Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with unknown entity--maybe BetterInternet?


  • This topic is locked This topic is locked
22 replies to this topic

#1 Greg10

Greg10

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 28 September 2010 - 08:50 PM

Recently started having problems with web browsing. Kept getting re-directed to websites I hadn't chosen when doing Google (or Yahoo) searches. Some of these sites were listed as dangerous, and blocked by my Webroot Spy Sweeper, others were just odd and unrelated to my search (Realtor.com, etc).

I was still using IE 7, so first tried upgrading to IE 8, but that made no difference. I have Norton 360, and Spy Sweeper. Norton hasn't detect anything but a few Tracking Cookies. Spy Sweeper recently detected a couple threats: Trojan dermoDNS, Fakealert.gen, and Rogue Security Products--says it successfully quarantined all these.

Spy Sweeper is now blocked from getting updates--can't find my internet access, even though I am obviously still connected. Tried turning off Norton's Firewall, and that made no difference--Spy Sweeper still couldn't connect (but Norton can...).

Since I was still having the problem, and my Anti-virus/spyware programs were unable to find the cause, I downloaded Ad-Aware. It found Win32.Adware.ABetterInternet. It Quarantined this, but said it might be tough to get rid of. Ad-Aware is also blocked from getting updates (just like Spy Sweeper).

Found and downloaded Symantec's BetterInternet Removal Tool 1.1.3--'Fix Binet'. This had a lot (about 40-50) R 6034 error codes when it ran. Finally got past those, it ran, and said I didn't have Binet:

Symantec Adware.BetterInternet Removal Tool 1.1.3


C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\SRTSP\Quarantine: (not scanned)
C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\SRTSP\SrtETmp: (not scanned)
C:\System Volume Information: (not scanned)
D:\System Volume Information: (not scanned)
K:\System Volume Information: (not scanned)
Adware.BetterInternet has not been found on your computer.


I looked up what the R 6034 code was, and found it was related to registry errors. Downloaded Registry Booster by Uniblue, and fixed over 1,000 errors, but still get the multiple R 6034 codes with Fix Binet.

So now I'm here at BleepingComputer and hoping you can help. The DDS.txt log is copied below.

I can't get the GMER program to scan successfully. Half the time I get Blue-screened with the message 'Problem caused by kwdoapob.sys. The other half of the time my computer freezes up and the scan never gets completed. My computer does have some 'issues'. A couple years ago the PCI-E slot went bad, and I had to get an AGP slot graphics card to get the computer working again. Since that time I have had fairly frequent lock-ups, so not sure this is a problem with GMER, or just with my computer.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Gregory Morse at 22:36:51.81 on Sat 09/25/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.116 [GMT -4:00]

AV: Norton 360 *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
AV: Norton 360 *On-access scanning enabled* (Updated) {A5F1BC7C-EA33-4247-961C-0217208396C4}
FW: Norton 360 *enabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
FW: Norton 360 *enabled* {371C0A40-5A0C-4AD2-A6E5-69C02037FBF3}

============== Running Processes ===============

C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Norton 360\Norton 360\Engine\3.8.0.41\ccSvcHst.exe
C:\Program Files\Norton Ghost\Agent\VProSvc.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Norton 360\Norton 360\Engine\3.8.0.41\ccSvcHst.exe
C:\Program Files\Uniblue\RegistryBooster\rbmonitor.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\WINDOWS\system32\CTHELPER.EXE
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Acertant\TuneRanger\TuneRangerHelper.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Money\System\mnyexpr.exe
C:\Program Files\DellSupport\DSAgnt.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\ArcSoft\TotalMedia Backup & Record\uBBMonitor.exe
C:\Program Files\Uniblue\RegistryBooster\registrybooster.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\PROGRA~1\HEWLET~1\HPSHAR~1\hpgs2wnf.exe
C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Cobian Backup 8\Cobian.exe
C:\Program Files\Cobian Backup 8\cbInterface.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Gregory Morse\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.roadrunner.com/
uInternet Settings,ProxyOverride = *.local
mWinlogon: Userinit=c:\windows\system32\userinit.exe
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton 360\norton 360\engine\3.8.0.41\coIEPlg.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.6.5612.1312\swg.dll
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton 360\norton 360\engine\3.8.0.41\coIEPlg.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [ctfmon.exe] "c:\windows\system32\ctfmon.exe"
uRun: [MoneyAgent] "c:\program files\microsoft money\system\mnyexpr.exe"
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRunOnce: [RegistryBooster] "c:\program files\uniblue\registrybooster\launcher.exe" -w
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [Norton Ghost 10.0] "c:\program files\norton ghost\agent\GhostTray.exe"
mRun: [IAAnotif] "c:\program files\intel\intel matrix storage manager\iaanotif.exe"
mRun: [ehTray] "c:\windows\ehome\ehtray.exe"
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [DeviceDiscovery] "c:\program files\hewlett-packard\digital imaging\bin\hpotdd01.exe"
mRun: [CTSysVol] "c:\program files\creative\sbaudigy2zs\surround mixer\CTSysVol.exe" /r
mRun: [CTHelper] "c:\windows\system32\CTHELPER.EXE"
mRun: [CTDVDDET] "c:\program files\creative\sbaudigy2zs\dvdaudio\CTDVDDET.EXE"
mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"
mRun: [dla] "c:\windows\system32\dla\tfswctrl.exe"
mRun: [TuneRanger] "c:\program files\acertant\tuneranger\TuneRangerHelper.exe"
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [dellsupportcenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P dellsupportcenter
mRun: [KernelFaultCheck] "c:\windows\system32\dumprep.exe" 0 -k
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [SpySweeper] "c:\program files\webroot\spy sweeper\SpySweeperUI.exe" /startintray
StartupFolder: c:\documents and settings\gregory morse\start menu\programs\startup\PowerReg Scheduler.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\totalm~1.lnk - c:\program files\arcsoft\totalmedia backup & record\uBBMonitor.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\progra~1\yahoo!\messen~1\YPager.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {01111C00-3E00-11D2-8470-0060089874ED} - hxxp://help.rr.com/Foundrysdccommon/download/tgctlar.cab
DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} - file:///C:/Program%20Files/Mystery%20Case%20Files%20-%20Madame%20Fate/Images/stg_drm.ocx
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
DPF: {1C11B948-582A-433F-A98D-A8C4D5CC64F2} - hxxp://kitchenplanner.ikea.com/US/Core/Player/2020PlayerAX_Win32.cab
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc3.cab
DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} - hxxps://webdl.symantec.com/activex/symdlmgr.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1148127061625
DPF: {7FE26BE2-B923-4B41-9834-E84DA1CC1F96} - hxxp://vsp.closetmaid.com/vsp/cmaidctl_vsp.closetmaid.com_downloader.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} - file:///C:/Program%20Files/Mystery%20Case%20Files%20-%20Madame%20Fate/Images/armhelper.ocx
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://zone.msn.com/bingame/zuma/default/popcaploader_v6.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: {8527B4E3-708C-4AAD-92A6-E98266657602} = 93.188.163.68,93.188.166.7
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton 360\norton 360\engine\3.8.0.41\CoIEPlg.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-9-23 64288]
R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [2008-10-2 29808]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\n360\0308000.029\SymEFA.sys [2010-1-27 310320]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\n360\0308000.029\BHDrvx86.sys [2010-1-27 259632]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\n360\0308000.029\cchpx86.sys [2010-1-27 482432]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2008-2-18 149352]
R2 ccProxy;Symantec Network Proxy;c:\program files\common files\symantec shared\CCPROXY.EXE [2007-3-14 214376]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2008-2-18 149352]
R2 io.sys;IO.DLL Driver;c:\windows\system32\drivers\io.sys [2006-9-25 5152]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-8-12 1355416]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R2 N360;Norton 360;c:\program files\norton 360\norton 360\engine\3.8.0.41\ccSvcHst.exe [2010-1-27 117640]
R2 Symantec Core LC;Symantec Core LC;c:\program files\common files\symantec shared\ccpd-lc\symlcsvc.exe [2005-12-9 1245064]
R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\spy sweeper\SpySweeper.exe [2009-11-6 4048240]
R2 WRConsumerService;Webroot Client Service;c:\program files\webroot\spy sweeper\WRConsumerService.exe [2008-11-14 1201640]
R3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\lavasoft\ad-aware\kernexplorer.sys [2010-8-12 15008]
R3 NAVENG;NAVENG;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20100925.003\NAVENG.SYS [2010-9-25 85424]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20100925.003\NAVEX15.SYS [2010-9-25 1362608]
S1 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20100924.001\IDSXpx86.sys [2010-9-25 331640]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-18 135664]
S3 ccPwdSvc;Symantec Password Validation;c:\program files\common files\symantec shared\CCPWDSVC.EXE [2005-3-15 83560]
S3 COH_Mon;COH_Mon; [x]
S3 oUltraf;oUltraf; [x]
S3 P0630VID;Creative WebCam Live!;c:\windows\system32\drivers\P0630Vid.sys [2005-12-30 91797]
S3 s3m;s3m;c:\windows\system32\drivers\s3m.sys [2008-9-18 166720]

