Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

BZub Trojan and more


  • This topic is locked This topic is locked
3 replies to this topic

#1 Ms.XXXXXXXXXXXXXXX

Ms.XXXXXXXXXXXXXXX

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:15 PM

Posted 17 September 2010 - 01:06 PM

Hello,

I will start from the beginning so you understand the full story.

Some time Memorial Day weekend I got hit with loads of malware; meaning rootkits, keylogger(s), virus, Trojans, worms. Thanks to (my niece and nephew) this I have had Identity Theft and three email accounts stolen. I contacted my bank etc. and filed a police report. I new malware was on this computer but nothing I had detected it. I was at the time running Avast (paid), Malwarebytes, Super Antispyware and every online scanner I could get my hands on.

So I installed Emsisoft AntiMalware (first week of June) and it detected 9 Trojans, rootkits 2, keylogger(s), etc but it could not remove all that so I have reinstalled windows 3 times since and the stuff is still here. I have two internal drives that had kazillions of folders where they were hiding. I have deleted 99.9 of the folders and the only thing that is left is text files and .exe's. I'm trying to give them no place to hide. I found a lot of the malwares folders and info hid inside my files on the internal drive so I deleted them as I found them.

Then I decide to install OutPost 7.0 (paid) and the spyware scanner found BZub Trojan and could not remove it. It's been on going and I came here because you guys seem to have the most advanced tools. I'm worried that some of this stuff is in the MBR. I use Dban to wipe my disk but I found out it doesn't do track zero and there was two other things it did not do (but I don't remember what exactly it was) anyway it was important and vital to wiping the disk. Also, there is a entry in spyware blaster that I cannot enable (restricted sites for IE) thanks to the malware. I found what entry it was and wrote the info down maybe it can help you in some way. It's called Cimuz.Bu {73364D99-1240-4dff-B12A-67E448373148}.

I have two 500gig drives, one is the C drive and one is a internal drive and I compared the sizes of the disk and it's off slightly. Could there be a hidden partition some where? I will try to upload screen shots of the disk so you can see for yourself.

I tired of being a prisoner on my own computer and came here for one last shot. Since this has happened I have been using a Linux Live CD to do my banking and I will keep doing that because I will never trust windows again. It sure left a bad taste in my mouth. I'm sorry, but I didn't know what else to do. Them kids will never ever use my computer again. I showed them how to use sandboxie but I guess they decided to do what they wanted; which I never thought they would do something like that.

I have three logs for you DDS.txt, Attach.txt, and Gmer. I'm using Vista Ultimate 32bit SP2.

Thanks for listening. I can't seem to find a way to upload the Attach.zip file.



DDS (Ver_10-03-17.01) - NTFSx86
Run by Cindarella at 12:42:37.22 on Fri 09/17/2010
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_21
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}

============== Running Processes ===============


============== Pseudo HJT Report ===============

BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [SandboxieControl] "c:\program files\sandboxie\SbieCtrl.exe"
mRun: [Shadow Defender Daemon] "c:\program files\shadow defender\DefenderDaemon.exe" /Auto
mRun: [ISR_MONITOR] c:\$isr\$app\ISRMonitor.exe
mRun: [a-squared] "c:\program files\emsisoft anti-malware\a2guard.exe" /d=60
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [OutpostMonitor] "c:\progra~1\agnitum\outpos~1\op_mon.exe" /tray /noservice
mRun: [OutpostFeedBack] "c:\program files\agnitum\outpost firewall pro\feedback.exe" /dump:os_startup
mRun: [TrojanScanner] c:\program files\trojan remover\Trjscan.exe /boot
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-explorer: EnableShellExecuteHooks = 1 (0x1)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
TCP: {A5BF5438-339D-40F1-AB2D-C7432D2D72B7} = 74.118.212.1,74.118.212.2
SEH: {4F07DA45-8170-4859-9B5F-037EF2970034} - No File
mASetup: {7070D8E0-650A-46b3-B03C-9497582E6A74} - %SystemRoot%\system32\soundschemes.exe /AddRegistration
mASetup: {B3688A53-AB2A-4b1d-8CEF-8F93D8C51C24} - %SystemRoot%\system32\soundschemes2.exe /AddRegistration

