Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Assitance


  • This topic is locked This topic is locked
57 replies to this topic

#1 RealNoob

RealNoob

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 03:34 PM

Posted Image

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5118

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

1/1/2011 4:34:44 PM
mbam-log-2011-01-01 (16-34-44).txt

Scan type: Quick scan
Objects scanned: 147919
Time elapsed: 4 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by RealNoob, 02 January 2011 - 03:35 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 02 January 2011 - 04:32 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

I would like to get a better look at your system, please do the following so I can get some more detailed logs.


DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply




Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".

information and logs:

In your next post I need the following

1.logs from DDS
2.RKUnHooker
3.let me know of any problems you may have had
[/list]
Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 05:40 PM

UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT

DDS (Ver_10-12-12.02)

Microsoft Windows XP Home Edition
Boot Device: \Device\HarddiskVolume2
Install Date: 10/5/2009 8:09:19 PM
System Uptime: 1/1/2011 6:31:28 PM (0 hours ago)

Motherboard: Dell Inc. | | 0CU409
Processor: Genuine Intel® CPU 2140 @ 1.60GHz | Socket 775 | 1596/200mhz
Processor: Genuine Intel® CPU 2140 @ 1.60GHz | Socket 775 | 1596/200mhz

==== Disk Partitions =========================

A: is Removable
C: is FIXED (NTFS) - 149 GiB total, 2.392 GiB free.
D: is CDROM ()
E: is CDROM ()
F: is FIXED (NTFS) - 149 GiB total, 0.122 GiB free.
I: is FIXED (NTFS) - 1397 GiB total, 476.511 GiB free.

==== Disabled Device Manager Items =============

Class GUID: {4D36E97D-E325-11CE-BFC1-08002BE10318}
Description: Plug and Play BIOS Extension
Device ID: ROOT\SYSTEM\0003
Manufacturer: (Standard system devices)
Name: Plug and Play BIOS Extension
PNP Device ID: ROOT\SYSTEM\0003
Service: a347bus

==== System Restore Points ===================

RP127: 12/30/2010 11:23:33 PM - Restore Operation
RP128: 1/1/2011 11:25:17 AM - Restore Operation

==== Installed Programs ======================

7-Zip 4.65
Adobe Download Manager
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Alcohol 120%
BitTorrent
CCleaner
Cheat Engine 5.6
Conexant D850 56K V.9x DFVc Modem
Dell Resource CD
DFX for Windows Media Player
DivX Setup
High Definition Audio Driver Package - KB888111
Hotfix for Windows Media Format 11 SDK (KB929399)
Hotfix for Windows Media Player 11 (KB939683)
Hotfix for Windows XP (KB926239)
Hotfix for Windows XP (KB935448)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB970653-v3)
Hotfix for Windows XP (KB979306)
Hotfix for Windows XP (KB981793)
Intel® PRO Network Connections 12.1.12.0
Java Auto Updater
Java™ 6 Update 20
Malwarebytes' Anti-Malware
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Mozilla Firefox (3.6.13)
NVIDIA Drivers
Razer Lycosa
Realtek High Definition Audio Driver
Security Update for Windows Internet Explorer 8 (KB971961)
Security Update for Windows Internet Explorer 8 (KB981332)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB968816)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB978695)
Security Update for Windows Media Player (KB979402)
Security Update for Windows Media Player 11 (KB954154)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB912812)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923789)
Security Update for Windows XP (KB938464-v2)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB944338-v2)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB954600)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958470)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961371-v2)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB969947)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971468)
Security Update for Windows XP (KB971557)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB972260)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973346)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975561)
Security Update for Windows XP (KB975562)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978037)
Security Update for Windows XP (KB978262)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978601)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979559)
Security Update for Windows XP (KB979683)
Security Update for Windows XP (KB980195)
Security Update for Windows XP (KB980218)
Security Update for Windows XP (KB980232)
Security Update for Windows XP (KB981350)
Turbo Lister 2
Unlocker 1.8.9
Update for Windows Internet Explorer 8 (KB976662)
Update for Windows Internet Explorer 8 (KB980182)
Update for Windows Internet Explorer 8 (KB980302)
Update for Windows XP (KB898461)
Update for Windows XP (KB932823-v3)
Update for Windows XP (KB955759)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB971737)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
Update for Windows XP (KB980182)
VC80CRTRedist - 8.0.50727.4053
WebFldrs XP
Windows Installer 3.1 (KB893803)
Windows Internet Explorer 8
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Hotfix - KB839210
WinRAR archiver