=============== Created Last 30 ================

2010-09-26 02:35:56 0 ----a-w- c:\documents and settings\gregory morse\defogger_reenable
2010-09-26 00:35:32 0 d-----w- c:\program files\Cobian Backup 8
2010-09-25 14:57:24 0 d-----w- c:\docume~1\gregor~1\applic~1\Auslogics
2010-09-25 14:49:00 0 d-----w- c:\program files\Auslogics
2010-09-25 14:12:34 0 d-----w- c:\docume~1\gregor~1\applic~1\Uniblue
2010-09-25 14:02:47 0 d-----w- c:\program files\Uniblue
2010-09-24 06:54:58 15880 ------w- c:\windows\system32\lsdelete.exe
2010-09-24 01:59:38 64288 ------w- c:\windows\system32\drivers\Lbd.sys
2010-09-24 01:21:43 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{ECC164E0-3133-4C70-A831-F08DB2940F70}
2010-09-24 01:20:46 0 d-----w- c:\program files\Lavasoft
2010-09-23 22:47:12 0 d-sh--w- c:\documents and settings\gregory morse\IECompatCache
2010-09-23 22:44:19 0 d-sh--w- c:\documents and settings\gregory morse\PrivacIE
2010-09-23 22:39:35 0 d-sh--w- c:\documents and settings\gregory morse\IETldCache
2010-09-23 02:00:57 0 dc-h--w- c:\windows\ie8
2010-09-19 16:50:47 3248 ------w- c:\windows\system32\wbem\Outlook_01cb581aced4570c.mof
2010-09-13 19:34:06 0 d-----w- c:\program files\iPod
2010-09-13 19:33:46 0 d-----w- c:\program files\iTunes
2010-09-08 21:19:21 0 d-----w- c:\windows\system32\20-20 Technologies
2010-09-03 18:58:28 0 d-----w- c:\program files\Western Digital Technologies
2010-09-02 19:56:08 0 d-----w- C:\family reunion

==================== Find3M ====================

2010-09-22 04:25:33 43520 ------w- c:\windows\system32\CmdLineExt03.dll
2010-08-25 13:54:51 4184 --sh--w- c:\windows\system32\KGyGaAvL.sys
2010-07-27 06:30:35 8462336 ------w- c:\windows\system32\dllcache\shell32.dll
2010-06-30 12:31:35 149504 ------w- c:\windows\system32\schannel.dll
2010-06-30 12:31:35 149504 ------w- c:\windows\system32\dllcache\schannel.dll
2008-09-25 05:48:00 32768 --sh--w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008092520080926\index.dat

============= FINISH: 22:39:29.57 ===============










Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 03 October 2010 - 12:20 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.
  1. Do not run any other tool untill instructed to do so!
  2. Please Do not Attach logs or put in code boxes.
  3. Tell me about any problems that have occurred during the fix.
  4. Tell me of any other symptoms you may be having as these can help also.
  5. Do not run anything while running a fix.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:
    Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
    • The application window will appear
    • Click the Disable button to disable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger may ask you to reboot the machine, if it does - click OK
    Do not re-enable these drivers until otherwise instructed.

Download DDS:
    Please download DDS by sUBs from one of the links below and save it to your desktop:


    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.
    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
      • DDS.txt
      • Attach.txt
    • A window will open instructing you save & post the logs
    • Save the logs to a convenient place such as your desktop
    • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


information and logs:
    In your next post I need the following
      1.logs from DDS
      2.log from RKUnHooker
      3.let me know of any problems you may have had

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 04 October 2010 - 03:48 AM

busy till 10/11
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 08 October 2010 - 11:59 PM

10/11
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Greg10

Greg10
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 10 October 2010 - 12:27 PM

Gringo,

Downloaded and ran RKUnhooker. The Logs you requested are copied below, and the Attach file from DDS is attached. No problems doing this part.

Some further info on my computer problem--the most frequent website it seems to redirect me to is: www.myroitracking.com. Spy Sweeper always blocks this site, saying it's known to be dangerous. Don't know if that provides any clues to what I'm infected with...

