Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help me Please I Think my pc might be infected


  • This topic is locked This topic is locked
22 replies to this topic

#1 RealNoob

RealNoob

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 16 August 2010 - 07:59 AM

wacko.gif My Computer seems to be infected I think. Its sluggish slow sometimes doesn't respond. Someone with Trend Micro log experience please help me.

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 7:28:03 AM, on 8/16/2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
F:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Documents and Settings\Nick\Desktop\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: (no name) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - (no file)
O3 - Toolbar: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 2902 bytes


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 22 August 2010 - 01:07 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.
  1. Do not run any other tool untill instructed to do so!
  2. Please Do not Attach logs or put in code boxes.
  3. Tell me about any problems that have occurred during the fix.
  4. Tell me of any other symptoms you may be having as these can help also.
  5. Do not run anything while running a fix.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:
    Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
    • The application window will appear
    • Click the Disable button to disable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger may ask you to reboot the machine, if it does - click OK
    Do not re-enable these drivers until otherwise instructed.

Download DDS:
    Please download DDS by sUBs from one of the links below and save it to your desktop:


    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.
    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
      • DDS.txt
      • Attach.txt
    • A window will open instructing you save & post the logs
    • Save the logs to a convenient place such as your desktop
    • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


MBRCheck

Please also download MBRCheck to your desktop
  • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
  • It will show a Black screen with some data on it
  • a report called MBRcheck will be on your desktop
  • open this report
  • Right click on the screen and select > Select All
  • Press Control+C
  • now please copy that report to this thread


information and logs:
    In your next post I need the following
      1.logs from DDS
      2.log from RKUnHooker
      3. report from MBRchecker
      4.let me know of any problems you may have had

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 22 August 2010 - 05:15 PM

DDS (Ver_10-03-17.01) - NTFSx86
Run by Nick at 17:03:18.96 on Sun 08/22/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1633 [GMT -7:00]


============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\ctfmon.exe
svchost.exe
F:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Nick\Desktop\dds.scr

============== Pseudo HJT Report ===============

uURLSearchHooks: H - No File
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/C/B/F/CBF23A2C-3E55-4664-BC5C-762780D79BA0/OGAControl.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {1E3F1348-4370-4BBE-A67A-CC7ED824CA85} - hxxp://download.microsoft.com/download/7/4/9/749b0dc5-2175-4d5b-a6dd-9c4bc923683e/Selfhelpcontrol.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R1 hwinterface;hwinterface;c:\windows\system32\drivers\hwinterface.sys [2010-5-12 3026]
R3 LycoFltr;Lycosa Keyboard;c:\windows\system32\drivers\Lycosa.sys [2009-10-6 16128]
S4 a347bus;a347bus;c:\windows\system32\drivers\a347bus.sys [2010-5-12 160640]
S4 a347scsi;a347scsi;c:\windows\system32\drivers\a347scsi.sys [2010-5-12 5248]

=============== Created Last 30 ================

2010-08-22 23:58:10 54 -c--a-w- c:\documents and settings\nick\defogger_reenable
2010-08-22 23:57:30 50477 -c--a-w- c:\program files\Defogger.exe
2010-08-11 15:42:47 0 dc----w- c:\windows\system32\wbem\Repository
2010-08-10 02:44:42 124 -c--a-w- c:\windows\n02.ini
2010-08-05 04:06:02 1362 -c--a-w- c:\windows\kaillera.ini
2010-08-04 20:51:45 444952 -c--a-w- c:\windows\system32\wrap_oal.dll
2010-08-04 20:51:45 109080 -c--a-w- c:\windows\system32\OpenAL32.dll
2010-08-04 18:10:08 0 dc----w- c:\program files\Neo Geo CD
2010-08-04 15:37:47 743424 -c----w- c:\windows\system32\dllcache\iedvtool.dll

==================== Find3M ====================

2010-08-22 23:58:20 756 -c--a-w- c:\program files\defogger_disable.log
2010-08-04 22:35:23 163644 -c--a-w- c:\windows\system32\drivers\secdrv.sys
2010-07-24 21:40:48 1183 -c--a-w- C:\debug.fz10.reg

============= FINISH: 17:03:24.71 ===============







UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT

DDS (Ver_10-03-17.01)

Microsoft Windows XP Home Edition
Boot Device: \Device\HarddiskVolume2
Install Date: 10/5/2009 8:09:19 PM
System Uptime: 8/22/2010 4:59:04 PM (1 hours ago)

Motherboard: Dell Inc. | | 0CU409
Processor: Genuine Intel® CPU 2140 @ 1.60GHz | Socket 775 | 1595/200mhz
Processor: Genuine Intel® CPU 2140 @ 1.60GHz | Socket 775 | 1596/200mhz

==== Disk Partitions =========================

A: is Removable
C: is FIXED (NTFS) - 149 GiB total, 5.302 GiB free.
D: is CDROM ()
E: is CDROM ()
F: is FIXED (NTFS) - 149 GiB total, 0.082 GiB free.

==== Disabled Device Manager Items =============

Class GUID: {4D36E97D-E325-11CE-BFC1-08002BE10318}
Description: Plug and Play BIOS Extension
Device ID: ROOT\SYSTEM\0003
Manufacturer: (Standard system devices)
Name: Plug and Play BIOS Extension
PNP Device ID: ROOT\SYSTEM\0003
Service: a347bus

==== System Restore Points ===================

RP32: 8/15/2010 5:19:59 PM - System Checkpoint
RP33: 8/17/2010 6:47:00 PM - System Checkpoint

==== Installed Programs ======================

7-Zip 4.65
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Alcohol 120%
BitTorrent
CCleaner
Cheat Engine 5.6
Conexant D850 56K V.9x DFVc Modem
Dell Resource CD
DFX for Windows Media Player
DivX Setup
High Definition Audio Driver Package - KB888111
Hotfix for Windows Media Format 11 SDK (KB929399)
Hotfix for Windows Media Player 11 (KB939683)
Hotfix for Windows XP (KB926239)
Hotfix for Windows XP (KB935448)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB970653-v3)
Hotfix for Windows XP (KB979306)
Hotfix for Windows XP (KB981793)
Intel® PRO Network Connections 12.1.12.0
Java Auto Updater
Java™ 6 Update 20
Jaws Unleashed
Malwarebytes' Anti-Malware
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Mozilla Firefox (3.6.8)
NVIDIA Drivers
Razer Lycosa
Realtek High Definition Audio Driver
Security Update for Windows Internet Explorer 8 (KB971961)
Security Update for Windows Internet Explorer 8 (KB981332)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB968816)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB978695)
Security Update for Windows Media Player (KB979402)
Security Update for Windows Media Player 11 (KB954154)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB912812)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923789)
Security Update for Windows XP (KB938464-v2)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB944338-v2)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB954600)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958470)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961371-v2)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB969947)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971468)
Security Update for Windows XP (KB971557)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB972260)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973346)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975561)
Security Update for Windows XP (KB975562)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978037)
Security Update for Windows XP (KB978262)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978601)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979559)
Security Update for Windows XP (KB979683)
Security Update for Windows XP (KB980195)
Security Update for Windows XP (KB980218)
Security Update for Windows XP (KB980232)
Security Update for Windows XP (KB981350)
Unlocker 1.8.9
Update for Windows Internet Explorer 8 (KB976662)
Update for Windows Internet Explorer 8 (KB980182)
Update for Windows Internet Explorer 8 (KB980302)
Update for Windows XP (KB898461)
Update for Windows XP (KB932823-v3)
Update for Windows XP (KB955759)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB971737)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
Update for Windows XP (KB980182)
VC80CRTRedist - 8.0.50727.4053
WebFldrs XP
Windows Installer 3.1 (KB893803)
Windows Internet Explorer 8
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Hotfix - KB839210
WinRAR archiver

==== Event Viewer Messages From Past Week ========

8/15/2010 12:02:26 AM, error: sr [1] - The System Restore filter encountered the unexpected error '0xC000007F' while processing the file 'dirs.ini' on the volume 'HarddiskVolume3'. It has stopped monitoring the volume.
8/15/2010 1:19:53 PM, error: sr [1] - The System Restore filter encountered the unexpected error '0xC000007F' while processing the file 'default.cfg' on the volume 'HarddiskVolume3'. It has stopped monitoring the volume.

