run: [P17Helper] Rundll32 SPIRun.dll,RunDLLEntry
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [sealmon.exe] C:\Program Files\Oracle\Information Rights Management\Desktop\sealmon.exe
O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\dan\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [mcexecwin] rundll32.exe C:\DOCUME~1\dan\LOCALS~1\Temp\z0vkj9q.dll, RestoreWindows
O4 - HKCU\..\Run: [hsfe8owijfisjhgs7ye39gjsoighsd7y3eu] C:\DOCUME~1\dan\LOCALS~1\Temp\ldckasri3g.exe
O4 - HKCU\..\Run: [hsfg9w8gujsokgahi8gysgnsdgefshyjy] C:\DOCUME~1\dan\LOCALS~1\Temp\winamp.exe
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O4 - Startup: CurseClientStartup.ccip
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1224886342703
O16 - DPF: {F6ACF75C-C32C-447B-9BEF-46B766368D29} (Creative Software AutoUpdate Support Package) - http://www.creative.com/softwareupdate/su2...15102/CTPID.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{8CD8C084-22D8-4C74-9CCB-A0C4E52B8E27}: NameServer = 71.252.0.12,71.242.0.12
O17 - HKLM\System\CS1\Services\Tcpip\..\{8CD8C084-22D8-4C74-9CCB-A0C4E52B8E27}: NameServer = 71.252.0.12,71.242.0.12
O22 - SharedTaskScheduler: har98fefiesjfs93s8i9sejsdf - {C7BA40A1-74F2-52BD-F411-04B15A2C8953} - C:\WINDOWS\system32\ugbnyb0iq.dll
O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Browser Defender Update Service - Threat Expert Ltd. - C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--
End of file - 11147 bytes

EDIT: Moved from XP to Malware Removal Logs forum ~ Hamluis.

Edited by hamluis, 28 May 2010 - 06:24 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 29 May 2010 - 02:46 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.
    1.Please do not run any other tool untill instructed to do so!
    2.Please reply to this thread, do not start another!
    3.Please tell me about any problems that have occurred during the fix.
    4.Please tell me of any other symptoms you may be having as these can help also.
    5.Please try as much as possible not to run anything while executing a fix.

If you follow these instructions, everything should go smoothly.

"GMER Rootkit Scanner"

Download GMER Rootkit Scanner from here or here.
  • Extract the contents of the zipped file to desktop.
  • Double click GMER.exe. If asked to allow gmer.sys driver to load, please consent .
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO, then use the following settings for a more complete scan..
  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
Save it where you can easily find it, such as your desktop

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

"information and logs"
    In your next post I need the following
      1.log from GMER
      2. Let Me Know Of Any Problem You May Have Had

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 29 May 2010 - 10:22 PM

Thank you for your fast response.


I am running GMER right now, but it is taking a very long time. It's been in the Resource area of the Results folder of Windows Defender for 3 hours now. I'm going to bed and then to work for 10 hours, I'll see what happens when I get back.

Thanks

Dan

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 29 May 2010 - 10:35 PM

If you do have problems I would like you to run this scan - only if you have problems with GMer

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth, Files, Code Hooks. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.


gringo

Edited by gringo_pr, 29 May 2010 - 10:35 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 30 May 2010 - 04:26 PM

I can't get GMER to ever finish, at some point my computer just restarts. It did, however, spend 10 hours scanning that one aforementioned folder. Should I just delete that folder/entire Defender directory and rescan?

Thanks again,

Dan

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 30 May 2010 - 04:52 PM

Did you try to scan with RKUnHooker


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 30 May 2010 - 11:28 PM

It's also taking a long time to scan, but I cut it short. I'll run it overnight, but this is what I got for now.

It begins by finding a parasite within itself, which it corrects.