================= FIREFOX ===================

FF - ProfilePath - c:\users\cindar~1\appdata\roaming\mozilla\firefox\profiles\yd4jcaw2.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.bing.com/search?FORM=DCF1DF&PC=DCF1&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?FORM=DCF1DF&PC=DCF1&q=
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPDFXCviewNPPlugin.dll
FF - plugin: c:\program files\tracker software\pdf viewer\npPDFXCviewNPPlugin.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.lu", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.nu", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.nz", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--p1ai", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbayh7gpa", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.tel", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.proxy.type", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.buffer.cache.count", 24);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.buffer.cache.size", 4096);
c:\program files\mozilla firefox\greprefs\all.js - pref("dom.ipc.plugins.timeoutSecs", 45);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("accelerometer.enabled", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.nptest.dll", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npswf32.dll", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npctrl.dll", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npqtplugin.dll", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2010-09-17 16:04:53 77312 ----a-w- c:\windows\system32\ztvunace26.dll
2010-09-17 16:04:53 75264 ----a-w- c:\windows\system32\unacev2.dll
2010-09-17 16:04:53 69632 ----a-w- c:\windows\system32\ztvcabinet.dll
2010-09-17 16:04:53 162304 ----a-w- c:\windows\system32\ztvunrar36.dll
2010-09-17 16:04:53 153088 ----a-w- c:\windows\system32\UNRAR3.dll
2010-09-17 16:04:52 0 d-----w- c:\users\cindar~1\appdata\roaming\Simply Super Software
2010-09-17 16:04:52 0 d-----w- c:\programdata\Simply Super Software
2010-09-17 16:04:52 0 d-----w- c:\program files\Trojan Remover
2010-09-15 23:08:23 502272 ----a-w- c:\windows\system32\usp10.dll
2010-09-15 23:08:22 128000 ----a-w- c:\windows\system32\spoolsv.exe
2010-09-15 23:08:20 317952 ----a-w- c:\windows\system32\MP4SDECD.DLL
2010-09-15 23:08:04 739328 ----a-w- c:\windows\system32\inetcomm.dll
2010-09-12 13:45:40 0 d-----w- c:\programdata\Tracker Software
2010-09-04 12:15:15 0 d-----w- c:\program files\House Call
2010-09-03 06:49:12 0 d-----w- c:\users\cindar~1\appdata\roaming\Runscanner.net
2010-09-03 03:37:37 0 d-----w- c:\program files\SpywareBlaster
2010-09-02 08:51:10 0 d-----w- c:\programdata\PC Tools
2010-09-02 04:54:25 713672 ----a-w- c:\windows\system32\drivers\SandBox.sys
2010-09-02 04:54:20 328296 ----a-w- c:\windows\system32\drivers\afwcore.sys
2010-09-02 04:53:57 49 ----a-w- c:\windows\transp.gif
2010-09-02 04:53:56 34920 ----a-w- c:\windows\system32\drivers\afw.sys
2010-09-02 04:53:55 0 d-----w- c:\windows\system32\Filt
2010-09-02 04:53:55 0 d-----w- c:\program files\Agnitum
2010-09-02 04:52:51 0 d-----w- c:\programdata\Agnitum
2010-09-02 03:12:00 0 d-----w- c:\users\cindar~1\appdata\roaming\SUPERAntiSpyware.com
2010-09-02 03:12:00 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-09-02 03:11:46 0 d-----w- c:\program files\SUPERAntiSpyware
2010-09-01 11:47:54 0 d-----w- c:\users\cindar~1\appdata\roaming\XnView
2010-09-01 11:44:05 0 d-----w- c:\program files\XnView
2010-08-31 14:26:59 0 d-sh--w- C:\$RECYCLE.BIN
2010-08-31 13:42:06 0 d-----w- c:\program files\VideoLAN
2010-08-28 19:33:59 974848 ----a-w- c:\windows\system32\mfc70.dll
2010-08-28 19:33:59 487424 ----a-w- c:\windows\system32\msvcp70.dll
2010-08-28 19:33:59 344064 ----a-w- c:\windows\system32\msvcr70.dll
2010-08-28 19:33:58 24576 ----a-w- c:\windows\system32\msxml3a.dll
2010-08-28 19:33:58 1700352 ----a-w- c:\windows\system32\GdiPlus.dll
2010-08-26 22:17:04 53 ----a-w- c:\windows\wininit.ini
2010-08-24 22:41:25 0 d-----w- c:\users\cindar~1\appdata\roaming\Pocomail
2010-08-24 22:38:52 0 d-----w- c:\program files\Pocomail4
2010-08-23 02:08:52 0 d-----w- c:\program files\Sandboxie
2010-08-21 23:12:41 0 d-----w- c:\program files\MAIL