==== End Of File ===========================








RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0xB64C6000 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys 8089600 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Miniport Driver, Version 186.18 )
0xBD012000 C:\WINDOWS\System32\nv4_disp.dll 5910528 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Display driver, Version 186.18 )
0xB1BD9000 C:\WINDOWS\system32\drivers\RtkHDAud.sys 4550656 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2146304 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2146304 bytes
0x804D7000 RAW 2146304 bytes
0x804D7000 WMIxWDM 2146304 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xB62D3000 C:\WINDOWS\system32\DRIVERS\HSF_DP.sys 1044480 bytes (Conexant Systems, Inc., HSF_DP driver)
0xB622C000 C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys 684032 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0xB7E44000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xB073B000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 454656 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xB0841000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 360448 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xAD2A1000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xB6471000 C:\WINDOWS\system32\DRIVERS\e1e5132.sys 266240 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 5.2 deserialized driver)
0xAD0F8000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xB63F5000 C:\WINDOWS\system32\DRIVERS\HSFHWBS2.sys 212992 bytes (Conexant Systems, Inc., HSF_HWB2 WDM driver)
0xB61D0000 C:\WINDOWS\system32\DRIVERS\update.sys 212992 bytes (Microsoft Corporation, Update Driver)
0xB7F79000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xAD398000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB7E17000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB07AA000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 180224 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB0819000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xAD320000 C:\WINDOWS\system32\DRIVERS\secdrv.sys 163840 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0xB6429000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 151552 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xACE53000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 143360 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xB63D2000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xB644E000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 143360 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB07D6000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xB1BB7000 C:\WINDOWS\system32\drivers\portcls.sys 139264 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB07F8000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 135168 bytes (Microsoft Corporation, IP Network Address Translator)
0x806E3000 ACPI_HAL 134400 bytes
0x806E3000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xB7EFA000 fltMgr.sys 126976 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xB7F49000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xB7DFC000 Mup.sys 110592 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB7F31000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xAD7D1000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xB7F19000 C:\WINDOWS\System32\Drivers\SCSIPORT.SYS 98304 bytes (Microsoft Corporation, SCSI Port Driver)
0xB7ED1000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB6215000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xAD5BB000 C:\WINDOWS\system32\DRIVERS\nwlnkipx.sys 90112 bytes (Microsoft Corporation, NWLINK2 IPX Protocol Driver)
0xAD52E000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xB64B2000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xB0899000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBD000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xB7EE8000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xB7F68000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xB6204000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xAE4B6000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xB3CD7000 C:\WINDOWS\system32\DRIVERS\nwlnknb.sys 65536 bytes (Microsoft Corporation, NWLINK2 IPX Netbios Protocol Driver)
0xB3D37000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xB81D8000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xB8318000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xB4619000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xB209C000 C:\WINDOWS\system32\DRIVERS\nwlnkspx.sys 57344 bytes (Microsoft Corporation, NWLINK2 SPX Protocol Driver)
0xB81C8000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 53248 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xB80E8000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xB81F8000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xB80C8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xB8218000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xB81E8000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xB80B8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xB8208000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xB6EA6000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xB80F8000 PxHelp20.sys 40960 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xB8238000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xB80D8000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xB27A4000 C:\WINDOWS\System32\Drivers\Fips.SYS 36864 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xB8298000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xB81B8000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xB80A8000 isapnp.sys 36864 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xB8228000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xB27C4000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xB82F8000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xB27B4000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xB8338000 cercsr6.sys 32768 bytes (Adaptec, Inc., DELL CERC SATA1.5/6ch Miniport Driver)
0xB83A8000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xB21D7000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xB83E8000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xB83B0000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xB21EF000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xB8328000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xB83A0000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 28672 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xB83D0000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xB83D8000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xB21E7000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xB83E0000 C:\WINDOWS\system32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xB21DF000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xB8330000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xB83C0000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xB83C8000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xB83B8000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xB8398000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 20480 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xAE899000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xB856C000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB6C81000 C:\WINDOWS\System32\Drivers\Lycosa.sys 16384 bytes (Razer USA Ltd., Razer Tarantula Keyboard Driver)
0xB859C000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xB6C99000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xB84B8000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xAF647000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xB6C91000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xAD3E5000 C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xB855C000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB858C000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xB205A000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xB8632000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xB85CA000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xB8630000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xB85A8000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xB8634000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xB8636000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xB85D2000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xB8612000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xB85AA000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xB86FF000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xADA16000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xB278A000 C:\WINDOWS\System32\Drivers\hwinterface.sys 4096 bytes (Logix4u, hwinterface.sys)
0xB2835000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xB8670000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7CDA8 ] TID: 128, 17827089 bytes
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x89FF27B8 ] TID: 132
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A089DA8 ] TID: 136
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7D588 ] TID: 140
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A08BB30 ] TID: 144
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C87C70 ] TID: 148
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A07E528 ] TID: 152, 8781860 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89FE43B8 ] TID: 156
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89FE54A8 ] TID: 220, 8781856 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EAA28 ] TID: 460
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0ECDA8 ] TID: 464, 4522089 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0ECB30 ] TID: 468
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EC8B8 ] TID: 472
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A054328 ] TID: 480
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A07B7B0 ] TID: 484, 19203972 bytes
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A8FFA00 ] TID: 488
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C877B8 ] TID: 492, 8781844 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A08A5F8 ] TID: 500
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7A8F0 ] TID: 504, 8781839 bytes
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A0E4020 ] TID: 516
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7B7D0 ] TID: 536, 8781838 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7EA48 ] TID: 540
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x8A13E3E8 ] TID: 560, 8781838 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C89DA8 ] TID: 572
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89FE59E8 ] TID: 580, 8781838 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C89B30 ] TID: 592
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EC640 ] TID: 604, 8781837 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89C6C498 ] TID: 612
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0E27D8 ] TID: 616, 8781836 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C76538 ] TID: 620
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A3C2DA8 ] TID: 628, 8781836 bytes