Let me know if you need any further info. Thanks,

Greg10


DDS (Ver_10-03-17.01) - NTFSx86
Run by Gregory Morse at 13:02:14.81 on Sun 10/10/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.359 [GMT -4:00]

AV: Norton 360 *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
AV: Norton 360 *On-access scanning enabled* (Updated) {A5F1BC7C-EA33-4247-961C-0217208396C4}
FW: Norton 360 *enabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
FW: Norton 360 *enabled* {371C0A40-5A0C-4AD2-A6E5-69C02037FBF3}

============== Running Processes ===============

C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Common Files\Symantec Shared\ccProxy.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Norton 360\Norton 360\Engine\3.8.0.41\ccSvcHst.exe
C:\Program Files\Norton Ghost\Agent\VProSvc.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\Norton 360\Norton 360\Engine\3.8.0.41\ccSvcHst.exe
C:\Program Files\Uniblue\RegistryBooster\rbmonitor.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\CTHELPER.EXE
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Acertant\TuneRanger\TuneRangerHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Money\System\mnyexpr.exe
C:\Program Files\DellSupport\DSAgnt.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\ArcSoft\TotalMedia Backup & Record\uBBMonitor.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe
C:\PROGRA~1\HEWLET~1\HPSHAR~1\hpgs2wnf.exe
C:\Program Files\Uniblue\RegistryBooster\registrybooster.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Gregory Morse\Desktop\Defogger.exe
C:\Documents and Settings\Gregory Morse\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.roadrunner.com/
uSearch Bar = hxxp://mysearch.myway.com/jsp/dellsidebar.jsp?p=DE
uInternet Settings,ProxyOverride = *.local
mWinlogon: Userinit=c:\windows\system32\userinit.exe
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton 360\norton 360\engine\3.8.0.41\coIEPlg.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.6.5612.1312\swg.dll
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton 360\norton 360\engine\3.8.0.41\coIEPlg.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [ctfmon.exe] "c:\windows\system32\ctfmon.exe"
uRun: [MoneyAgent] "c:\program files\microsoft money\system\mnyexpr.exe"
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [Norton Ghost 10.0] "c:\program files\norton ghost\agent\GhostTray.exe"
mRun: [IAAnotif] "c:\program files\intel\intel matrix storage manager\iaanotif.exe"
mRun: [ehTray] "c:\windows\ehome\ehtray.exe"
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [DeviceDiscovery] "c:\program files\hewlett-packard\digital imaging\bin\hpotdd01.exe"
mRun: [CTSysVol] "c:\program files\creative\sbaudigy2zs\surround mixer\CTSysVol.exe" /r
mRun: [CTHelper] "c:\windows\system32\CTHELPER.EXE"
mRun: [CTDVDDET] "c:\program files\creative\sbaudigy2zs\dvdaudio\CTDVDDET.EXE"
mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"
mRun: [dla] "c:\windows\system32\dla\tfswctrl.exe"
mRun: [TuneRanger] "c:\program files\acertant\tuneranger\TuneRangerHelper.exe"
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [dellsupportcenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P dellsupportcenter
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [KernelFaultCheck] "c:\windows\system32\dumprep.exe" 0 -k
mRun: [SpySweeper] "c:\program files\webroot\spy sweeper\SpySweeperUI.exe" /startintray
StartupFolder: c:\documents and settings\gregory morse\start menu\programs\startup\PowerReg Scheduler.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\totalm~1.lnk - c:\program files\arcsoft\totalmedia backup & record\uBBMonitor.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\progra~1\yahoo!\messen~1\YPager.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {01111C00-3E00-11D2-8470-0060089874ED} - hxxp://help.rr.com/Foundrysdccommon/download/tgctlar.cab
DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} - file:///C:/Program%20Files/Mystery%20Case%20Files%20-%20Madame%20Fate/Images/stg_drm.ocx
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
DPF: {1C11B948-582A-433F-A98D-A8C4D5CC64F2} - hxxp://kitchenplanner.ikea.com/US/Core/Player/2020PlayerAX_Win32.cab
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc3.cab
DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} - hxxps://webdl.symantec.com/activex/symdlmgr.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1148127061625
DPF: {7FE26BE2-B923-4B41-9834-E84DA1CC1F96} - hxxp://vsp.closetmaid.com/vsp/cmaidctl_vsp.closetmaid.com_downloader.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} - file:///C:/Program%20Files/Mystery%20Case%20Files%20-%20Madame%20Fate/Images/armhelper.ocx
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://zone.msn.com/bingame/zuma/default/popcaploader_v6.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: {8527B4E3-708C-4AAD-92A6-E98266657602} = 93.188.163.68,93.188.166.7
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton 360\norton 360\engine\3.8.0.41\CoIEPlg.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-9-23 64288]
R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [2008-10-2 29808]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\n360\0308000.029\SymEFA.sys [2010-1-27 310320]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\n360\0308000.029\BHDrvx86.sys [2010-1-27 259632]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\n360\0308000.029\cchpx86.sys [2010-1-27 482432]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2008-2-18 149352]
R2 ccProxy;Symantec Network Proxy;c:\program files\common files\symantec shared\CCPROXY.EXE [2007-3-14 214376]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2008-2-18 149352]
R2 io.sys;IO.DLL Driver;c:\windows\system32\drivers\io.sys [2006-9-25 5152]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-8-12 1355416]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R2 N360;Norton 360;c:\program files\norton 360\norton 360\engine\3.8.0.41\ccSvcHst.exe [2010-1-27 117640]
R2 Symantec Core LC;Symantec Core LC;c:\program files\common files\symantec shared\ccpd-lc\symlcsvc.exe [2005-12-9 1245064]
R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\spy sweeper\SpySweeper.exe [2009-11-6 4048240]
R2 WRConsumerService;Webroot Client Service;c:\program files\webroot\spy sweeper\WRConsumerService.exe [2008-11-14 1201640]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-9-26 102448]
R3 NAVENG;NAVENG;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20101010.003\NAVENG.SYS [2010-10-10 86064]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20101010.003\NAVEX15.SYS [2010-10-10 1371184]
S1 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20101008.002\IDSXpx86.sys [2010-9-15 341880]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-18 135664]
S3 ccPwdSvc;Symantec Password Validation;c:\program files\common files\symantec shared\CCPWDSVC.EXE [2005-3-15 83560]
S3 COH_Mon;COH_Mon; [x]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\lavasoft\ad-aware\kernexplorer.sys [2010-8-12 15008]
S3 oUltraf;oUltraf; [x]
S3 P0630VID;Creative WebCam Live!;c:\windows\system32\drivers\P0630Vid.sys [2005-12-30 91797]
S3 s3m;s3m;c:\windows\system32\drivers\s3m.sys [2008-9-18 166720]

=============== Created Last 30 ================

2010-09-26 02:35:56 0 ----a-w- c:\documents and settings\gregory morse\defogger_reenable
2010-09-26 00:35:32 0 d-----w- c:\program files\Cobian Backup 8
2010-09-25 14:57:24 0 d-----w- c:\docume~1\gregor~1\applic~1\Auslogics
2010-09-25 14:49:00 0 d-----w- c:\program files\Auslogics
2010-09-25 14:12:34 0 d-----w- c:\docume~1\gregor~1\applic~1\Uniblue
2010-09-25 14:02:47 0 d-----w- c:\program files\Uniblue
2010-09-24 06:54:58 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-09-24 01:59:38 64288 ------w- c:\windows\system32\drivers\Lbd.sys
2010-09-24 01:21:43 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{ECC164E0-3133-4C70-A831-F08DB2940F70}
2010-09-24 01:20:46 0 d-----w- c:\program files\Lavasoft
2010-09-23 22:47:12 0 d-sh--w- c:\documents and settings\gregory morse\IECompatCache
2010-09-23 22:44:19 0 d-sh--w- c:\documents and settings\gregory morse\PrivacIE
2010-09-23 22:39:35 0 d-sh--w- c:\documents and settings\gregory morse\IETldCache
2010-09-23 02:00:57 0 dc-h--w- c:\windows\ie8
2010-09-19 16:50:47 3248 ------w- c:\windows\system32\wbem\Outlook_01cb581aced4570c.mof
2010-09-13 19:34:06 0 d-----w- c:\program files\iPod
2010-09-13 19:33:46 0 d-----w- c:\program files\iTunes