==================== Find3M ====================

2010-09-17 13:57:23 35381 ----a-w- c:\programdata\nvModes.dat
2010-09-15 22:52:47 16968 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-09-02 04:54:23 86016 ----a-w- c:\windows\inf\infstrng.dat
2010-09-02 04:54:23 86016 ----a-w- c:\windows\inf\infstor.dat
2010-09-02 04:54:23 51200 ----a-w- c:\windows\inf\infpub.dat
2010-08-10 23:02:58 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
2010-07-17 09:00:04 423656 ----a-w- c:\windows\system32\deployJava1.dll
2010-06-29 15:47:12 834048 ----a-w- c:\windows\system32\wininet.dll
2010-06-28 16:13:32 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-06-21 13:37:03 2037760 ----a-w- c:\windows\system32\win32k.sys
2010-06-13 04:57:20 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-06-13 04:20:29 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:40:37 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:40:37 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:40:37 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:40:37 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat

============= FINISH: 12:43:55.56 ===============




GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-09-17 13:00:35
Windows 6.0.6002 Service Pack 2
Running: gmer.exe; Driver: C:\Users\CINDAR~1\AppData\Local\Temp\fgldipow.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwAllocateVirtualMemory [0x9099CFE0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwAlpcConnectPort [0x9099D460]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwAlpcSendWaitReceivePort [0x9099D6F0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwAssignProcessToJobObject [0x9099CF10]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwClose [0x9099B0E0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwConnectPort [0x9099D280]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateFile [0x9099AAB0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateKey [0x9099B490]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateProcess [0x9099C3B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateProcessEx [0x9099C4A0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateSection [0x9099A6E0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateSymbolicLinkObject [0x9099B3B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateThread [0x9099C1F0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwDebugActiveProcess [0x9099D8B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwDeleteKey [0x9099B650]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwDeleteValueKey [0x9099BF80]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwEnumerateKey [0x9099B710]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwEnumerateValueKey [0x9099B7F0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwFsControlFile [0x9099A9C0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwLoadDriver [0x9099F900]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwMakeTemporaryObject [0x9099B2F0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwOpenFile [0x9099AF40]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwOpenKey [0x9099B580]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwOpenProcess [0x9099C790]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwOpenSection [0x9099A7B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwOpenThread [0x9099C690]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwProtectVirtualMemory [0x9099D1A0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwQueryKey [0x9099B8D0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwQueryValueKey [0x9099B9B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwQueueApcThread [0x9099CE40]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwRenameKey [0x9099BEB0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwReplaceKey [0x9099BB70]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwRequestPort [0x9099D550]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwRequestWaitReplyPort [0x9099D620]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwRestoreKey [0x9099BDE0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSaveKey [0x9099BC40]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSaveKeyEx [0x9099BD10]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSecureConnectPort [0x9099D370]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSetContextThread [0x9099CD50]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSetInformationDebugObject [0x9099D980]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSetSecurityObject [0x9099DA80]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSetSystemInformation [0x9099C060]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSetValueKey [0x9099BA90]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSuspendProcess [0x9099CBA0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSuspendThread [0x9099CC60]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwSystemDebugControl [0x9099D7D0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwTerminateProcess [0x9099C890]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwTerminateThread [0x9099CA50]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwUnloadDriver [0x9099C130]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwWriteFile [0x9099A8B0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwWriteVirtualMemory [0x9099D0C0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateThreadEx [0x9099C2D0]
SSDT \??\C:\Windows\system32\drivers\SandBox.sys ZwCreateUserProcess [0x9099C5A0]