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A3DB258 ] TID: 632
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A3F9020 ] TID: 636, 8781835 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C77860 ] TID: 640
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C762C0 ] TID: 644, 8781835 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EB970 ] TID: 648
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0E4848 ] TID: 664, 8781834 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EA538 ] TID: 676
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0DF328 ] TID: 680, 8781833 bytes
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x8A3E89C0 ] TID: 692
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x8A1BA8B8 ] TID: 700, 8781833 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A07C0B0 ] TID: 724
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CFDDA8 ] TID: 736, 8781832 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A11FDA8 ] TID: 744
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89D06BE8 ] TID: 776, 8781832 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89D08DA8 ] TID: 780
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A137DA8 ] TID: 784, 8781831 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A13DBE8 ] TID: 788
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CFADA8 ] TID: 792, 8781831 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A136DA8 ] TID: 796
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CFCDA8 ] TID: 800, 8781831 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CECDA8 ] TID: 804
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A90BBE8 ] TID: 816, 8781830 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A12DDA8 ] TID: 840
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CDFDA8 ] TID: 848, 8781830 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A222DA8 ] TID: 860
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A9A1D80 ] TID: 864, 8781829 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CF7DA8 ] TID: 872
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CE1BE8 ] TID: 876, 8781829 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A118DA8 ] TID: 880
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A1AABD8 ] TID: 884, 8781829 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0B2DA8 ] TID: 896
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89CB0DA8 ] TID: 900, 8781828 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A43C398 ] TID: 908
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A43C120 ] TID: 916
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A3EC518 ] TID: 924
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A00AB30 ] TID: 952, 8781826 bytes
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x8A07B020 ] TID: 964
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A8FC618 ] TID: 968, 8781826 bytes
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x89FF06A8 ] TID: 972
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A076DA8 ] TID: 980, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0E5020 ] TID: 988
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A43ABE8 ] TID: 992, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12BDA8 ] TID: 996
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12EDA8 ] TID: 1000, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C91DA8 ] TID: 1008
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A99DB30 ] TID: 1012, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A43A478 ] TID: 1032
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1172A8 ] TID: 1036, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A128020 ] TID: 1040
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A128628 ] TID: 1044, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A8339F0 ] TID: 1056
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A00CDA8 ] TID: 1084
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A00A6F8 ] TID: 1100
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C90B40 ] TID: 1104
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C908C8 ] TID: 1108
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CDD020 ] TID: 1116
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A131638 ] TID: 1128, 3801155 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF3480 ] TID: 1132
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0B23D8 ] TID: 1140
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8F868 ] TID: 1144
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C6D020 ] TID: 1148
0x8055B700 Faked ServiceTable-->RTHDCPL.exe [ ETHREAD 0x8A0B0710 ] TID: 1160
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0A5DA8 ] TID: 1168
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF13C0 ] TID: 1196
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF5638 ] TID: 1200
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0A85F0 ] TID: 1208
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A0A8378 ] TID: 1212
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A07A4E8 ] TID: 1216
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0166C8 ] TID: 1220
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A07DBE8 ] TID: 1228
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x8A07A210 ] TID: 1232, 6094949 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89FE7DA8 ] TID: 1252, 1179652 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89FE9DA8 ] TID: 1260
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF7630 ] TID: 1264, 6094949 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF2478 ] TID: 1268, 457 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A07D970 ] TID: 1272, 196610 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C728B8 ] TID: 1292, 458754 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF8488 ] TID: 1296
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A138020 ] TID: 1300
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8DAA0 ] TID: 1304
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1382D0 ] TID: 1308
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A008B30 ] TID: 1316
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C72B30 ] TID: 1328, 112 bytes
0x8055B700 Faked ServiceTable-->RTHDCPL.exe [ ETHREAD 0x89C9D8B8 ] TID: 1332
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C72DA8 ] TID: 1344
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89FFE5F0 ] TID: 1348
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D77D8 ] TID: 1352, 41615366 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D7A50 ] TID: 1356
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0A7BE8 ] TID: 1360
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C916D0 ] TID: 1364
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0FA5C0 ] TID: 1380
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CEC5D0 ] TID: 1392, 4 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8E868 ] TID: 1396
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8E5F0 ] TID: 1404
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12F638 ] TID: 1408
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A127518 ] TID: 1440
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8E378 ] TID: 1448, 2147450879 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12B638 ] TID: 1456
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A09F020 ] TID: 1460, 509 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CCA338 ] TID: 1488, 3473475 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A8FEA50 ] TID: 1492
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CCA7B8 ] TID: 1496, 2097200 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CC7828 ] TID: 1500, 19204412 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CDC738 ] TID: 1504
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89D03768 ] TID: 1508, 8519691 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CACDA8 ] TID: 1516
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0A4DA8 ] TID: 1532
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CFC500 ] TID: 1540, 2097200 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89D097E8 ] TID: 1552
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A845A60 ] TID: 1572
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CFE7B0 ] TID: 1584
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CFE538 ] TID: 1588
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A8457E8 ] TID: 1608
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89CE45A8 ] TID: 1620, 3145776 bytes
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89CFB840 ] TID: 1624
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1395C8 ] TID: 1640, 444 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A3E17D0 ] TID: 1648, 196621 bytes
0x8055B700 Faked ServiceTable-->RTHDCPL.exe [ ETHREAD 0x8A0094F8 ] TID: 1696
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A82F418 ] TID: 1704
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0EE4B0 ] TID: 1708
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A094020 ] TID: 1716, 112 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CACB30 ] TID: 1732, 543 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A092020 ] TID: 1740, 36605360 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C88DA8 ] TID: 1744, 458754 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0F4328 ] TID: 1752, 7602286 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0F3A28 ] TID: 1756
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A100868 ] TID: 1788, 6553697 bytes
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x8A0CA8B8 ] TID: 1828
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89CA52C8 ] TID: 1836
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89CB5B30 ] TID: 1844, 4456500 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A092DA8 ] TID: 1872
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A09FA28 ] TID: 1876
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A093508 ] TID: 1880
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0928B8 ] TID: 1892
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A092B30 ] TID: 1896
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89C86AC0 ] TID: 1928
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89C867A8 ] TID: 1932
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0F2A28 ] TID: 1972
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A08D6C0 ] TID: 1988
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A04B3D8 ] TID: 2000, 517 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0894E8 ] TID: 2004, 5373984 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7C328 ] TID: 2012, 356918 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A08EBE8 ] TID: 2032, 5373984 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C7BDA8 ] TID: 2036, 42466 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A087BE8 ] TID: 2044
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A04C328 ] TID: 2052
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C5FDA8 ] TID: 2056
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A06A020 ] TID: 2084
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A045980 ] TID: 2088, 655378 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CC73F8 ] TID: 2132, 3211334 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89C609C8 ] TID: 2144