==== Event Viewer Messages From Past Week ========

12/31/2010 11:07:32 AM, error: DCOM [10005] - DCOM got error "%1058" attempting to start the service upnphost with arguments "" in order to run the server: {204810B9-73B2-11D4-BF42-00B0D0118B56}
12/31/2010 10:28:35 AM, error: Dhcp [1002] - The IP address lease 192.168.0.100 for the Network Card with network address 001D097687A0 has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).
12/31/2010 1:18:54 AM, error: Dhcp [1002] - The IP address lease 192.168.0.101 for the Network Card with network address 001D097687A0 has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).
12/27/2010 9:32:35 PM, error: Service Control Manager [7023] - The HID Input Service service terminated with the following error: The specified module could not be found.
12/27/2010 10:07:26 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}

==== End Of File ===========================

DDS (Ver_10-12-12.02) - NTFSx86
Run by Nick at 18:33:49.23 on Sat 01/01/2011
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1664 [GMT -8:00]


============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Razer\Lycosa\razerhid.exe
C:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Mozilla Firefox\firefox.exe
svchost.exe
C:\Program Files\Razer\Lycosa\razertra.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Nick\Desktop\dds.scr

============== Pseudo HJT Report ===============

uURLSearchHooks: H - No File
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [Lycosa] "c:\program files\razer\lycosa\razerhid.exe"
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/C/B/F/CBF23A2C-3E55-4664-BC5C-762780D79BA0/OGAControl.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {1E3F1348-4370-4BBE-A67A-CC7ED824CA85} - hxxp://download.microsoft.com/download/7/4/9/749b0dc5-2175-4d5b-a6dd-9c4bc923683e/Selfhelpcontrol.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R1 hwinterface;hwinterface;c:\windows\system32\drivers\hwinterface.sys [2010-5-12 3026]
R3 LycoFltr;Lycosa Keyboard;c:\windows\system32\drivers\Lycosa.sys [2009-10-6 16128]
S3 nosGetPlusHelper;getPlus® Helper 3004;c:\windows\system32\svchost.exe -k nosGetPlusHelper [2004-8-4 14336]
S4 a347bus;a347bus;c:\windows\system32\drivers\a347bus.sys [2010-9-11 160640]
S4 a347scsi;a347scsi;c:\windows\system32\drivers\a347scsi.sys [2010-9-11 5248]

=============== Created Last 30 ================

2011-01-01 19:26:32 -------- dc----w- c:\windows\system32\wbem\repository\FS
2011-01-01 19:26:32 -------- dc----w- c:\windows\system32\wbem\Repository
2010-12-09 16:50:09 -------- dc----w- c:\program files\Midnight Rescue
2010-12-06 00:35:20 -------- dc----w- c:\program files\Super Solvers Outnumbered

==================== Find3M ====================

2010-12-01 07:08:26 2079 -c--a-w- C:\debug.fz10.reg
2010-10-28 05:44:48 49152 -c--a-r- c:\windows\system32\inetwh32.dll
2010-10-28 05:44:48 1044480 -c--a-r- c:\windows\system32\roboex32.dll