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
>Drivers
==============================================
0xB550F000 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys 10235904 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Miniport Driver, Version 197.13 )
0xBD012000 C:\WINDOWS\System32\nv4_disp.dll 6434816 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Display driver, Version 197.13 )
0xB6323000 C:\WINDOWS\system32\drivers\ALCXWDM.SYS 2322432 bytes (Realtek Semiconductor Corp., Realtek AC'97 Audio Driver (WDM))
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2150400 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2150400 bytes
0x804D7000 RAW 2150400 bytes
0x804D7000 WMIxWDM 2150400 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xB5F8A000 C:\WINDOWS\system32\drivers\p17xfilt.sys 1667072 bytes (Creative, Creative WDM 3D Audio Driver)
0xB617A000 C:\WINDOWS\system32\drivers\P17xfi.sys 1449984 bytes (Creative Technology Ltd., WDM Audio Miniport)
0xAEE09000 C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100105.019\navex15.sys 1318912 bytes (Symantec Corporation, AV Engine)
0xB7E11000 hfnwin.sys 1273856 bytes
0xB7CD5000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xA79E8000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xA7A83000 C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCDrv.sys 413696 bytes (Symantec Corporation, SPBBC Driver)
0xB7C48000 timntr.sys 393216 bytes (Acronis, Acronis True Image Backup Archive Explorer)
0xA798A000 C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys 385024 bytes (Symantec Corporation, Symantec Eraser Control Driver)
0xB542C000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xA7B91000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xAEF81000 C:\Program Files\Symantec AntiVirus\savrt.sys 360448 bytes (Symantec Corporation, AutoProtect)
0xA74FD000 C:\WINDOWS\system32\DRIVERS\srv.sys 335872 bytes (Microsoft Corporation, Server driver)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xB5F45000 C:\WINDOWS\system32\DRIVERS\WG311v3XP.sys 282624 bytes (Marvell Semiconductor, Inc, NDIS 5.1 driver)
0xA6E16000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xB5F05000 C:\WINDOWS\system32\DRIVERS\NVNRM.SYS 262144 bytes (NVIDIA Corporation, NVIDIA Network Resource Manager.)
0xB7D79000 PCTCore.sys 233472 bytes (PC Tools, PC Tools KDS Core Driver)
0xA7B58000 C:\WINDOWS\System32\Drivers\SYMTDI.SYS 233472 bytes (Symantec Corporation, Network Dispatch Driver)
0xB5ED2000 C:\WINDOWS\system32\DRIVERS\NVSNPU.SYS 208896 bytes (NVIDIA Corporation, NVIDIA Networking Soft-NPU Driver.)
0xB6148000 C:\WINDOWS\system32\DRIVERS\ctoss2k.sys 204800 bytes (Creative Technology Ltd., Creative OS Services Driver (WDM))
0xB7F79000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xA75EF000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB7CA8000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xA18A6000 C:\WINDOWS\system32\drivers\kmixer.sys 176128 bytes (Microsoft Corporation, Kernel Mode Audio Mixer)
0xA7A58000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xA7062000 C:\WINDOWS\system32\drivers\ctusfsyn.sys 163840 bytes (Creative Technology Ltd., Creative SoundFont Synthesizer (32-bit))
0xA7B0A000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xB6121000 C:\WINDOWS\system32\DRIVERS\ctsfm2k.sys 159744 bytes (Creative Technology Ltd, SoundFont® Manager (WDM))
0xA7B32000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xA554A000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xB62FF000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB655A000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB62DC000 C:\WINDOWS\system32\drivers\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xA7AE8000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xAEF5F000 C:\WINDOWS\system32\Drivers\SYMEVENT.SYS 139264 bytes (Symantec Corporation, Symantec Event Library)
0x806E4000 ACPI_HAL 134400 bytes
0x806E4000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xB7F59000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xB7DF2000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xA796D000 C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys 118784 bytes (Symantec Corporation, Symantec Eraser Utility Driver)
0xB54A2000 C:\WINDOWS\system32\DRIVERS\mcdbus.sys 118784 bytes (MagicISO, Inc., MagicISO SCSI Host Controller)
0xB7C2C000 snapman.sys 114688 bytes (Acronis, Acronis Snapshot API)
0xB7C12000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB7DDA000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xB548A000 C:\WINDOWS\system32\DRIVERS\SCSIPORT.SYS 98304 bytes (Microsoft Corporation, SCSI Port Driver)
0xB7D62000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB54D0000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xB7DC4000 nvatabus.sys 90112 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ IDE Performance Driver)
0xA70D8000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xAEDF5000 C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20100105.019\naveng.sys 81920 bytes (Symantec Corporation, AV Engine)
0xB54E7000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xAEF4B000 C:\Program Files\Symantec AntiVirus\Savrtpel.sys 81920 bytes (Symantec Corporation, SAVRTPEL)