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89C60208 ] TID: 2148
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89C53020 ] TID: 2216
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C69608 ] TID: 2280, 21233667 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89C63020 ] TID: 2292, 4391014 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A06EC08 ] TID: 2772
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A842348 ] TID: 2836
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C887B8 ] TID: 2968, 512 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A121970 ] TID: 3036, 4325403 bytes
0x8055B700 Faked ServiceTable-->RKUnhookerLE.EXE [ ETHREAD 0x8A121020 ] TID: 3052
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C8A3B0 ] TID: 3060, 655374 bytes
WARNING: Virus alike driver modification [sffp_sd.sys]
WARNING: Virus alike driver modification [HSF_DP.sys]
WARNING: Virus alike driver modification [dxapi.sys]
WARNING: Virus alike driver modification [mup.sys]
WARNING: Virus alike driver modification [mdmxsdk.sys]
WARNING: Virus alike driver modification [sffdisk.sys]
WARNING: Virus alike driver modification [irenum.sys]
WARNING: Virus alike driver modification [sfloppy.sys]
WARNING: Virus alike driver modification [ianswxp.sys]
WARNING: Virus alike driver modification [acpiec.sys]
WARNING: Virus alike driver modification [cpqdap01.sys]
WARNING: Virus alike driver modification [pcmcia.sys]
WARNING: Virus alike driver modification [nikedrv.sys]
WARNING: Virus alike driver modification [rio8drv.sys]
WARNING: Virus alike driver modification [riodrv.sys]
WARNING: Virus alike driver modification [ws2ifsl.sys]
WARNING: Virus alike driver modification [tdpipe.sys]
WARNING: Virus alike driver modification [fsvga.sys]
WARNING: Virus alike driver modification [mouhid.sys]
WARNING: Virus alike driver modification [nwlnkflt.sys]
WARNING: Virus alike driver modification [tunmp.sys]
WARNING: Virus alike driver modification [fltMgr.sys]
WARNING: Virus alike driver modification [ftdisk.sys]
WARNING: Virus alike driver modification [usb8023.sys]
WARNING: Virus alike driver modification [ndisuio.sys]
WARNING: Virus alike driver modification [ipnat.sys]
WARNING: Virus alike driver modification [portcls.sys]
WARNING: Virus alike driver modification [afd.sys]
WARNING: Virus alike driver modification [Hdaudbus.sys]
WARNING: Virus alike driver modification [rdpwd.sys]
WARNING: Virus alike driver modification [cbidf2k.sys]
WARNING: Virus alike driver modification [ks.sys]
WARNING: Virus alike driver modification [diskdump.sys]
WARNING: Virus alike driver modification [aec.sys]
WARNING: Virus alike driver modification [usbport.sys]
WARNING: Virus alike driver modification [asyncmac.sys]
WARNING: Virus alike driver modification [fastfat.sys]
WARNING: Virus alike driver modification [smclib.sys]
WARNING: Virus alike driver modification [Hdaudio.sys]
WARNING: Virus alike driver modification [kbdhid.sys]
WARNING: Virus alike driver modification [tape.sys]
WARNING: Virus alike driver modification [dmio.sys]
WARNING: Virus alike driver modification [mssmbios.sys]
WARNING: Virus alike driver modification [serenum.sys]
WARNING: Virus alike driver modification [usbintel.sys]
WARNING: Virus alike driver modification [a347bus.sys]
WARNING: Virus alike driver modification [Lycosa.sys]
WARNING: Virus alike driver modification [MODEMCSA.sys]
WARNING: Virus alike driver modification [netbt.sys]
WARNING: Virus alike driver modification [secdrv.sys]
WARNING: Virus alike driver modification [windrvr.sys]
WARNING: Virus alike driver modification [raspti.sys]
WARNING: Virus alike driver modification [kmixer.sys]
WARNING: Virus alike driver modification [rdbss.sys]
WARNING: Virus alike driver modification [ptilink.sys]
WARNING: Virus alike driver modification [mrxdav.sys]
WARNING: Virus alike driver modification [ndis.sys]
WARNING: Virus alike driver modification [tdi.sys]
WARNING: Virus alike driver modification [cdaudio.sys]
WARNING: Virus alike driver modification [partmgr.sys]
WARNING: Virus alike driver modification [acpi.sys]
WARNING: Virus alike driver modification [msfs.sys]
WARNING: Virus alike driver modification [rdpdr.sys]
WARNING: Virus alike driver modification [rmcast.sys]
WARNING: Virus alike driver modification [flpydisk.sys]
WARNING: Virus alike driver modification [usbuhci.sys]
WARNING: Virus alike driver modification [update.sys]
WARNING: Virus alike driver modification [mbam.sys]
WARNING: Virus alike driver modification [ipinip.sys]
WARNING: Virus alike driver modification [vga.sys]
WARNING: Virus alike driver modification [HSFHWBS2.sys]
WARNING: Virus alike driver modification [tsbvcap.sys]
WARNING: Virus alike driver modification [tdtcp.sys]
WARNING: Virus alike driver modification [tcpip6.sys]
WARNING: Virus alike driver modification [mouclass.sys]
WARNING: Virus alike driver modification [usbcamd.sys]
WARNING: Virus alike driver modification [usbcamd2.sys]
WARNING: Virus alike driver modification [kbdclass.sys]
WARNING: Virus alike driver modification [hidparse.sys]
WARNING: Virus alike driver modification [pciidex.sys]
WARNING: Virus alike driver modification [sonydcam.sys]
WARNING: Virus alike driver modification [e1e5132.sys]
WARNING: Virus alike driver modification [cinemst2.sys]
WARNING: Virus alike driver modification [http.sys]
WARNING: Virus alike driver modification [USBSTOR.SYS]
WARNING: Virus alike driver modification [usbehci.sys]
WARNING: Virus alike driver modification [bthport.sys]
WARNING: Virus alike driver modification [fdc.sys]
WARNING: Virus alike driver modification [ip6fw.sys]
WARNING: Virus alike driver modification [modem.sys]
WARNING: Virus alike driver modification [rndismp.sys]
WARNING: Virus alike driver modification [npfs.sys]
WARNING: Virus alike driver modification [iqvw32.sys]
WARNING: Virus alike driver modification [atmepvc.sys]
WARNING: Virus alike driver modification [usbccgp.sys]
WARNING: Virus alike driver modification [nwlnkfwd.sys]
WARNING: Virus alike driver modification [ipfltdrv.sys]
WARNING: Virus alike driver modification [rawwan.sys]
WARNING: Virus alike driver modification [netbios.sys]
WARNING: Virus alike driver modification [wanarp.sys]
WARNING: Virus alike driver modification [fips.sys]
WARNING: Virus alike driver modification [msgpc.sys]
WARNING: Virus alike driver modification [atmuni.sys]
WARNING: Virus alike driver modification [srv.sys]
WARNING: Virus alike driver modification [processr.sys]
WARNING: Virus alike driver modification [isapnp.sys]
WARNING: Virus alike driver modification [tcpip.sys]
WARNING: Virus alike driver modification [intelppm.sys]
WARNING: Virus alike driver modification [hidclass.sys]
WARNING: Virus alike driver modification [disk.sys]
WARNING: Virus alike driver modification [crusoe.sys]
WARNING: Virus alike driver modification [amdk6.sys]
WARNING: Virus alike driver modification [amdk7.sys]
WARNING: Virus alike driver modification [ndproxy.sys]
WARNING: Virus alike driver modification [mbamswissarmy.sys]
WARNING: Virus alike driver modification [wpdusb.sys]
WARNING: Virus alike driver modification [cercsr6.sys]
WARNING: Virus alike driver modification [nmnt.sys]
WARNING: Virus alike driver modification [termdd.sys]
WARNING: Virus alike driver modification [raspppoe.sys]
WARNING: Virus alike driver modification [imapi.sys]
WARNING: Virus alike driver modification [beep.sys]
WARNING: Virus alike driver modification [mnmdd.sys]
WARNING: Virus alike driver modification [rdpcdd.sys]
WARNING: Virus alike driver modification [mountmgr.sys]
WARNING: Virus alike driver modification [p3.sys]
WARNING: Virus alike driver modification [swenum.sys]
WARNING: Virus alike driver modification [wmilib.sys]
WARNING: Virus alike driver modification [RtkHDAud.sys]
WARNING: Virus alike driver modification [PxHelp20.sys]
WARNING: Virus alike driver modification [mrxsmb.sys]
WARNING: Virus alike driver modification [usbd.sys]
WARNING: Virus alike driver modification [raspptp.sys]
WARNING: Virus alike driver modification [stream.sys]
WARNING: Virus alike driver modification [cdrom.sys]
WARNING: Virus alike driver modification [classpnp.sys]
WARNING: Virus alike driver modification [MSPQM.sys]
WARNING: Virus alike driver modification [rasl2tp.sys]
WARNING: Virus alike driver modification [tosdvd.sys]
WARNING: Virus alike driver modification [volsnap.sys]
WARNING: Virus alike driver modification [a347scsi.sys]
WARNING: Virus alike driver modification [i8042prt.sys]
WARNING: Virus alike driver modification [DMusic.sys]
WARNING: Virus alike driver modification [MSPCLOCK.sys]
WARNING: Virus alike driver modification [swmidi.sys]
WARNING: Virus alike driver modification [atmlane.sys]
WARNING: Virus alike driver modification [nwlnkspx.sys]
WARNING: Virus alike driver modification [ntfs.sys]
WARNING: Virus alike driver modification [redbook.sys]
WARNING: Virus alike driver modification [usbhub.sys]
WARNING: Virus alike driver modification [vdmindvd.sys]
WARNING: Virus alike driver modification [dmload.sys]
WARNING: Virus alike driver modification [rootmdm.sys]
WARNING: Virus alike driver modification [atmarpc.sys]
WARNING: Virus alike driver modification [drmk.sys]
WARNING: Virus alike driver modification [arp1394.sys]
WARNING: Virus alike driver modification [sysaudio.sys]
WARNING: Virus alike driver modification [nic1394.sys]
WARNING: Virus alike driver modification [nwlnknb.sys]
WARNING: Virus alike driver modification [cdfs.sys]
WARNING: Virus alike driver modification [mf.sys]
WARNING: Virus alike driver modification [splitter.sys]
WARNING: Virus alike driver modification [serial.sys]
WARNING: Virus alike driver modification [udfs.sys]
WARNING: Virus alike driver modification [sdbus.sys]
WARNING: Virus alike driver modification [parvdm.sys]
WARNING: Virus alike driver modification [HSF_CNXT.sys]
WARNING: Virus alike driver modification [pci.sys]
WARNING: Virus alike driver modification [psched.sys]
WARNING: Virus alike driver modification [dxg.sys]
WARNING: Virus alike driver modification [bridge.sys]
WARNING: Virus alike driver modification [sr.sys]
WARNING: Virus alike driver modification [ipsec.sys]
WARNING: Virus alike driver modification [MSKSSRV.sys]
WARNING: Virus alike driver modification [mcd.sys]
WARNING: Virus alike driver modification [WudfPf.sys]
WARNING: Virus alike driver modification [fs_rec.sys]
WARNING: Virus alike driver modification [videoprt.sys]
WARNING: Virus alike driver modification [dmboot.sys]
WARNING: Virus alike driver modification [parport.sys]
WARNING: Virus alike driver modification [nv4_mini.sys]
WARNING: Virus alike driver modification [wdmaud.sys]
WARNING: Virus alike driver modification [WudfRd.sys]
WARNING: Virus alike driver modification [rasacd.sys]
WARNING: Virus alike driver modification [nwlnkipx.sys]
WARNING: Virus alike driver modification [cdr4_xp.sys]
WARNING: Virus alike driver modification [ndiswan.sys]
WARNING: Virus alike driver modification [cdralw2k.sys]
WARNING: Virus alike driver modification [ksecdd.sys]
WARNING: Virus alike driver modification [atapi.sys]
WARNING: Virus alike driver modification [hidusb.sys]
WARNING: Virus alike driver modification [ndistapi.sys]
WARNING: Virus alike driver modification [scsiport.sys]