==================== Find3M ====================

2010-09-22 04:25:33 43520 ------w- c:\windows\system32\CmdLineExt03.dll
2010-08-25 13:54:51 4184 --sh--w- c:\windows\system32\KGyGaAvL.sys
2010-07-27 06:30:35 8462336 ------w- c:\windows\system32\dllcache\shell32.dll
2008-09-25 05:48:00 32768 --sh--w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008092520080926\index.dat

============= FINISH: 13:03:56.14 ===============


RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
>Drivers
==============================================
0xF57FB000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 3891200 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xBF1CD000 C:\WINDOWS\System32\ati3duag.dll 3821568 bytes (ATI Technologies Inc. , ati3duag.dll)
0xBF572000 C:\WINDOWS\System32\ativvaxx.dll 2670592 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2150400 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2150400 bytes
0x804D7000 RAW 2150400 bytes
0x804D7000 WMIxWDM 2150400 bytes
0xBF800000 Win32k 1855488 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1855488 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xA4A4F000 C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20101010.003\NAVEX15.SYS 1368064 bytes (Symantec Corporation, AV Engine)
0xEFC3A000 C:\WINDOWS\System32\drivers\ha10kx2k.sys 1089536 bytes (Creative Technology Ltd, Creative EMU10KX HAL (WDM))
0xF55DE000 C:\WINDOWS\system32\DRIVERS\HSF_DP.sys 1044480 bytes (Conexant Systems, Inc., HSF_DP driver)
0xF5C25000 C:\WINDOWS\system32\DRIVERS\atinavrr.sys 999424 bytes (ATI Technologies Inc., ATI Unified AVStream Driver)
0xAB47E000 C:\WINDOWS\System32\Drivers\dump_iastor.sys 872448 bytes
0xF72C5000 iastor.sys 872448 bytes (Intel Corporation, Intel Matrix Storage Manager driver)
0xF5537000 C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys 684032 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0xEFB46000 C:\WINDOWS\System32\drivers\ctac32k.sys 638976 bytes (Creative Technology Ltd, Creative AC3 SW Decoder Device Driver (WDM))
0xBF065000 C:\WINDOWS\System32\ati2cqag.dll 626688 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xA91C4000 C:\WINDOWS\system32\CTSBLFX.DLL 581632 bytes (Creative Technology Ltd, Creative SB FX Plug-in)
0xF7174000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xA9139000 C:\WINDOWS\system32\CTAUDFX.DLL 569344 bytes (Creative Technology Ltd, Creative SB FX Plug-in)
0xBF0FE000 C:\WINDOWS\System32\atikvmag.dll 540672 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xF5769000 C:\WINDOWS\system32\drivers\ctaud2k.sys 516096 bytes (Creative Technology Ltd, Creative WDM Audio Device Driver)
0xAB5A6000 C:\WINDOWS\System32\Drivers\N360\0308000.029\ccHPx86.sys 503808 bytes (Symantec Corporation, Common Client Hash Provider Driver)
0xAB69C000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xAB63E000 C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys 385024 bytes (Symantec Corporation, Symantec Eraser Control Driver)
0xF5481000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xAB7D3000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xA7A7C000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xBF012000 C:\WINDOWS\System32\ati2dvag.dll 339968 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xAE32B000 C:\WINDOWS\System32\Drivers\N360\0308000.029\SRTSP.SYS 339968 bytes (Symantec Corporation, Symantec AutoProtect)
0xF7244000 SYMEFA.SYS 323584 bytes
0xBF182000 C:\WINDOWS\System32\atiok3x2.dll 307200 bytes (ATI Technologies Inc., Ring 0 x2 component)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xAB564000 C:\WINDOWS\System32\Drivers\N360\0308000.029\BHDrvx86.sys 270336 bytes (Symantec Corporation, BASH Driver)
0xA8B10000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF5711000 C:\WINDOWS\system32\drivers\ctoss2k.sys 212992 bytes (Creative Technology Ltd., Creative OS Services Driver (WDM))
0xF56DD000 C:\WINDOWS\system32\DRIVERS\HSFHWBS2.sys 212992 bytes (Conexant Systems, Inc., HSF_HWB2 WDM driver)
0xF54DF000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xEFC0B000 C:\WINDOWS\System32\drivers\emupia2k.sys 192512 bytes (Creative Technology Ltd, E-mu Plug-in Architecture Driver (WDM))
0xF7463000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF7424000 SSIDRV.SYS 188416 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper Interdiction Driver)
0xF5BD5000 C:\WINDOWS\system32\DRIVERS\e1e5132.sys 184320 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 5.1 deserialized driver)
0xA8C8C000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF73F7000 C:\WINDOWS\SYSTEM32\Drivers\NDIS.SYS 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xAB7A7000 C:\WINDOWS\System32\Drivers\SYMTDI.SYS 180224 bytes (Symantec Corporation, Network Dispatch Driver)
0xEFD44000 C:\WINDOWS\System32\drivers\hap16v2k.sys 176128 bytes (Creative Technology Ltd, Creative EMU10KX-P16v HAL (WDM))
0xA4A10000 C:\WINDOWS\system32\drivers\kmixer.sys 176128 bytes (Microsoft Corporation, Kernel Mode Audio Mixer)
0xAB70C000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xEFBE2000 C:\WINDOWS\System32\drivers\ctsfm2k.sys 167936 bytes (Creative Technology Ltd, SoundFont® Manager (WDM))
0xAB759000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF73B2000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xAB781000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xAB873000 C:\WINDOWS\system32\Drivers\SYMEVENT.SYS 151552 bytes (Symantec Corporation, Symantec Event Library)
0xF5745000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF5BB1000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF5C02000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xAB737000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x806E4000 ACPI_HAL 134400 bytes
0x806E4000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF72A5000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF73D8000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xAB621000 C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys 118784 bytes (Symantec Corporation, Symantec Eraser Utility Driver)
0xA9252000 C:\WINDOWS\system32\COMMONFX.DLL 110592 bytes (Creative Technology Ltd, Creative Common FX Plug-in)
0xF715A000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xA9092000 C:\WINDOWS\system32\dla\tfsnudf.sys 102400 bytes (Sonic Solutions, Drive Letter Access Component)
0xA9079000 C:\WINDOWS\system32\dla\tfsnudfa.sys 102400 bytes (Sonic Solutions, Drive Letter Access Component)
0xF739A000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF7201000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF5520000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xA7455000 C:\WINDOWS\system32\drivers\PfModNT.sys 94208 bytes (Creative Technology Ltd., PCI/ISA Device Info. Service)
0xF722E000 drvmcdb.sys 90112 bytes (Sonic Solutions, Device Driver)
0xF7218000 SymSnap.sys 90112 bytes (StorageCraft, StorageCraft Volume Snap-Shot)
0xA90D3000 C:\WINDOWS\system32\dla\tfsnifs.sys 90112 bytes (Sonic Solutions, Drive Letter Access Component)
0xA8A0B000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xA4A3B000 C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20101010.003\NAVENG.SYS 81920 bytes (Symantec Corporation, AV Engine)
0xF57E7000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xAB82C000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF7293000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF7452000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF550F000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xAB553000 C:\WINDOWS\System32\Drivers\Udfs.SYS 69632 bytes (Microsoft Corporation, UDF File System Driver)
0xA6EB5000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF5DA9000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF7672000 C:\WINDOWS\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xF7622000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xAE1A2000 C:\WINDOWS\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xF7652000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF7602000 Lbd.sys 61440 bytes (Lavasoft AB, Boot Driver)
0xF5D99000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xAE212000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF7772000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF7632000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xF75F2000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF5D79000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF75D2000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF5D59000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF137C000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF5D89000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF75C2000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF5D69000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF75B2000 ssfs0bbc.sys 45056 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper FileSystem Filter Driver)
0xEF0A8000 C:\WINDOWS\system32\drivers\drvnddm.sys 40960 bytes (Sonic Solutions, Device Driver Manager)
0xF7592000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF5D19000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF6CA1000 C:\WINDOWS\system32\drivers\N360\0308000.029\SRTSPX.SYS 40960 bytes (Symantec Corporation, Symantec AutoProtect)
0xF5D39000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF13AC000 C:\WINDOWS\System32\Drivers\V2IMount.SYS 40960 bytes (Symantec Corporation, V2iMount.sys - Image Mounting Device Driver)
0xF7662000 C:\WINDOWS\System32\Drivers\AFS2K.SYS 36864 bytes (Oak Technology Inc., Audio File System)