0xB54FB000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xA7BEA000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBD000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xB7DB2000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xB7F48000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xB54BF000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xAB731000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xB81C8000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xB8248000 C:\WINDOWS\system32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xB81B8000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xB81D8000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xA7495000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xB2574000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xB81A8000 C:\WINDOWS\system32\DRIVERS\AmdPPM.sys 53248 bytes (Advanced Micro Devices, AMD Processor Driver)
0xB80E8000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xB8258000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xB8268000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xB80C8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xB8288000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xAB751000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xB6A05000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xB80B8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xB8278000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xB80A8000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xB2584000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xB82A8000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xB80D8000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xB2426000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xB8298000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xAB781000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xA5DEA000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xB24A6000 C:\WINDOWS\system32\DRIVERS\NVENETFD.sys 36864 bytes (NVIDIA Corporation, NVIDIA Networking Function Driver.)
0xABC12000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xB3939000 C:\WINDOWS\system32\DRIVERS\tifsfilt.sys 32768 bytes (Acronis, Acronis True Image File System Filter)
0xB8418000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xB8438000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xB2A64000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xB8328000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xB8430000 C:\WINDOWS\System32\Drivers\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0xB8440000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xB8460000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xABC22000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xB2A6C000 C:\WINDOWS\system32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xABC1A000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xB8338000 nvcchflt.sys 20480 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ Cache Filter Driver)
0xB8330000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xB8450000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xB8458000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xB8448000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xB8410000 C:\WINDOWS\system32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0xB8468000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xB7BD2000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xAA6E0000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xB85A4000 C:\WINDOWS\system32\DRIVERS\nvnetbus.sys 16384 bytes (NVIDIA Corporation, NVIDIA Networking Bus Driver.)
0xB7BEE000 C:\WINDOWS\system32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xB84B8000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xB1C0A000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xB2600000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xB25FC000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB7BEA000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xB2AD7000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xB2AD3000 C:\WINDOWS\System32\drivers\ws2ifsl.sys 12288 bytes (Microsoft Corporation, Winsock2 IFS Layer)
0xB860A000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xB85FA000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xB85A8000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xB8610000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xB85B4000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0xB8614000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xB8664000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xB85C4000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xB85AA000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xB871B000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xB8787000 C:\WINDOWS\System32\Drivers\BANTExt.sys 4096 bytes
0xB86CA000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xB86BE000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xB8670000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x8A1DD060 unknown_irp_handler 4000 bytes
!!!!!!!!!!!Hidden driver: 0x89EEEAEA ?_empty_? 1302 bytes
!!!!!!!!!!!Hidden driver: 0x89F6BB30 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xB7DC4000 WARNING: suspicious driver modification [nvatabus.sys::0x89EEEAEA]