MBRCheck, version 1.2.3
© 2010, AD

Command-line:
Windows Version: Windows XP Home Edition
Windows Information: Service Pack 2 (build 2600)
Logical Drives Mask: 0x0000003d

Kernel Drivers (total 117):
0x804D7000 \WINDOWS\system32\ntkrnlpa.exe
0x806E3000 \WINDOWS\system32\hal.dll
0xB85A8000 \WINDOWS\system32\KDCOM.DLL
0xB84B8000 \WINDOWS\system32\BOOTVID.dll
0xB7F79000 ACPI.sys
0xB85AA000 \WINDOWS\system32\DRIVERS\WMILIB.SYS
0xB7F68000 pci.sys
0xB80A8000 isapnp.sys
0xB8670000 pciide.sys
0xB8328000 \WINDOWS\system32\DRIVERS\PCIIDEX.SYS
0xB80B8000 MountMgr.sys
0xB7F49000 ftdisk.sys
0xB8330000 PartMgr.sys
0xB80C8000 VolSnap.sys
0xB7F31000 atapi.sys
0xB8338000 cercsr6.sys
0xB7F19000 \WINDOWS\System32\Drivers\SCSIPORT.SYS
0xB80D8000 disk.sys
0xB80E8000 \WINDOWS\system32\DRIVERS\CLASSPNP.SYS
0xB7EFA000 fltMgr.sys
0xB7EE8000 sr.sys
0xB80F8000 PxHelp20.sys
0xB7ED1000 KSecDD.sys
0xB7E44000 Ntfs.sys
0xB7E17000 NDIS.sys
0xB7DFC000 Mup.sys
0xB81B8000 \SystemRoot\system32\DRIVERS\intelppm.sys
0xB64C6000 \SystemRoot\system32\DRIVERS\nv4_mini.sys
0xB64B2000 \SystemRoot\system32\DRIVERS\VIDEOPRT.SYS
0xB6471000 \SystemRoot\system32\DRIVERS\e1e5132.sys
0xB8398000 \SystemRoot\system32\DRIVERS\usbuhci.sys
0xB644E000 \SystemRoot\system32\DRIVERS\USBPORT.SYS
0xB83A0000 \SystemRoot\system32\DRIVERS\usbehci.sys
0xB6429000 \SystemRoot\system32\DRIVERS\HDAudBus.sys
0xB63F5000 \SystemRoot\system32\DRIVERS\HSFHWBS2.sys
0xB63D2000 \SystemRoot\system32\DRIVERS\ks.sys
0xB62D3000 \SystemRoot\system32\DRIVERS\HSF_DP.sys
0xB622C000 \SystemRoot\system32\DRIVERS\HSF_CNXT.sys
0xB83A8000 \SystemRoot\System32\Drivers\Modem.SYS
0xB83B0000 \SystemRoot\system32\DRIVERS\fdc.sys
0xB81C8000 \SystemRoot\system32\DRIVERS\cdrom.sys
0xB81D8000 \SystemRoot\system32\DRIVERS\redbook.sys
0xB81E8000 \SystemRoot\system32\DRIVERS\imapi.sys
0xB86FF000 \SystemRoot\system32\DRIVERS\audstub.sys
0xB81F8000 \SystemRoot\system32\DRIVERS\rasl2tp.sys
0xB858C000 \SystemRoot\system32\DRIVERS\ndistapi.sys
0xB6215000 \SystemRoot\system32\DRIVERS\ndiswan.sys
0xB8208000 \SystemRoot\system32\DRIVERS\raspppoe.sys
0xB8218000 \SystemRoot\system32\DRIVERS\raspptp.sys
0xB83B8000 \SystemRoot\system32\DRIVERS\TDI.SYS
0xB6204000 \SystemRoot\system32\DRIVERS\psched.sys
0xB8228000 \SystemRoot\system32\DRIVERS\msgpc.sys
0xB83C0000 \SystemRoot\system32\DRIVERS\ptilink.sys
0xB83C8000 \SystemRoot\system32\DRIVERS\raspti.sys
0xB8238000 \SystemRoot\system32\DRIVERS\termdd.sys
0xB83D0000 \SystemRoot\system32\DRIVERS\kbdclass.sys
0xB83D8000 \SystemRoot\system32\DRIVERS\mouclass.sys
0xB85D2000 \SystemRoot\system32\DRIVERS\swenum.sys
0xB61D0000 \SystemRoot\system32\DRIVERS\update.sys
0xB859C000 \SystemRoot\system32\DRIVERS\mssmbios.sys
0xB83E0000 \SystemRoot\system32\DRIVERS\flpydisk.sys
0xB6EA6000 \SystemRoot\System32\Drivers\NDProxy.SYS
0xB4619000 \SystemRoot\system32\DRIVERS\usbhub.sys
0xB8612000 \SystemRoot\system32\DRIVERS\USBD.SYS
0xB1BD9000 \SystemRoot\system32\drivers\RtkHDAud.sys
0xB1BB7000 \SystemRoot\system32\drivers\portcls.sys
0xB3D37000 \SystemRoot\system32\drivers\drmk.sys
0xB8630000 \SystemRoot\System32\Drivers\Fs_Rec.SYS
0xB2835000 \SystemRoot\System32\Drivers\Null.SYS
0xB8632000 \SystemRoot\System32\Drivers\Beep.SYS
0xB21EF000 \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
0xB21E7000 \SystemRoot\System32\drivers\vga.sys
0xB8634000 \SystemRoot\System32\Drivers\mnmdd.SYS
0xB8636000 \SystemRoot\System32\DRIVERS\RDPCDD.sys
0xB21DF000 \SystemRoot\System32\Drivers\Msfs.SYS
0xB21D7000 \SystemRoot\System32\Drivers\Npfs.SYS
0xB205A000 \SystemRoot\system32\DRIVERS\rasacd.sys
0xB0899000 \SystemRoot\system32\DRIVERS\ipsec.sys
0xB0841000 \SystemRoot\system32\DRIVERS\tcpip.sys
0xB0819000 \SystemRoot\system32\DRIVERS\netbt.sys
0xB07F8000 \SystemRoot\system32\DRIVERS\ipnat.sys
0xB07D6000 \SystemRoot\System32\drivers\afd.sys
0xB27C4000 \SystemRoot\system32\DRIVERS\netbios.sys
0xB07AA000 \SystemRoot\system32\DRIVERS\rdbss.sys
0xB073B000 \SystemRoot\system32\DRIVERS\mrxsmb.sys
0xB27B4000 \SystemRoot\system32\DRIVERS\wanarp.sys
0xB278A000 \SystemRoot\System32\Drivers\hwinterface.sys
0xB27A4000 \SystemRoot\System32\Drivers\Fips.SYS
0xB83E8000 \SystemRoot\system32\DRIVERS\usbccgp.sys
0xB6C91000 \SystemRoot\system32\DRIVERS\hidusb.sys
0xB8298000 \SystemRoot\system32\DRIVERS\HIDCLASS.SYS
0xB6C81000 \SystemRoot\System32\Drivers\Lycosa.sys
0xB855C000 \SystemRoot\system32\DRIVERS\mouhid.sys
0xB856C000 \SystemRoot\system32\DRIVERS\kbdhid.sys
0xAE4B6000 \SystemRoot\System32\Drivers\Cdfs.SYS
0xAD7D1000 \SystemRoot\System32\Drivers\dump_atapi.sys
0xB85CA000 \SystemRoot\System32\Drivers\dump_WMILIB.SYS
0xBF800000 \SystemRoot\System32\win32k.sys
0xAF647000 \SystemRoot\System32\drivers\Dxapi.sys
0xAE899000 \SystemRoot\System32\watchdog.sys
0xBD000000 \SystemRoot\System32\drivers\dxg.sys
0xADA16000 \SystemRoot\System32\drivers\dxgthk.sys
0xBD012000 \SystemRoot\System32\nv4_disp.dll
0xAD5BB000 \SystemRoot\system32\DRIVERS\nwlnkipx.sys
0xB3CD7000 \SystemRoot\system32\DRIVERS\nwlnknb.sys
0xB6C99000 \SystemRoot\system32\DRIVERS\ndisuio.sys
0xAD52E000 \SystemRoot\system32\drivers\wdmaud.sys
0xB8318000 \SystemRoot\system32\drivers\sysaudio.sys
0xB209C000 \SystemRoot\system32\DRIVERS\nwlnkspx.sys
0xAD398000 \SystemRoot\system32\DRIVERS\mrxdav.sys
0xAD3E5000 \SystemRoot\system32\DRIVERS\mdmxsdk.sys
0xAD320000 \SystemRoot\system32\DRIVERS\secdrv.sys
0xAD2A1000 \SystemRoot\system32\DRIVERS\srv.sys
0xAD0F8000 \SystemRoot\System32\Drivers\HTTP.sys
0xACE53000 \SystemRoot\System32\Drivers\Fastfat.SYS
0xACE29000 \SystemRoot\system32\drivers\kmixer.sys
0x7C900000 \WINDOWS\system32\ntdll.dll