0xF75E2000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF0635000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF7802000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF5D49000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xAE1C2000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xA4E58000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF7612000 PxHelp20.sys 36864 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xF75A2000 SSHRMD.SYS 36864 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper Mini Driver)
0xF7752000 C:\WINDOWS\system32\dla\tfsncofs.sys 36864 bytes (Sonic Solutions, Drive Letter Access Component)
0xF134C000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF792A000 C:\WINDOWS\system32\drivers\Afc.sys 32768 bytes (Arcsoft, Inc., Arcsoft® ASPI Shell)
0xF7912000 C:\WINDOWS\System32\drivers\ctprxy2k.sys 32768 bytes (Creative Technology Ltd, Creative Proxy Device Driver (WDM))
0xF791A000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF78CA000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF78D2000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xF790A000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF0835000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF781A000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7842000 C:\WINDOWS\system32\dla\tfsnboio.sys 28672 bytes (Sonic Solutions, Drive Letter Access Component)
0xF7992000 C:\WINDOWS\system32\DRIVERS\usbprint.sys 28672 bytes (Microsoft Corporation, USB Printer driver)
0xEEE49000 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xF7932000 C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0xF794A000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7952000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF78BA000 C:\WINDOWS\system32\drivers\ssrtln.sys 24576 bytes (Sonic Solutions, Shared Driver Component)
0xF795A000 C:\WINDOWS\system32\DRIVERS\SymIM.sys 24576 bytes (Symantec Corporation, NDIS Intermediate Driver)
0xEEE09000 C:\WINDOWS\system32\drivers\symlcbrd.sys 24576 bytes (Symantec Corporation, Symantec Core Component)
0xF7922000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xEEE21000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF788A000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7822000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF793A000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7942000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7812000 C:\WINDOWS\SYSTEM32\Drivers\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF7862000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xA5271000 C:\WINDOWS\system32\DRIVERS\asyncmac.sys 16384 bytes (Microsoft Corporation, MS Remote Access serial network driver)
0xABEBE000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF63DB000 C:\WINDOWS\system32\drivers\MODEMCSA.sys 16384 bytes (Microsoft Corporation, Unimodem CSA Filter)
0xF63DF000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF7A8A000 C:\WINDOWS\system32\DRIVERS\NCREMOTEPCI.SYS 16384 bytes (PLX Technology, Inc. (visit www.PlxTech.com), Remote PCI (RPCI) driver library (x86))
0xA903D000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xA8C3C000 C:\WINDOWS\System32\Drivers\SYMREDRV.SYS 16384 bytes (Symantec Corporation, Redirector Filter Driver)
0xAC41B000 C:\WINDOWS\system32\dla\tfsnopio.sys 16384 bytes (Sonic Solutions, Drive Letter Access Component)
0xF7A6E000 C:\WINDOWS\system32\DRIVERS\BdaSup.SYS 12288 bytes (Microsoft Corporation, Microsoft BDA Driver Support Library)
0xF79A2000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xAC427000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF7A76000 C:\WINDOWS\system32\DRIVERS\gameenum.sys 12288 bytes (Microsoft Corporation, Game Port Enumerator)
0xAC413000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF5479000 C:\WINDOWS\System32\Drivers\i2omgmt.SYS 12288 bytes (Microsoft Corporation, I2O Utility Filter)
0xA7AD3000 C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xABEC2000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF7A86000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF5475000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xBFF50000 C:\WINDOWS\System32\TSDDD.dll 12288 bytes (Microsoft Corporation, Framebuffer Display Driver)
0xF7AF4000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7A96000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xF7B00000 C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys 8192 bytes (Gteko Ltd., Process Trigger Driver)
0xF7AD0000 C:\WINDOWS\system32\DRIVERS\dsunidrv.sys 8192 bytes (Gteko Ltd., GUniDriver)
0xF7AE4000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7A92000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7B16000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7ADA000 C:\WINDOWS\system32\drivers\MSPQM.sys 8192 bytes (Microsoft Corporation, MS Proxy Quality Manager)
0xF7B1A000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7B44000 C:\WINDOWS\system32\drivers\sscdbhk5.sys 8192 bytes (Sonic Solutions, Shared Driver Component)
0xF7B46000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7AB6000 C:\WINDOWS\system32\dla\tfsnpool.sys 8192 bytes (Sonic Solutions, Drive Letter Access Component)
0xF7B42000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7A94000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7C6C000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7CB7000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7C3A000 C:\WINDOWS\system32\drivers\io.sys 4096 bytes
0xF7CB5000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7B5A000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0xAB9E7000 C:\WINDOWS\system32\dla\tfsndrct.sys 4096 bytes (Sonic Solutions, Drive Letter Access Component)
0xF7BE2000 C:\WINDOWS\system32\dla\tfsndres.sys 4096 bytes (Sonic Solutions, Drive Letter Access Component)
0x858420A0 unknown_irp_handler 3936 bytes
0x862CB0E0 unknown_irp_handler 3872 bytes
0x8630D100 unknown_irp_handler 3840 bytes
0x862D71E8 unknown_irp_handler 3608 bytes
0x85EF22A8 unknown_irp_handler 3416 bytes
0x862BC2B0 unknown_irp_handler 3408 bytes
0x86310328 unknown_irp_handler 3288 bytes
0x862CD378 unknown_irp_handler 3208 bytes
0x8632B380 unknown_irp_handler 3200 bytes
0x862B43A0 unknown_irp_handler 3168 bytes
0x85EF83B8 unknown_irp_handler 3144 bytes
0x85A354D8 unknown_irp_handler 2856 bytes
0x862EB668 unknown_irp_handler 2456 bytes
0x862B5668 unknown_irp_handler 2456 bytes
0x863216D8 unknown_irp_handler 2344 bytes
0x862D0848 unknown_irp_handler 1976 bytes
0x86433950 unknown_irp_handler 1712 bytes
0x862F59A0 unknown_irp_handler 1632 bytes
0x862F1A10 unknown_irp_handler 1520 bytes
!!!!!!!!!!!Hidden driver: 0x865E8AEA ?_empty_? 1302 bytes
0x85B06C28 unknown_irp_handler 984 bytes
0x85B1EC28 unknown_irp_handler 984 bytes
0x8640FD38 unknown_irp_handler 712 bytes
0x85EF7EC0 unknown_irp_handler 320 bytes
0x862BBFA8 unknown_irp_handler 88 bytes
!!!!!!!!!!!Hidden driver: 0x864DEA58 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xF72C5000 WARNING: suspicious driver modification [iastor.sys::0x865E8AEA]
0x06080000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 102400 bytes
0x05ED0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 102400 bytes
0x05580000 Hidden Image-->Intuit.Spc.Map.WindowsFirewallUtilities.dll [ EPROCESS 0x85548970 ] PID: 1744, 1077248 bytes
0x068D0000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 1150976 bytes
0x067D0000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 1150976 bytes
0x00F00000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 118784 bytes
0x01280000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 118784 bytes
0x072B0000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 118784 bytes
0x00F00000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 118784 bytes
0x01280000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 118784 bytes
0x06170000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 118784 bytes
0x05520000 Hidden Image-->System.ServiceProcess.dll [ EPROCESS 0x85548970 ] PID: 1744, 126976 bytes
0x06BF0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 135168 bytes
0x06C70000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 135168 bytes
0x05D40000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 151552 bytes
0x06140000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 151552 bytes
0x06150000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 1740800 bytes
0x06190000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 1740800 bytes
0x032B0000 Hidden Image-->System.XML.dll [ EPROCESS 0x85548970 ] PID: 1744, 2060288 bytes
0x06300000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 217088 bytes
0x05FF0000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 217088 bytes
0x05D70000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 233472 bytes
0x06B70000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 233472 bytes
0x04670000 Hidden Image-->System.EnterpriseServices.dll [ EPROCESS 0x85548970 ] PID: 1744, 266240 bytes
0x043C0000 Hidden Image-->System.Transactions.dll [ EPROCESS 0x85548970 ] PID: 1744, 270336 bytes
0x05930000 Hidden Image-->log4net.dll [ EPROCESS 0x85548970 ] PID: 1744, 282624 bytes
0x04410000 Hidden Image-->SupportSoft.Agent.Sprocket.dll [ EPROCESS 0x84CC3020 ] PID: 4380, 28672 bytes
0x010D0000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 28672 bytes
0x011F0000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 28672 bytes