WARNING: File locked for read access [C:\WINDOWS\system32\drivers\hfnwin.sys]
==============================================
>Files
==============================================
==============================================
>Hooks
==============================================
Key object-->ParseProcedure, Type: Kernel Object [unknown_code_page]
ntkrnlpa.exe+0x0006EC7E, Type: Inline - RelativeJump 0x80545C7E-->80545C85 [ntkrnlpa.exe]
[180]explorer.exe-->advapi32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x77DD1218-->00000000 [shimeng.dll]
[180]explorer.exe-->gdi32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x77F110B4-->00000000 [shimeng.dll]
[180]explorer.exe-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x01001268-->00000000 [shimeng.dll]
[180]explorer.exe-->mswsock.dll+0x00004057, Type: Inline - RelativeJump 0x71A54057-->00000000 [unknown_code_page]
[180]explorer.exe-->mswsock.dll+0x0000433A, Type: Inline - RelativeJump 0x71A5433A-->00000000 [unknown_code_page]
[180]explorer.exe-->mswsock.dll+0x00005847, Type: Inline - RelativeJump 0x71A55847-->00000000 [unknown_code_page]
[180]explorer.exe-->ntdll.dll-->KiUserExceptionDispatcher, Type: Inline - RelativeJump 0x7C90E47C-->00000000 [unknown_code_page]
[180]explorer.exe-->ntdll.dll-->NtProtectVirtualMemory, Type: Inline - RelativeJump 0x7C90D6EE-->00000000 [unknown_code_page]
[180]explorer.exe-->ntdll.dll-->NtWriteVirtualMemory, Type: Inline - RelativeJump 0x7C90DFAE-->00000000 [unknown_code_page]
[180]explorer.exe-->shell32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x7C9C15A4-->00000000 [shimeng.dll]
[180]explorer.exe-->user32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x7E41133C-->00000000 [shimeng.dll]
[3728]sealmon.exe-->gdi32.dll-->BitBlt, Type: Inline - RelativeJump 0x77F16F79-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->CopyEnhMetaFileW, Type: Inline - RelativeJump 0x77F270CC-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->CopyMetaFileA, Type: Inline - RelativeJump 0x77F2C52B-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->CopyMetaFileW, Type: Inline - RelativeJump 0x77F2C3ED-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->CreateDCA, Type: Inline - RelativeJump 0x77F1B7D2-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->CreateDCW, Type: Inline - RelativeJump 0x77F1BE38-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->DeleteDC, Type: Inline - RelativeJump 0x77F16E5F-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->GetEnhMetaFileA, Type: Inline - RelativeJump 0x77F4AE35-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->GetEnhMetaFileW, Type: Inline - RelativeJump 0x77F397A3-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->GetMetaFileA, Type: Inline - RelativeJump 0x77F44216-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->GetMetaFileW, Type: Inline - RelativeJump 0x77F3853D-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->GetPixel, Type: Inline - RelativeJump 0x77F1B74C-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->StartDocA, Type: Inline - RelativeJump 0x77F45E79-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->StartDocW, Type: Inline - RelativeJump 0x77F45962-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->gdi32.dll-->StretchBlt, Type: Inline - RelativeJump 0x77F1B6D0-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->CopyFileA, Type: Inline - RelativeJump 0x7C8286EE-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->CopyFileW, Type: Inline - RelativeJump 0x7C82F87B-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->CreateFileA, Type: Inline - RelativeJump 0x7C801A28-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->CreateFileMappingW, Type: Inline - RelativeJump 0x7C80943C-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->CreateFileW, Type: Inline - RelativeJump 0x7C810800-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->DeleteFileA, Type: Inline - RelativeJump 0x7C831EDD-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->DeleteFileW, Type: Inline - RelativeJump 0x7C831F63-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->DuplicateHandle, Type: Inline - RelativeJump 0x7C80DE9E-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindClose, Type: Inline - RelativeJump 0x7C80EE77-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindFirstFileA, Type: Inline - RelativeJump 0x7C813879-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindFirstFileExW, Type: Inline - RelativeJump 0x7C80EB1D-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindFirstFileW, Type: Inline - RelativeJump 0x7C80EF81-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindNextFileA, Type: Inline - RelativeJump 0x7C834EE1-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FindNextFileW, Type: Inline - RelativeJump 0x7C80EFDA-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->FlushFileBuffers, Type: Inline - RelativeJump 0x7C8126E1-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileAttributesA, Type: Inline - RelativeJump 0x7C8115DC-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileAttributesExW, Type: Inline - RelativeJump 0x7C811195-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileAttributesW, Type: Inline - RelativeJump 0x7C80B7EC-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileSize, Type: Inline - RelativeJump 