Code 8C265BFC ZwTraceEvent
Code 8C265BFB NtTraceEvent

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!NtTraceEvent 81C62376 5 Bytes JMP 8C265C00
.text ntkrnlpa.exe!KeSetEvent + 131 81CE3894 4 Bytes [E0, CF, 99, 90] {LOOPNZ 0xffffffffffffffd1; CDQ ; NOP }
.text ntkrnlpa.exe!KeSetEvent + 13D 81CE38A0 4 Bytes [60, D4, 99, 90] {PUSHA ; AAM 0x99; NOP }
.text ntkrnlpa.exe!KeSetEvent + 181 81CE38E4 4 Bytes [F0, D6, 99, 90]
.text ntkrnlpa.exe!KeSetEvent + 191 81CE38F4 4 Bytes [10, CF, 99, 90] {ADC BH, CL; CDQ ; NOP }
.text ntkrnlpa.exe!KeSetEvent + 1A9 81CE390C 4 Bytes [E0, B0, 99, 90] {LOOPNZ 0xffffffffffffffb2; CDQ ; NOP }
.text ...
.reloc C:\Windows\SYSTEM32\drivers\diskpt.sys section is executable [0x807A7400, 0x157C8, 0xE0000060]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Emsisoft Anti-Malware\a2service.exe[1920] kernel32.dll!CreateThread + 1A 7694C928 4 Bytes CALL 00455589 C:\Program Files\Emsisoft Anti-Malware\a2service.exe (Emsisoft Anti-Malware Service/Emsi Software GmbH)
.text C:\PROGRA~1\Agnitum\OUTPOS~1\acs.exe[1988] kernel32.dll!SetUnhandledExceptionFilter 7692A84F 5 Bytes JMP 005EBE00 C:\PROGRA~1\Agnitum\OUTPOS~1\acs.exe (Agnitum Outpost Service/Agnitum Ltd.)
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 28, 00] {OR AL, [EAX]; SUB [EAX], AL}
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Users\Cindarella\Desktop\gmer\gmer.exe[2456] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 1E, 00]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] WS2_32.dll!connect 76B140D9 6 Bytes JMP 71790F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] WS2_32.dll!WSALookupServiceNextW 76B1455D 6 Bytes JMP 717F0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] WS2_32.dll!WSALookupServiceBeginW 76B14E93 6 Bytes JMP 71820F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] WS2_32.dll!WSALookupServiceEnd 76B15564 6 Bytes JMP 717C0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2788] WS2_32.dll!listen 76B18CD7 6 Bytes JMP 71760F5A
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Windows\system32\taskeng.exe[3640] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 7A, 00] {OR AL, [EAX]; JP 0x4}
.text C:\Windows\system32\taskeng.exe[3640] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Windows\system32\taskeng.exe[3640] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Windows\system32\taskeng.exe[3640] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Windows\system32\taskeng.exe[3640] WS2_32.dll!connect 76B140D9 6 Bytes JMP 717F0F5A
.text C:\Windows\system32\taskeng.exe[3640] WS2_32.dll!WSALookupServiceNextW 76B1455D 6 Bytes JMP 71760F5A
.text C:\Windows\system32\taskeng.exe[3640] WS2_32.dll!WSALookupServiceBeginW 76B14E93 6 Bytes JMP 71790F5A
.text C:\Windows\system32\taskeng.exe[3640] WS2_32.dll!WSALookupServiceEnd 76B15564 6 Bytes JMP 71820F5A
.text C:\Windows\system32\taskeng.exe[3640] WS2_32.dll!listen 76B18CD7 6 Bytes JMP 717C0F5A
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Windows\system32\Dwm.exe[3652] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 17, 00]
.text C:\Windows\system32\Dwm.exe[3652] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Windows\system32\Dwm.exe[3652] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Windows\system32\Dwm.exe[3652] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Windows\system32\Dwm.exe[3652] WS2_32.dll!connect 76B140D9 6 Bytes JMP 71790F5A
.text C:\Windows\system32\Dwm.exe[3652] WS2_32.dll!WSALookupServiceNextW 76B1455D 6 Bytes JMP 717F0F5A
.text C:\Windows\system32\Dwm.exe[3652] WS2_32.dll!WSALookupServiceBeginW 76B14E93 6 Bytes JMP 71820F5A
.text C:\Windows\system32\Dwm.exe[3652] WS2_32.dll!WSALookupServiceEnd 76B15564 6 Bytes JMP 717C0F5A
.text C:\Windows\system32\Dwm.exe[3652] WS2_32.dll!listen 76B18CD7 6 Bytes JMP 71760F5A
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Windows\Explorer.EXE[3712] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 19, 00] {OR AL, [EAX]; SBB [EAX], EAX}
.text C:\Windows\Explorer.EXE[3712] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Windows\Explorer.EXE[3712] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Windows\Explorer.EXE[3712] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[3712] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Windows\Explorer.EXE[3712] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Windows\Explorer.EXE[3712] WS2_32.dll!connect 76B140D9 6 Bytes JMP 71790F5A
.text C:\Windows\Explorer.EXE[3712] WS2_32.dll!WSALookupServiceNextW 76B1455D 6 Bytes JMP 717F0F5A
.text C:\Windows\Explorer.EXE[3712] WS2_32.dll!WSALookupServiceBeginW 76B14E93 6 Bytes JMP 71820F5A
.text C:\Windows\Explorer.EXE[3712] WS2_32.dll!WSALookupServiceEnd 76B15564 6 Bytes JMP 717C0F5A
.text C:\Windows\Explorer.EXE[3712] WS2_32.dll!listen 76B18CD7 6 Bytes JMP 71760F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 3A, 00] {OR AL, [EAX]; CMP AL, [EAX]}
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Program Files\Shadow Defender\DefenderDaemon.exe[3828] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 2A, 00] {OR AL, [EAX]; SUB AL, [EAX]}