Processes (total 24):
0 System Idle Process
4 System
624 C:\WINDOWS\system32\smss.exe
672 csrss.exe
704 C:\WINDOWS\system32\winlogon.exe
748 C:\WINDOWS\system32\services.exe
760 C:\WINDOWS\system32\lsass.exe
928 C:\WINDOWS\system32\nvsvc32.exe
956 C:\WINDOWS\system32\svchost.exe
1024 svchost.exe
1120 C:\WINDOWS\system32\svchost.exe
1244 svchost.exe
1384 svchost.exe
1564 C:\WINDOWS\system32\spoolsv.exe
1808 C:\WINDOWS\explorer.exe
1884 C:\WINDOWS\RTHDCPL.exe
1916 C:\WINDOWS\system32\ctfmon.exe
1076 svchost.exe
1676 F:\Program Files\Mozilla Firefox\firefox.exe
564 alg.exe
1376 C:\WINDOWS\system32\wscntfy.exe
1256 C:\WINDOWS\system32\svchost.exe
3116 C:\WINDOWS\system32\notepad.exe
3324 C:\Documents and Settings\Nick\Desktop\MBRCheck.exe

\\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`02738a00 (NTFS)
\\.\F: --> \\.\PhysicalDrive1 at offset 0x00000000`00007e00 (NTFS)

PhysicalDrive0 Model Number: ST3160815AS, Rev: 3.ADA
PhysicalDrive1 Model Number: WDCWD1600AAJS-75B4A0, Rev: 01.03A01

Size Device Name MBR Status
--------------------------------------------
149 GB \\.\PhysicalDrive0 Windows XP MBR code detected
SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A
149 GB \\.\PhysicalDrive1 Windows XP MBR code detected
SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A


Done! thumbup2.gif






#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 22 August 2010 - 05:30 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:
    Please visit this webpage for download links, and instructions for running the tool:

    http://www.bleepingcomputer.com/combofix/how-to-use-combofix

    Please ensure you read this guide carefully and install the Recovery Console first.

    The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode.
    This allows us to more easily help you should your computer have a problem after an attempted removal of malware.
    It is a simple procedure that will only take a few moments of your time.


    Once installed, you should see a blue screen prompt that says:
      The Recovery Console was successfully installed.
    Please continue as follows:
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Click Yes to allow ComboFix to continue scanning for malware.

    When the tool is finished, it will produce a report for you.

    Please include the report in your next post:

    C:\ComboFix.txt

"information and logs"
    In your next post I need the following
    1. Log from Combofix
    2. let me know of any problems you may have had
    3. How is the computer doing now?

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 23 August 2010 - 07:29 AM

ComboFix 10-08-22.05 - Nick 08/23/2010 7:21.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1536 [GMT -7:00]
Running from: c:\program files\ComboFix.exe
.

((((((((((((((((((((((((( Files Created from 2010-07-23 to 2010-08-23 )))))))))))))))))))))))))))))))
.

2010-08-23 14:17 . 2010-08-23 14:17 3825642 -c--a-r- c:\program files\ComboFix.exe
2010-08-22 23:57 . 2010-08-22 23:57 50477 -c--a-w- c:\program files\Defogger.exe
2010-08-11 15:42 . 2010-08-11 15:42 -------- dc----w- c:\windows\system32\wbem\Repository
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\Jaws.exe1_356524D230144D9490BE80AB14A8EC95.exe
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\Jaws.exe_356524D230144D9490BE80AB14A8EC95_1.exe
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\ARPPRODUCTICON.exe
2010-08-04 20:51 . 2010-08-04 20:51 444952 -c--a-w- c:\windows\system32\wrap_oal.dll
2010-08-04 20:51 . 2010-08-04 20:51 109080 -c--a-w- c:\windows\system32\OpenAL32.dll
2010-08-04 20:50 . 2010-08-04 20:50 -------- dc-h--r- c:\documents and settings\Nick\Application Data\SecuROM
2010-08-04 18:10 . 2010-08-04 18:13 -------- dc----w- c:\program files\Neo Geo CD
2010-08-04 15:37 . 2010-05-06 10:41 743424 -c----w- c:\windows\system32\dllcache\iedvtool.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-08-22 23:58 . 2010-08-22 23:58 756 -c--a-w- c:\program files\defogger_disable.log
2010-08-22 06:07 . 2010-06-21 00:20 -------- dc----w- c:\program files\Cheat Engine
2010-08-15 22:08 . 2010-05-25 04:46 -------- dc----w- c:\documents and settings\Nick\Application Data\BitTorrent
2010-08-07 22:46 . 2010-06-03 04:42 -------- dc----w- c:\program files\CCleaner
2010-08-04 22:35 . 2004-08-04 10:00 163644 -c--a-w- c:\windows\system32\drivers\secdrv.sys
2010-07-24 21:40 . 2010-05-12 17:20 1183 -c--a-w- C:\debug.fz10.reg
2010-07-21 01:52 . 2010-04-27 23:18 -------- dc----w- c:\program files\Playstation With Cheats
2010-07-21 01:52 . 2010-04-27 23:18 -------- dc----w- c:\program files\Playstaion Without Cheats
2010-07-21 01:50 . 2010-07-21 01:50 -------- dc----w- c:\program files\Nintendo Color Game Boy
2010-07-17 20:21 . 2010-07-17 20:21 -------- dc----w- c:\program files\7-Zip
2010-07-10 02:49 . 2010-07-04 04:09 -------- dc----w- c:\program files\Windows Media Connect 2
2010-07-04 14:49 . 2010-07-04 14:49 -------- dc----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2010-06-14 14:30 . 2009-10-06 03:05 743936 -c--a-w- c:\windows\pchealth\helpctr\binaries\helpsvc.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2007-04-26 16132608]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-06-10 13758464]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-04-12 22:46 1135912 -c--a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Lycosa]
2007-11-20 23:53 147456 -c--a-w- c:\program files\Razer\Lycosa\razerhid.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-04 08:06 1667584 -c----w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2009-06-10 15:28 13758464 -c--a-w- c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2009-06-10 15:28 86016 -c--a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
2009-06-10 15:29 1657376 -c--a-w- c:\windows\system32\nwiz.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-02-18 18:43 248040 -c--a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
2010-03-09 02:52 15872 -c--a-w- c:\program files\Unlocker\UnlockerAssistant.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"upnphost"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"JavaQuickStarterService"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=