0x7C810B17-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileSizeEx, Type: Inline - RelativeJump 0x7C810AA9-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileTime, Type: Inline - RelativeJump 0x7C831C4D-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetFileType, Type: Inline - RelativeJump 0x7C810EF1-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->GetShortPathNameA, Type: Inline - RelativeJump 0x7C835BE0-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->LockFile, Type: Inline - RelativeJump 0x7C832391-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->MoveFileA, Type: Inline - RelativeJump 0x7C835EBF-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->MoveFileExW, Type: Inline - RelativeJump 0x7C83568B-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->MoveFileW, Type: Inline - RelativeJump 0x7C821261-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->OpenFileMappingW, Type: Inline - RelativeJump 0x7C80BB7A-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->ReadFile, Type: Inline - RelativeJump 0x7C801812-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->ReplaceFile, Type: Inline - RelativeJump 0x7C836C6C-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->SetEndOfFile, Type: Inline - RelativeJump 0x7C832076-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->SetFilePointer, Type: Inline - RelativeJump 0x7C810C2E-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->SetFilePointerEx, Type: Inline - RelativeJump 0x7C821057-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->SetFileTime, Type: Inline - RelativeJump 0x7C831CC0-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->UnlockFile, Type: Inline - RelativeJump 0x7C8322EC-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->WriteFile, Type: Inline - RelativeJump 0x7C810E27-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->_hread, Type: Inline - RelativeJump 0x7C8353FE-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->_hwrite, Type: Inline - RelativeJump 0x7C838B17-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->kernel32.dll-->_llseek, Type: Inline - RelativeJump 0x7C835436-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->ntdll.dll-->NtClose, Type: Inline - RelativeJump 0x7C90CFEE-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->ntdll.dll-->NtMapViewOfSection, Type: Inline - RelativeJump 0x7C90D51E-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->ntdll.dll-->NtQueryDirectoryFile, Type: Inline - RelativeJump 0x7C90D76E-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->user32.dll-->GetDC, Type: Inline - RelativeJump 0x7E4186C7-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->user32.dll-->GetDCEx, Type: Inline - RelativeJump 0x7E42C595-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->user32.dll-->GetWindowDC, Type: Inline - RelativeJump 0x7E419021-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->user32.dll-->PrintWindow, Type: Inline - RelativeJump 0x7E423810-->00000000 [SEALNT.dll]
[3728]sealmon.exe-->user32.dll-->ReleaseDC, Type: Inline - RelativeJump 0x7E41869D-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->BitBlt, Type: Inline - RelativeJump 0x77F16F79-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->CopyEnhMetaFileW, Type: Inline - RelativeJump 0x77F270CC-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->CopyMetaFileA, Type: Inline - RelativeJump 0x77F2C52B-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->CopyMetaFileW, Type: Inline - RelativeJump 0x77F2C3ED-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->CreateDCA, Type: Inline - RelativeJump 0x77F1B7D2-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->CreateDCW, Type: Inline - RelativeJump 0x77F1BE38-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->DeleteDC, Type: Inline - RelativeJump 0x77F16E5F-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->GetEnhMetaFileA, Type: Inline - RelativeJump 0x77F4AE35-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->GetEnhMetaFileW, Type: Inline - RelativeJump 0x77F397A3-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->GetMetaFileA, Type: Inline - RelativeJump 0x77F44216-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->GetMetaFileW, Type: Inline - RelativeJump 0x77F3853D-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->GetPixel, Type: Inline - RelativeJump 0x77F1B74C-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->StartDocA, Type: Inline - RelativeJump 0x77F45E79-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->StartDocW, Type: Inline - RelativeJump 0x77F45962-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->gdi32.dll-->StretchBlt, Type: Inline - RelativeJump 0x77F1B6D0-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->CopyFileA, Type: Inline - RelativeJump 0x7C8286EE-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->CopyFileW, Type: Inline - RelativeJump 0x7C82F87B-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->CreateFileA, Type: Inline - RelativeJump 0x7C801A28-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->CreateFileMappingW, Type: Inline - RelativeJump 0x7C80943C-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->CreateFileW, Type: Inline - RelativeJump 0x7C810800-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->DeleteFileA, Type: Inline - RelativeJump 