0x00FB0000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x00F80000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03B00000 Hidden Image-->CLI.Component.Runtime.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03CF0000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x040E0000 Hidden Image-->AEM.Plugin.WinMessages.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03DF0000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03FD0000 Hidden Image-->AEM.Plugin.Hotkeys.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03F70000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03F80000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04710000 Hidden Image-->AEM.Actions.CCAA.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04700000 Hidden Image-->CLI.Caste.HydraVision.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04BF0000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04C30000 Hidden Image-->DEM.Graphics.I0709.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04C10000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04C60000 Hidden Image-->AEM.Plugin.GD.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04DA0000 Hidden Image-->ResourceManagement.Foundation.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x04DC0000 Hidden Image-->DEM.Graphics.I0804.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x050E0000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05050000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x050A0000 Hidden Image-->CLI.Component.Runtime.Extension.EEU.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x050C0000 Hidden Image-->AEM.Plugin.REG.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05130000 Hidden Image-->DEM.Graphics.I0805.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05170000 Hidden Image-->DEM.Graphics.I0706.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x051C0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x051D0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05340000 Hidden Image-->DEM.Graphics.I0812.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05300000 Hidden Image-->DEM.Graphics.I0712.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05320000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x056C0000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x056F0000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05700000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05730000 Hidden Image-->Branding.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x059E0000 Hidden Image-->atixclib.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05CE0000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05CF0000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05DD0000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05D30000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x05DF0000 Hidden Image-->CLI.Caste.HydraVision.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x060D0000 Hidden Image-->CLI.Caste.HydraVision.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 28672 bytes
0x03D40000 Hidden Image-->SupportSoft.Agent.Sprocket.dll [ EPROCESS 0x845B6648 ] PID: 5792, 28672 bytes
0x010D0000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 28672 bytes
0x01240000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 28672 bytes
0x05AF0000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x00F80000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x00FB0000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x03B30000 Hidden Image-->CLI.Component.Runtime.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x03EB0000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x03F00000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04040000 Hidden Image-->AEM.Plugin.Hotkeys.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04060000 Hidden Image-->AEM.Plugin.WinMessages.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04320000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04310000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04710000 Hidden Image-->AEM.Actions.CCAA.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04700000 Hidden Image-->CLI.Caste.HydraVision.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04C10000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04BF0000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04C60000 Hidden Image-->AEM.Plugin.GD.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04C30000 Hidden Image-->DEM.Graphics.I0709.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04DA0000 Hidden Image-->ResourceManagement.Foundation.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04DC0000 Hidden Image-->DEM.Graphics.I0804.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04F90000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04FE0000 Hidden Image-->CLI.Component.Runtime.Extension.EEU.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05060000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05000000 Hidden Image-->AEM.Plugin.REG.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05040000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05050000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x050F0000 Hidden Image-->DEM.Graphics.I0706.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x050B0000 Hidden Image-->DEM.Graphics.I0805.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05150000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05140000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05290000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05280000 Hidden Image-->DEM.Graphics.I0712.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x052B0000 Hidden Image-->DEM.Graphics.I0812.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x056A0000 Hidden Image-->CLI.Caste.HydraVision.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05C30000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05B40000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05B50000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05B80000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05DE0000 Hidden Image-->Branding.dll [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x05DF0000 Hidden Image-->atixclib.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x06A70000 Hidden Image-->CLI.Caste.HydraVision.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 28672 bytes
0x04050000 Hidden Image-->System.Data.dll [ EPROCESS 0x85548970 ] PID: 1744, 2961408 bytes
0x04B70000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 299008 bytes
0x04740000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 299008 bytes
0x04C10000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x85548970 ] PID: 1744, 307200 bytes
0x034C0000 Hidden Image-->System.dll [ EPROCESS 0x85548970 ] PID: 1744, 3190784 bytes
0x01280000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 36864 bytes
0x01290000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 36864 bytes
0x00F50000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x03AB0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x03B30000 Hidden Image-->AxInterop.WBOCXLib.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x03B70000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x03DD0000 Hidden Image-->Interop.WBOCXLib.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x046E0000 Hidden Image-->CLI.Caste.HydraVision.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x04BC0000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x05100000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x05220000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x05240000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x052F0000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x052A0000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x05710000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 36864 bytes
0x039C0000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 36864 bytes
0x039D0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 36864 bytes
0x00F50000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x03AB0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x03AF0000 Hidden Image-->AxInterop.WBOCXLib.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x03BC0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x03DA0000 Hidden Image-->Interop.WBOCXLib.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x046E0000 Hidden Image-->CLI.Caste.HydraVision.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x047A0000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x05080000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x051A0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x051C0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x05240000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x05270000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0x05B10000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 36864 bytes
0xF75E2000 WARNING: Virus alike driver modification [disk.sys], 36864 bytes
0x06430000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 372736 bytes
0x07010000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 372736 bytes
0x06030000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 372736 bytes
0x07090000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 372736 bytes
0x05650000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 413696 bytes
0x060E0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 413696 bytes
0x05A80000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 413696 bytes
0x05F70000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 413696 bytes