R1 hwinterface;hwinterface;c:\windows\system32\drivers\hwinterface.sys [5/12/2010 10:04 AM 3026]
R3 LycoFltr;Lycosa Keyboard;c:\windows\system32\drivers\Lycosa.sys [10/6/2009 1:31 PM 16128]
S4 a347bus;a347bus;c:\windows\system32\drivers\a347bus.sys [5/12/2010 10:16 AM 160640]
S4 a347scsi;a347scsi;c:\windows\system32\drivers\a347scsi.sys [5/12/2010 10:16 AM 5248]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - NORMANDY
*Deregistered* - Normandy
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-08-23 07:23
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-746137067-630328440-725345543-1004\Software\SecuROM\License information*]
"datasecu"=hex:62,a4,e0,75,31,0b,cf,e7,d2,48,17,aa,0a,b8,5e,ba,74,94,f9,7f,9e,
99,ad,53,86,c4,9d,c8,26,9b,99,05,e9,1c,4d,1e,d8,e6,70,50,57,6f,4c,eb,da,8b,\
"rkeysecu"=hex:29,23,be,84,e1,6c,d6,ae,52,90,49,f1,f1,bb,e9,eb
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(704)
c:\windows\system32\cryptdll.dll

- - - - - - - > 'explorer.exe'(524)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
c:\windows\system32\msi.dll
.
Completion time: 2010-08-23 07:24:14
ComboFix-quarantined-files.txt 2010-08-23 14:24

Pre-Run: 5,590,802,432 bytes free
Post-Run: 5,641,084,928 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
multi(0)disk(0)rdisk(1)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 6469C6D41C3869EB8BEC15742022420F



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 23 August 2010 - 12:32 PM

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realise. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.


These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..


Clear your Java Cache
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
        Applications and Applets
        Trace and Log Files
    • Click OK on Delete Temporary Files Window
      Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
    • Click OK to leave the Temporary Files Window
    • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):
  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :
    I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis
  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"
    In your next post I need the following
    1. Log From MBAM
    2. report from Hijackthis
    3. let me know of any problems you may have had
    4. How is the computer doing now?

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 23 August 2010 - 07:33 PM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4468

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

8/23/2010 7:30:24 PM
mbam-log-2010-08-23 (19-30-24).txt

Scan type: Quick scan
Objects scanned: 128014
Time elapsed: 3 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)











Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 7:31:44 PM, on 8/23/2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\wscntfy.exe
F:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Nick\Desktop\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: (no name) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - (no file)
O3 - Toolbar: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 2800 bytes

in_love.gif


#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 23 August 2010 - 07:39 PM

Greetings

Right now is a grat time to update to SP3 just so you know that there is no more support for SP2 from microsoft anymore

http://www.microsoft.com/downloads/details...;displaylang=en

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.
  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):
      O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
      O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

      NOTE**You can research each of those lines >here< and see if you want to keep them or not
      just copy the name between the brakets and paste into the search space
      O4 - HKLM\..\Run: [IntelliPoint]


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan

Go Eset web page to run an online scannner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
      Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

"information and logs"
    In your next post I need the following
    1. Report from ESET
    2. let me know of any problems you may have had
    3. How is the computer doing now?

Gringo







I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 23 August 2010 - 10:47 PM

F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\3866D77Dd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\863FE8B4d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\91BDEC94d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\B9A15D40d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\D569924Fd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E95D2C0Bd01 HTML/Iframe.B.Gen virus
F:\Program Files\WinRAR\WinRAR.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\boot.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\command.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\msconfig.dat a variant of Win32/VB.NFY trojan
F:\WINDOWS\system.win a variant of Win32/VB.NFY trojan



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 23 August 2010 - 11:02 PM

Hello

We need to delete some files from your computer.

1.At the top of the Firefox window On the menu bar, click on the ToolsFirefoxEdit menu, and select Options...Preferences....
2.Select the Advanced panel.
3.Click on the Network tab.
4.In the Offline Storage section, click Clear Now.
5.Click OK to close the Options window

delete files
  • Copy all text in the quote box (below)...to Notepad.
    QUOTE
    @echo off
    del /f /s /q "F:\Program Files\WinRAR\WinRAR.win"
    del /f /s /q "F:\WINDOWS\boot.win"
    del /f /s /q "F:\WINDOWS\command.win"
    del /f /s /q "F:\WINDOWS\msconfig.dat"
    del /f /s /q "F:\WINDOWS\system.win"
    del %0
  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: <--XP<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.



Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


The following procedure will implement some cleanup procedures. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

Any programs and logs that are left over you can just be deleted from the desktop. TFC is a free temp file cleaner that is very easy to use, I would keep this and use before you do any scans or when you want to free up some space.

:DeFogger:
    To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK
    Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.

:remove tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:clear system restore points:

This is a good time to clear your existing system restore points and establish a new clean restore point:
  • Go to Start > All Programs > Accessories > System Tools > System Restore
  • Select Create a restore point, and Ok it.
  • Next, go to Start > Run and type in cleanmgr
  • choose your root drive (normally C:)
  • after it calculates how much space you will save it will open up a new window
  • Select the More options tab at the top of the window
  • Choose the option to clean up system restore and OK it.
  • go back to the disk clean up tab
  • put a checkmark in all - except compress old files (leave this unchecked)
  • click Ok then click yes
This will remove all restore points except the new one you just created and clean unneeded files

:Make your Internet Explorer more secure:
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialise and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.

:Make Firefox more secure:

:Turn On Automatic Updates:
    Turn On Automatic Updates
    1. Click Start, click Run, type sysdm.cpl, and then press ENTER.
    2. Click the Automatic Updates tab, and then click to select one of the following options. We recommend that you select the Automatic (recommended) Automatically download recommended updates for my computer and install them

    If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your taskbar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.

    or visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

:antispyware programs:

I would reccomend the download and installation of some or all of the following programs (all free), and the updating of them regularly:
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Spyware Blaster - By altering your registry, this program stops harmful sites from installing things like ActiveX Controls on your machines.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often.

please read this great article by miekiemoes How to prevent Malware:

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show appreciation and to help me continue the fight against Malware, then click here:

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 24 August 2010 - 03:59 PM

I scanned the computer with eset again and the viruses are still pulling up wacko.gif

F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\3866D77Dd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\863FE8B4d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\91BDEC94d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\B9A15D40d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\D569924Fd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E95D2C0Bd01 HTML/Iframe.B.Gen virus
F:\WINDOWS\boot.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\command.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\system.win a variant of Win32/VB.NFY trojan


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 24 August 2010 - 04:27 PM

I want you to run this custom script for me.

If you have already removed combofix the redownload it from here Link 1

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

CODE
Folder::
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)

File::
F:\WINDOWS\boot.win
F:\WINDOWS\command.win
F:\WINDOWS\system.win


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe

This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"
    In your next post I need the following
    1. report from Combofix
    2. let me know of any problems you may have had
    3. How is the computer doing now after running the script?

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 24 August 2010 - 04:34 PM

I never deleted combo fix i never deleted anything and my cpu hasnt turned off since you started to help me.