0x7C831EDD-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->DeleteFileW, Type: Inline - RelativeJump 0x7C831F63-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->DuplicateHandle, Type: Inline - RelativeJump 0x7C80DE9E-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindClose, Type: Inline - RelativeJump 0x7C80EE77-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindFirstFileA, Type: Inline - RelativeJump 0x7C813879-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindFirstFileExW, Type: Inline - RelativeJump 0x7C80EB1D-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindFirstFileW, Type: Inline - RelativeJump 0x7C80EF81-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindNextFileA, Type: Inline - RelativeJump 0x7C834EE1-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FindNextFileW, Type: Inline - RelativeJump 0x7C80EFDA-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->FlushFileBuffers, Type: Inline - RelativeJump 0x7C8126E1-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileAttributesA, Type: Inline - RelativeJump 0x7C8115DC-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileAttributesExW, Type: Inline - RelativeJump 0x7C811195-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileAttributesW, Type: Inline - RelativeJump 0x7C80B7EC-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileSize, Type: Inline - RelativeJump 0x7C810B17-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileSizeEx, Type: Inline - RelativeJump 0x7C810AA9-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileTime, Type: Inline - RelativeJump 0x7C831C4D-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetFileType, Type: Inline - RelativeJump 0x7C810EF1-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->GetShortPathNameA, Type: Inline - RelativeJump 0x7C835BE0-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->LockFile, Type: Inline - RelativeJump 0x7C832391-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->MoveFileA, Type: Inline - RelativeJump 0x7C835EBF-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->MoveFileExW, Type: Inline - RelativeJump 0x7C83568B-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->MoveFileW, Type: Inline - RelativeJump 0x7C821261-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->OpenFileMappingW, Type: Inline - RelativeJump 0x7C80BB7A-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->ReadFile, Type: Inline - RelativeJump 0x7C801812-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->ReplaceFile, Type: Inline - RelativeJump 0x7C836C6C-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->SetEndOfFile, Type: Inline - RelativeJump 0x7C832076-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->SetFilePointer, Type: Inline - RelativeJump 0x7C810C2E-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->SetFilePointerEx, Type: Inline - RelativeJump 0x7C821057-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->SetFileTime, Type: Inline - RelativeJump 0x7C831CC0-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->UnlockFile, Type: Inline - RelativeJump 0x7C8322EC-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->WriteFile, Type: Inline - RelativeJump 0x7C810E27-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->_hread, Type: Inline - RelativeJump 0x7C8353FE-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->_hwrite, Type: Inline - RelativeJump 0x7C838B17-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->kernel32.dll-->_llseek, Type: Inline - RelativeJump 0x7C835436-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->ntdll.dll-->NtClose, Type: Inline - RelativeJump 0x7C90CFEE-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->ntdll.dll-->NtMapViewOfSection, Type: Inline - RelativeJump 0x7C90D51E-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->ntdll.dll-->NtQueryDirectoryFile, Type: Inline - RelativeJump 0x7C90D76E-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->user32.dll-->GetDC, Type: Inline - RelativeJump 0x7E4186C7-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->user32.dll-->GetDCEx, Type: Inline - RelativeJump 0x7E42C595-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->user32.dll-->GetWindowDC, Type: Inline - RelativeJump 0x7E419021-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->user32.dll-->PrintWindow, Type: Inline - RelativeJump 0x7E423810-->00000000 [SEALNT.dll]
[576]spoolsv.exe-->user32.dll-->ReleaseDC, Type: Inline - RelativeJump 0x7E41869D-->00000000 [SEALNT.dll]
[788]svchost.exe-->mswsock.dll+0x00004057, Type: Inline - RelativeJump 0x71A54057-->00000000 [unknown_code_page]
[788]svchost.exe-->mswsock.dll+0x0000433A, Type: Inline - RelativeJump 0x71A5433A-->00000000 [unknown_code_page]
[788]svchost.exe-->mswsock.dll+0x00005847, Type: Inline - RelativeJump 0x71A55847-->00000000 [unknown_code_page]
[788]svchost.exe-->ntdll.dll-->KiUserExceptionDispatcher, Type: Inline - RelativeJump 0x7C90E47C-->00000000 [unknown_code_page]
[788]svchost.exe-->ntdll.dll-->NtProtectVirtualMemory, Type: Inline - RelativeJump 0x7C90D6EE-->00000000 [unknown_code_page]
[788]svchost.exe-->ntdll.dll-->NtWriteVirtualMemory, Type: Inline - RelativeJump 0x7C90DFAE-->00000000 [unknown_code_page]
[788]svchost.exe-->user32.dll-->GetCursorPos, Type: Inline - RelativeJump 0x7E42974E-->00000000 [unknown_code_page]