0x06380000 Hidden Image-->Intuit.Spc.Map.WindowsFirewallUtilities.dll [ EPROCESS 0x85548970 ] PID: 1744, 421888 bytes
0x03220000 Hidden Image-->System.configuration.dll [ EPROCESS 0x85548970 ] PID: 1744, 438272 bytes
0x06C20000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 446464 bytes
0x06CA0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 446464 bytes
0x03A80000 Hidden Image-->SupportSoft.Agent.Sprocket.SupportMessage.dll [ EPROCESS 0x84CC3020 ] PID: 4380, 45056 bytes
0x00F30000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 45056 bytes
0x00FA0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 45056 bytes
0x00F70000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x00FF0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x03B40000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x051A0000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x05110000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x05230000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x05290000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 45056 bytes
0x03A80000 Hidden Image-->SupportSoft.Agent.Sprocket.SupportMessage.dll [ EPROCESS 0x845B6648 ] PID: 5792, 45056 bytes
0x00F30000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 45056 bytes
0x00FA0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 45056 bytes
0x00F70000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x00FF0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x03B40000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x05090000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x05100000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x051B0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x05210000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 45056 bytes
0x04270000 Hidden Image-->ATIDEMGX.dll [ EPROCESS 0x8482F5B0 ] PID: 5248, 454656 bytes
0x04330000 Hidden Image-->ATIDEMGX.dll [ EPROCESS 0x84380800 ] PID: 1600, 454656 bytes
0x06F90000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 462848 bytes
0x07010000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 462848 bytes
0x03030000 Hidden Image-->Intuit.Spc.Foundations.Portability.dll [ EPROCESS 0x85548970 ] PID: 1744, 471040 bytes
0x044B0000 Hidden Image-->Intuit.Spc.Map.Reporter.dll [ EPROCESS 0x85548970 ] PID: 1744, 479232 bytes
0x05F80000 Hidden Image-->Intuit.Spc.Map.Reporter.dll [ EPROCESS 0x85548970 ] PID: 1744, 479232 bytes
0x04E60000 Hidden Image-->System.Windows.Forms.dll [ EPROCESS 0x85548970 ] PID: 1744, 5033984 bytes
0x07A10000 Hidden Image-->System.Windows.Forms.dll [ EPROCESS 0x84CF5900 ] PID: 4904, 5033984 bytes
0x05EF0000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 503808 bytes
0x05D40000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 503808 bytes
0x05C50000 Hidden Image-->ResourceManagement.Foundation.Implementation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 512000 bytes
0x05E40000 Hidden Image-->ResourceManagement.Foundation.Implementation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 512000 bytes
0x00F20000 Hidden Image-->Intuit.Spc.Foundations.Primary.Logging.dll [ EPROCESS 0x85548970 ] PID: 1744, 53248 bytes
0x03AF0000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x03AE0000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x03B60000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x03D80000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x03F60000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x050F0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x050D0000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x051F0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x05260000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x05720000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x060A0000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 53248 bytes
0x05070000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x03AE0000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x03B10000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x03BB0000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x03EC0000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x04280000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x05030000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x05190000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x051E0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x05B00000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x05EC0000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 53248 bytes
0x05840000 Hidden Image-->CLI.Component.Systemtray.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 552960 bytes
0x057F0000 Hidden Image-->CLI.Component.Systemtray.DLL [ EPROCESS 0x84380800 ] PID: 1600, 552960 bytes
0x07070000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 602112 bytes
0x070F0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 602112 bytes
0x05270000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 61440 bytes
0x05390000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 61440 bytes
0x052D0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 61440 bytes
0x05410000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 61440 bytes
0x051D0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 61440 bytes
0x05260000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 61440 bytes
0x05310000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 61440 bytes
0x053D0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 61440 bytes
0x053A0000 Hidden Image-->System.Drawing.dll [ EPROCESS 0x85548970 ] PID: 1744, 634880 bytes
0x06D40000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 684032 bytes
0x06DC0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 684032 bytes
0x00FB0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x84CAAB68 ] PID: 4472, 69632 bytes
0x00FC0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 69632 bytes
0x03A90000 Hidden Image-->CLI.Component.SkinFactory.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 69632 bytes
0x04B50000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 69632 bytes
0x05020000 Hidden Image-->APM.Server.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 69632 bytes
0x05360000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 69632 bytes
0x00FB0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x8440D020 ] PID: 5880, 69632 bytes
0x00FC0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 69632 bytes
0x03A90000 Hidden Image-->CLI.Component.SkinFactory.DLL [ EPROCESS 0x84380800 ] PID: 1600, 69632 bytes
0x04720000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 69632 bytes
0x04F70000 Hidden Image-->APM.Server.DLL [ EPROCESS 0x84380800 ] PID: 1600, 69632 bytes
0x052F0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 69632 bytes
0x06700000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Wizard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 700416 bytes
0x06090000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Wizard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 700416 bytes
0x05E20000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 724992 bytes
0x06BB0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 724992 bytes
0x00FE0000 Hidden Image-->Intuit.Spc.Foundations.Primary.ExceptionHandling.dll [ EPROCESS 0x85548970 ] PID: 1744, 77824 bytes
0x03030000 Hidden Image-->sprtmessage.dll [ EPROCESS 0x84CC3020 ] PID: 4380, 77824 bytes
0x04EB0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 77824 bytes
0x05180000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 77824 bytes
0x052B0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 77824 bytes
0x03030000 Hidden Image-->sprtmessage.dll [ EPROCESS 0x845B6648 ] PID: 5792, 77824 bytes
0x04E30000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 77824 bytes
0x05110000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x84380800 ] PID: 1600, 77824 bytes
0x05220000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 77824 bytes
0x03F80000 Hidden Image-->System.Data.SQLite.DLL [ EPROCESS 0x85548970 ] PID: 1744, 778240 bytes
0x06EC0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 806912 bytes
0x06F40000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 806912 bytes
0x071E0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 823296 bytes
0x07260000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 823296 bytes
0x03200000 Hidden Image-->Intuit.Spc.Foundations.Primary.Config.dll [ EPROCESS 0x85548970 ] PID: 1744, 86016 bytes
0x00F90000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 86016 bytes
0x05140000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 86016 bytes
0x05D00000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 86016 bytes
0x00F90000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x84380800 ] PID: 1600, 86016 bytes
0x050C0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 86016 bytes
0x05B60000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x84380800 ] PID: 1600, 86016 bytes
0x05DE0000 Hidden Image-->System.Data.SQLite.DLL [ EPROCESS 0x85548970 ] PID: 1744, 872448 bytes
0x03AC0000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 94208 bytes
0x04C70000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 94208 bytes
0x053E0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x8482F5B0 ] PID: 5248, 94208 bytes
0x03AC0000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 94208 bytes
0x04C70000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x84380800 ] PID: 1600, 94208 bytes
0x05360000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x84380800 ] PID: 1600, 94208 bytes