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\$ISR\$APP\ISRMonitor.exe[3852] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\$ISR\$APP\ISRMonitor.exe[3852] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Program Files\Emsisoft Anti-Malware\a2guard.exe[3864] kernel32.dll!CreateThread + 1A 7694C928 4 Bytes CALL 00455EC5 C:\Program Files\Emsisoft Anti-Malware\a2guard.exe (Background Guard/Emsi Software GmbH)
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [87, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [8D, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [84, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [8A, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [90, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 3B, 00] {OR AL, [EAX]; CMP EAX, [EAX]}
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 71940F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 71970F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 719D0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 71A30F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 719A0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 71A00F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!mouse_event 763A044E 6 Bytes JMP 71AC0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!SendInput + 4 763A2F79 2 Bytes [A5, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3876] USER32.dll!keybd_event 763CD972 6 Bytes JMP 71A90F5A
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!LdrLoadDll 77A99390 5 Bytes JMP 00606BC4 C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe (Outpost User Interface/Agnitum Ltd.)
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtCreateFile 77AD43D4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtCreateFile + 4 77AD43D8 2 Bytes [78, 71] {JS 0x73}
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtDeleteValueKey 77AD47F4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtDeleteValueKey + 4 77AD47F8 2 Bytes [7E, 71] {JLE 0x73}
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtOpenFile 77AD4BB4 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtOpenFile + 4 77AD4BB8 2 Bytes [75, 71] {JNZ 0x73}
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtOpenProcess 77AD4C34 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtOpenProcess + 4 77AD4C38 2 Bytes [7B, 71] {JNP 0x73}
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtSetValueKey 77AD5454 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ntdll.dll!NtSetValueKey + 4 77AD5458 2 Bytes [81, 71]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] kernel32.dll!LoadLibraryExW + 248 76929351 4 Bytes [0A, 00, 3E, 00]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] kernel32.dll!SetUnhandledExceptionFilter 7692A84F 5 Bytes JMP 00606B00 C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe (Outpost User Interface/Agnitum Ltd.)
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SetWindowsHookExA 76376322 5 Bytes JMP 00606B6C C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe (Outpost User Interface/Agnitum Ltd.)
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SetWindowsHookExW 763787AD 5 Bytes JMP 00606B98 C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe (Outpost User Interface/Agnitum Ltd.)
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!EnableWindow 7637CD8B 5 Bytes JMP 026FD8FC C:\Program Files\Agnitum\Outpost Firewall Pro\op_cmn.dll (Outpost Common Controls Library/Agnitum Ltd.)
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!PostMessageA 7637F8F8 6 Bytes JMP 718D001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SendMessageA 7637F956 6 Bytes JMP 7193001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!PostMessageW 7638A175 6 Bytes JMP 718A001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SendMessageW 76390AED 6 Bytes JMP 7190001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!mouse_event 763A044E 6 Bytes JMP 719C001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SendInput 763A2F75 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!SendInput + 4 763A2F79 2 Bytes [96, 71]
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] USER32.dll!keybd_event 763CD972 6 Bytes JMP 7199001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ADVAPI32.dll!CreateServiceW 76459EB4 6 Bytes JMP 7184001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] ADVAPI32.dll!CreateServiceA 764972A1 6 Bytes JMP 7187001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] WS2_32.dll!connect 76B140D9 6 Bytes JMP 71AE001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] WS2_32.dll!WSALookupServiceNextW 76B1455D 6 Bytes JMP 71A2001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] WS2_32.dll!WSALookupServiceBeginW 76B14E93 6 Bytes JMP 71A5001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] WS2_32.dll!WSALookupServiceEnd 76B15564 6 Bytes JMP 719F001E
.text C:\Program Files\Agnitum\Outpost Firewall Pro\op_mon.exe[3888] WS2_32.dll!listen 76B18CD7 6 Bytes JMP 71A8001E