!!POSSIBLE ROOTKIT ACTIVITY DETECTED!! =)

ty,
Dan

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 30 May 2010 - 11:42 PM

Hello disinter

That is good - I see what I need to see

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:
    Please visit this webpage for download links, and instructions for running the tool:

    http://www.bleepingcomputer.com/combofix/how-to-use-combofix

    Please ensure you read this guide carefully and install the Recovery Console first.

    The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode.
    This allows us to more easily help you should your computer have a problem after an attempted removal of malware.
    It is a simple procedure that will only take a few moments of your time.


    Once installed, you should see a blue screen prompt that says:
      The Recovery Console was successfully installed.
    Please continue as follows:
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Click Yes to allow ComboFix to continue scanning for malware.

    When the tool is finished, it will produce a report for you.

    Please include the report in your next post:

    C:\ComboFix.txt

"information and logs"
    In your next post I need the following
    1. Log from Combofix
    2. let me know of any problems you may have had
    3. How is the computer doing now?

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 31 May 2010 - 11:12 AM

Gringo


The ComboFix has been scanning for infected files for 2 hours. It warns that on heavily infected machines it may take 20 minutes. What could be causing this? I'm about to go to work, so I'll let it run a good 6 or 7 hours and see what happens.

Dan

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 31 May 2010 - 09:56 PM

Hello


how did it go?


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 01 June 2010 - 04:47 PM

I cannot get combo fix to scan my files. It starts up just fine, but 13 hours later has not actually scanned anything. I've used it in the past just fine too.

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 01 June 2010 - 05:42 PM

Greetings

I would like you to download an updated virsion of combofix.
    Delete the version of combofix you have now on your desktop and download a new one from here

    **Note: It is important that it is saved directly to your desktop**

    1. Close any open browsers.
    2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.


    Boot into Safe Mode

    Reboot your computer in Safe Mode.
    • If the computer is running, shut down Windows, and then turn off the power.
    • Wait 30 seconds, and then turn the computer on.
    • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
    • Ensure that the Safe Mode option is selected.
    • Press Enter. The computer then begins to start in Safe mode.
    • Login on your usual account.

    Double click on combofix.exe & follow the prompts.
    When finished, it will produce a report for you.

    Note:Do not mouseclick combofix's window while it's running. That may cause it to stall


If it does not look like it is doing anything after 30min shut it down and let me know


Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 04 June 2010 - 03:35 AM

Hello

three day bump

It has been Three days since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 disinter

disinter
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Washington DC
  • Local time:05:34 AM

Posted 04 June 2010 - 04:24 AM

sorry sorry, I've been moving the last few days and didn't have internet.

During the move something happened to my fans, and now my computer overheats whenever I run anything. Even with a floor fan blasting it. I'm trying to figure out where the problem is but it's not easy. I'll be working on it all day after work. talk about one thing after another.

dan

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:34 AM

Posted 04 June 2010 - 04:28 AM

ok thanks for letting me know thumbup2.gif - I will leave open for longer let me know if you get it fixed

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users