Attached Files



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 10 October 2010 - 01:26 PM

Greetings

One or more of the identified infections is Known as a Backdoor Trojan. - TDSS rootkit <--please read

What this virus does do.
QUOTE
Functionality
The functionality that the Trojan exhibits implies that it has been designed with profit-making as its primary objective. Making money from the Web typically involves generating Web traffic, installing pay-per-install software and also by generating sales leads for other Web sites and services of a dubious nature. It tries to achieve its objective by employing an array of techniques to try and make the user participate in these income-generating activities.


What the virus can do.
QUOTE
Backdoor.Tidserv is a Trojan horse that uses an advanced rootkit to hide itself. It also displays advertisements, redirects user search results, and opens a back door on the compromised computer.


This "could" allow hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can clean this machine but I cannot guarantee that it will be 100% secure afterwards. "If you would like to continue, then follow the steps below, otherwise please let me know"

I Would like you to do the following.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"
    In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Greg10

Greg10
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 11 October 2010 - 02:39 PM

Gringo,

I've attempted to follow the directions in your last post, and run Combofix. I turned off my protection programs as instructed--followed the directions for Norton 360 in the link you supplied. I then attempted to run Combofix. It keeps giving me a message that it detects an active Norton 360, and I would be proceeding at my own risk. I hit 'OK' and get a message that I can't rename Combofix to 'Combofix(1). I never see a 'window' for Combofix, and never get any request to rename it. I also never see any evidence that a scan is taking place. What's happening?

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 11 October 2010 - 03:02 PM

Hello

can't rename Combofix to 'Combofix(1). - I have seen this happen when you you have used combofix in the past but did not download it to your desktop

when you click on the link for combofix it will ask run or save - click on save and choose the desktop to save it to, then you can double clidk to start to run it


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Greg10

Greg10
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 11 October 2010 - 04:57 PM

Actually, the first time I tried ComboFix, I did save it to the Desktop. When I tried to doubleclick on the the ComboFix icon, nothing happened. That's when I tried selecting 'Run' on the download options.

I just tried deleting ComboFix, rebooting, and starting over. Again, when I saved it to my Desktop, nothing happens when I try to start it. I get a brief hourglass on the desktop, and then nothing...

Greg10

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 11 October 2010 - 05:10 PM

Rename combofix:

Please download Combofix from one of these locations:
    Link 1
    Link 2
    Link 3

    You must rename it before saving it... Rename it: Gringo . See images below. Save it to your desktop.




    Please disable any Antivirus and Firewall you have active, as shown in this topic. Please close all open application windows.

    Double click on Gringo & follow the prompts.
      Do Not use your keyboard or mouse click anywhere in the ComboFix window, as this may cause the program to stall or crash.
      Do Not touch your computer when ComboFix is running!
    When finished,Notepad will open and ComboxFix will produce a log file.
    Please copy/paste the contents of this log in your next reply.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Greg10

Greg10
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 14 October 2010 - 04:21 PM

Gringo,

I had to run ComboFix 3 times, but finally got a log file which I've attached.

Problems:

1. I turned off everything I could find on Norton 360, but still kept getting a message from ComboFix saying that Norton monitoring was active, and I was proceeding at my own risk--nothing bad seems to have happened, but maybe someone needs to modify the directions for turning off Norton 360?

2. First time I ran ComboFix, it downloaded the Recovery Console, and found the rootkit infection, but froze before it could reboot.

3. Second time, ComboFix made it to rebooting, but then I got a Blue Screen of Death during Restart. It said the problem was "HSFHWBS2.sys" if that's of any help. When I manually restarted, the ComboFix window flashed on briefly, but I couldn't find any log file for this run. I did notice during the run that ComboFix said it was removing: popcaploader.dll, popcaploader.inf, and ACDSee\ImageDB.dff We have had various PopCap games, and the ACDSee program on this computer for years, so I was wondering why these files were being deleted? Are they infected files placed in those folders by the malware?

Third time was the charm--ComboFix finally ran all the way through, rebooted, and gave me the log file, which I've attached.

Computer seems to be working now. I hadn't been able to update either AdAware or Spy Sweeper while infected--both were able to download updates after the second run of ComboFix. Did several web searches as well, and haven't had any re-directs of the browser.

Thanks for the help. What's next?

Greg10

Attached Files



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 14 October 2010 - 04:41 PM

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs
    1. click on start
    2. then go to settings
    3. after that you need control panel
    4. look for the icon add/remove programs
    click on the following programs

    Adobe Reader 7.1.0

    and click on remove

Update Adobe Reader
    Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
      If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

      Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.

TFC(Temp File Cleaner):
  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :
    Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis
  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"
    In your next post I need the following
    1. Log From MBAM
    2. report from Hijackthis
    3. let me know of any problems you may have had
    4. How is the computer doing now?

Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 16 October 2010 - 11:28 PM

Hello

three day bump

It has been Three days since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 Greg10

Greg10
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:08:49 PM

Posted 17 October 2010 - 03:59 PM

Sorry for the delay--been busy the past few days. Give me a little more time--I'm working on your instructions today. Been having a problem with the computer locking up whenever I get on the web, so had a little trouble reaching your last post, and may have trouble getting some of the additional programs you prescribed. Is this latest problem related to my overall infection?

Burning question for me--I have up-to-date subscriptions to Norton 360 and Spy Sweeper. How did I still get infected? Aren't those programs supposed to stop stuff like this?

Greg10

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:49 PM

Posted 17 October 2010 - 04:04 PM

Been having a problem with the computer locking up whenever I get on the web
this should not be happening at this time

we are going to check the router

Create and Run Batch File
    Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
CODE
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
    Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

    It should look like this: <--XP
    Double-click on router.bat to run it. it will open notepad when done please post back the results
gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users