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs diskpt.sys (Shadow Defender Filter Driver/SHADOWDEFENDER.COM)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 diskpt.sys (Shadow Defender Filter Driver/SHADOWDEFENDER.COM)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 diskpt.sys (Shadow Defender Filter Driver/SHADOWDEFENDER.COM)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 diskpt.sys (Shadow Defender Filter Driver/SHADOWDEFENDER.COM)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \Driver\nsiproxy \Device\Nsi afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

---- EOF - GMER 1.0.15 ----




BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:15 PM

Posted 25 September 2010 - 03:16 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.
  1. Do not run any other tool untill instructed to do so!
  2. Please Do not Attach logs or put in code boxes.
  3. Tell me about any problems that have occurred during the fix.
  4. Tell me of any other symptoms you may be having as these can help also.
  5. Do not run anything while running a fix.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:
    Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
    • The application window will appear
    • Click the Disable button to disable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger may ask you to reboot the machine, if it does - click OK
    Do not re-enable these drivers until otherwise instructed.

Download DDS:
    Please download DDS by sUBs from one of the links below and save it to your desktop:


    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.
    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
      • DDS.txt
      • Attach.txt
    • A window will open instructing you save & post the logs
    • Save the logs to a convenient place such as your desktop
    • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


information and logs:
    In your next post I need the following
      1.logs from DDS
      2.log from RKUnHooker
      3.let me know of any problems you may have had

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:15 PM

Posted 27 September 2010 - 11:13 PM

Hello

three day bump

It has been Three days since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:15 PM

Posted 01 October 2010 - 12:54 AM

Due to lack of feedback, this topic is now Closed

If you need this topic reopened, please send me a PM.
Please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic.

The fixes and advice in this thread are for this machine only.
Do not apply the instructions from this thread to your own machine.
Please start a new thread describing your issue and someone will be along to assist you.


With Regards,
Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users