ComboFix 10-08-24.07 - Nick 08/24/2010 16:39:59.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1689 [GMT -7:00]
Running from: c:\program files\ComboFix.exe
Command switches used :: c:\documents and settings\Nick\Desktop\CFScript.txt

FILE ::
"f:\windows\boot.win"
"f:\windows\command.win"
"f:\windows\system.win"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\_CACHE_001_
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\_CACHE_002_
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\_CACHE_003_
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\_CACHE_MAP_
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\00AB7943d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\0ACD6B45d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\0B0303C5d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\0CDF783Fd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\0F132DD3d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\16DA0F08d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\17B505CFd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\17C3892Fd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\1BD6F1A2d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\1E583343d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\228860DCd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\30FADDE0d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\311E0BD1d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\32A37D62d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\3866D77Dd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\400E68E3d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\49B0DF88d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\4D42FD74d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\4D44E654d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\4F6A482Bd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\5B55EA47d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\5C8020E3d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\6D812ADAd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\6F6EB222d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\7BD6A121d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\80A5AA6Cd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\863FE8B4d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\869C5A8Dd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\86FB85C5d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\88F03DEAd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\891E5675d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\8CDC77F1d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\8D302DE8d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\91BDEC94d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\91DDB6EAd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\9666851Cd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\9882C567d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\9884C567d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\9885C567d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\A59C496Bd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\A815EF32d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\A89F4DBCd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\AA4841E2d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\ADFD8313d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\B7913970d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\B9A15D40d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\C21CE180d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\CA3C058Cd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\CEA886A6d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\D569924Fd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\DC1DB316d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E1F683FFd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E7EE522Dd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E81B4A3Ed01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E95D2C0Bd01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\F11B9107d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\F40E5769d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\F90170D7d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\F90470D7d01
f:\documents and settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\FC0C1EB5d01
f:\windows\boot.win
f:\windows\command.win
f:\windows\system.win

.
((((((((((((((((((((((((( Files Created from 2010-07-24 to 2010-08-24 )))))))))))))))))))))))))))))))
.

2010-08-24 03:30 . 2010-08-24 03:30 -------- dc----w- c:\program files\ESET
2010-08-23 14:17 . 2010-08-24 23:38 3827180 -c--a-r- c:\program files\ComboFix.exe
2010-08-22 23:57 . 2010-08-22 23:57 50477 -c--a-w- c:\program files\Defogger.exe
2010-08-11 15:42 . 2010-08-11 15:42 -------- dc----w- c:\windows\system32\wbem\Repository
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\Jaws.exe1_356524D230144D9490BE80AB14A8EC95.exe
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\Jaws.exe_356524D230144D9490BE80AB14A8EC95_1.exe
2010-08-04 22:31 . 2010-08-04 22:31 51262 -c--a-r- c:\documents and settings\Nick\Application Data\Microsoft\Installer\{E467A03B-C374-4EB8-A4AC-A3D9F807C6CF}\ARPPRODUCTICON.exe
2010-08-04 20:51 . 2010-08-04 20:51 444952 -c--a-w- c:\windows\system32\wrap_oal.dll
2010-08-04 20:51 . 2010-08-04 20:51 109080 -c--a-w- c:\windows\system32\OpenAL32.dll
2010-08-04 20:50 . 2010-08-04 20:50 -------- dc-h--r- c:\documents and settings\Nick\Application Data\SecuROM
2010-08-04 18:10 . 2010-08-04 18:13 -------- dc----w- c:\program files\Neo Geo CD
2010-08-04 15:37 . 2010-05-06 10:41 743424 -c----w- c:\windows\system32\dllcache\iedvtool.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-08-24 15:24 . 2010-08-24 15:24 340 -c--a-w- c:\program files\defogger_enable.log
2010-08-22 23:58 . 2010-08-22 23:58 756 -c--a-w- c:\program files\defogger_disable.log
2010-08-22 06:07 . 2010-06-21 00:20 -------- dc----w- c:\program files\Cheat Engine
2010-08-15 22:08 . 2010-05-25 04:46 -------- dc----w- c:\documents and settings\Nick\Application Data\BitTorrent
2010-08-07 22:46 . 2010-06-03 04:42 -------- dc----w- c:\program files\CCleaner
2010-08-04 22:35 . 2004-08-04 10:00 163644 -c--a-w- c:\windows\system32\drivers\secdrv.sys
2010-07-24 21:40 . 2010-05-12 17:20 1183 -c--a-w- C:\debug.fz10.reg
2010-07-21 01:52 . 2010-04-27 23:18 -------- dc----w- c:\program files\Playstation With Cheats
2010-07-21 01:52 . 2010-04-27 23:18 -------- dc----w- c:\program files\Playstaion Without Cheats
2010-07-21 01:50 . 2010-07-21 01:50 -------- dc----w- c:\program files\Nintendo Color Game Boy
2010-07-17 20:21 . 2010-07-17 20:21 -------- dc----w- c:\program files\7-Zip
2010-07-10 02:49 . 2010-07-04 04:09 -------- dc----w- c:\program files\Windows Media Connect 2
2010-07-04 14:49 . 2010-07-04 14:49 -------- dc----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2010-06-14 14:30 . 2009-10-06 03:05 743936 -c--a-w- c:\windows\pchealth\helpctr\binaries\helpsvc.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-06-10 13758464]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-04-12 22:46 1135912 -c--a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Lycosa]
2007-11-20 23:53 147456 -c--a-w- c:\program files\Razer\Lycosa\razerhid.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-04 08:06 1667584 -c----w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2009-06-10 15:28 13758464 -c--a-w- c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2009-06-10 15:28 86016 -c--a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
2009-06-10 15:29 1657376 -c--a-w- c:\windows\system32\nwiz.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-02-18 18:43 248040 -c--a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
2010-03-09 02:52 15872 -c--a-w- c:\program files\Unlocker\UnlockerAssistant.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"upnphost"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"JavaQuickStarterService"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=

R0 a347scsi;a347scsi;c:\windows\system32\drivers\a347scsi.sys [5/12/2010 10:16 AM 5248]
R1 hwinterface;hwinterface;c:\windows\system32\drivers\hwinterface.sys [5/12/2010 10:04 AM 3026]
R3 LycoFltr;Lycosa Keyboard;c:\windows\system32\drivers\Lycosa.sys [10/6/2009 1:31 PM 16128]
S4 a347bus;a347bus;c:\windows\system32\drivers\a347bus.sys [5/12/2010 10:16 AM 160640]
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-08-24 16:42
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-746137067-630328440-725345543-1004\Software\SecuROM\License information*]
"datasecu"=hex:62,a4,e0,75,31,0b,cf,e7,d2,48,17,aa,0a,b8,5e,ba,74,94,f9,7f,9e,
99,ad,53,86,c4,9d,c8,26,9b,99,05,e9,1c,4d,1e,d8,e6,70,50,57,6f,4c,eb,da,8b,\
"rkeysecu"=hex:29,23,be,84,e1,6c,d6,ae,52,90,49,f1,f1,bb,e9,eb
.
Completion time: 2010-08-24 16:43:35
ComboFix-quarantined-files.txt 2010-08-24 23:43
ComboFix2.txt 2010-08-23 14:24

Pre-Run: 5,597,306,880 bytes free
Post-Run: 5,587,603,456 bytes free

- - End Of File - - 1BC8AED73A2C5D7D8EB5FF29397AA453

Edited by RealNoob, 24 August 2010 - 04:45 PM.


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:50 PM

Posted 24 August 2010 - 04:45 PM

Ok please run the script for me


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:50 PM

Posted 24 August 2010 - 07:16 PM

I already did primo gracias por tu help ok vamos y vivar mi log

F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\3866D77Dd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\863FE8B4d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\91BDEC94d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\B9A15D40d01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\D569924Fd01 HTML/Iframe.B.Gen virus
F:\Documents and Settings\Nick\Local Settings\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\Cache(2)\E95D2C0Bd01 HTML/Iframe.B.Gen virus
F:\WINDOWS\boot.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\command.win a variant of Win32/VB.NFY trojan
F:\WINDOWS\system.win a variant of Win32/VB.NFY trojan

Edited by RealNoob, 24 August 2010 - 11:06 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users