============= FINISH: 18:34:11.64 ===============













RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0xB64C6000 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys 8089600 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Miniport Driver, Version 186.18 )
0xBD012000 C:\WINDOWS\System32\nv4_disp.dll 5910528 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Display driver, Version 186.18 )
0xB23E7000 C:\WINDOWS\system32\drivers\RtkHDAud.sys 4550656 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2146304 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2146304 bytes
0x804D7000 RAW 2146304 bytes
0x804D7000 WMIxWDM 2146304 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xB62D3000 C:\WINDOWS\system32\DRIVERS\HSF_DP.sys 1044480 bytes (Conexant Systems, Inc., HSF_DP driver)
0xB622C000 C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys 684032 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0xB7E44000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xB1BFB000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 454656 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xB1D29000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 360448 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xAD944000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xB6471000 C:\WINDOWS\system32\DRIVERS\e1e5132.sys 266240 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 5.2 deserialized driver)
0xAD74B000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xB63F5000 C:\WINDOWS\system32\DRIVERS\HSFHWBS2.sys 212992 bytes (Conexant Systems, Inc., HSF_HWB2 WDM driver)
0xB61D0000 C:\WINDOWS\system32\DRIVERS\update.sys 212992 bytes (Microsoft Corporation, Update Driver)
0xB7F79000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xADA13000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB7E17000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB1C6A000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 180224 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB1CD9000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xAD99B000 C:\WINDOWS\system32\DRIVERS\secdrv.sys 163840 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0xB6429000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 151552 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xAD4CE000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 143360 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xB63D2000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xB644E000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 143360 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB1C96000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xB23C5000 C:\WINDOWS\system32\drivers\portcls.sys 139264 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB1CB8000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 135168 bytes (Microsoft Corporation, IP Network Address Translator)
0x806E3000 ACPI_HAL 134400 bytes
0x806E3000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xB7EFA000 fltMgr.sys 126976 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xB7F49000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xB7DFC000 Mup.sys 110592 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB7F31000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xADE4A000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xB7F19000 C:\WINDOWS\System32\Drivers\SCSIPORT.SYS 98304 bytes (Microsoft Corporation, SCSI Port Driver)
0xB7ED1000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB6215000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xADC34000 C:\WINDOWS\system32\DRIVERS\nwlnkipx.sys 90112 bytes (Microsoft Corporation, NWLINK2 IPX Protocol Driver)
0xADBA7000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xB64B2000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xB1D81000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBD000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xB7EE8000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xB7F68000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xB6204000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xAE620000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xB1ADC000 C:\WINDOWS\system32\DRIVERS\nwlnknb.sys 65536 bytes (Microsoft Corporation, NWLINK2 IPX Netbios Protocol Driver)
0xB4624000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xB8208000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xB4614000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xB81C8000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xAE92B000 C:\WINDOWS\system32\DRIVERS\nwlnkspx.sys 57344 bytes (Microsoft Corporation, NWLINK2 SPX Protocol Driver)
0xB81F8000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 53248 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xB80E8000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xB8238000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xB80C8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xB8258000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xB8228000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xB80B8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xB8248000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xB82C8000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xB80F8000 PxHelp20.sys 40960 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xB8278000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xB80D8000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xB45B4000 C:\WINDOWS\System32\Drivers\Fips.SYS 36864 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xB2C9F000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xB81E8000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xB80A8000 isapnp.sys 36864 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xB8268000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xB45C4000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xB6E36000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xB45D4000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xB8338000 cercsr6.sys 32768 bytes (Adaptec, Inc., DELL CERC SATA1.5/6ch Miniport Driver)
0xB83B0000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xB8378000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xB1E0A000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xB83B8000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xB84A8000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xB19EC000 C:\DOCUME~1\Nick\LOCALS~1\Temp\mbr.sys 28672 bytes
0xB8328000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xB83A8000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 28672 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xB84A0000 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xB83E0000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xB83E8000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xB84B0000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xB83F0000 C:\WINDOWS\system32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xB8348000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xB8330000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xB83D0000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xB83D8000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xB83C8000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xB83A0000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 20480 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xB1E12000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xB1B63000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB1B73000 C:\WINDOWS\System32\Drivers\Lycosa.sys 16384 bytes (Razer USA Ltd., Razer Tarantula Keyboard Driver)
0xB85A4000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xB6C7D000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xB84B8000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xAE660000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xB230D000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xADA54000 C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xB1D11000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB8590000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xB2BC1000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xB8630000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xB8616000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xB862E000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xB85A8000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xB8632000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xB8634000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xB85E0000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xB861E000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xB85AA000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xB8771000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xB87CD000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xB2ADD000 C:\WINDOWS\System32\Drivers\hwinterface.sys 4096 bytes (Logix4u, hwinterface.sys)
0xB2B61000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xB8670000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0DC980 ] TID: 108
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C46D68 ] TID: 132
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C86A8 ] TID: 140, 529888 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C8430 ] TID: 148
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA4208 ] TID: 224
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB0538 ] TID: 244
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB0B80 ] TID: 248
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB07B0 ] TID: 256, 3145776 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0CADA8 ] TID: 260
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA4B30 ] TID: 268
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0CAB30 ] TID: 272
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C9BE8 ] TID: 436, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA5AA0 ] TID: 448
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C93F0 ] TID: 452, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA6BE8 ] TID: 456
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C497B8 ] TID: 472, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C62F8 ] TID: 476
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C54A8 ] TID: 480, 8781826 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89BCE020 ] TID: 488
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA66F8 ] TID: 492, 8781826 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BA6980 ] TID: 496
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x89C424A8 ] TID: 548, 8781826 bytes
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89BCF718 ] TID: 580
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C702A8 ] TID: 584, 8781826 bytes
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A85F800 ] TID: 628
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A857DA8 ] TID: 632, 8781828 bytes
0x8055B700 Faked ServiceTable-->smss.exe [ ETHREAD 0x8A870DA8 ] TID: 636
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0FC020 ] TID: 644, 8781828 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C75980 ] TID: 652
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C3F640 ] TID: 656, 8781829 bytes
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x8A183A30 ] TID: 688
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x8A182DA8 ] TID: 696, 8781830 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A870020 ] TID: 724
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CECDA8 ] TID: 732, 8781832 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A14FDA8 ] TID: 740
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x89C9E660 ] TID: 760
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A891988 ] TID: 772
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A891710 ] TID: 776, 8781833 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A14ADA8 ] TID: 780
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A14BDA8 ] TID: 784, 8781834 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A14AB30 ] TID: 788
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A14BB30 ] TID: 792
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A1D7A28 ] TID: 796
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CF1DA8 ] TID: 800
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89CB65F0 ] TID: 804
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A144DA8 ] TID: 812, 8781836 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CEADA8 ] TID: 836
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A146DA8 ] TID: 844, 8781836 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CEEDA8 ] TID: 860
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89CEDDA8 ] TID: 864
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89D02DA8 ] TID: 872
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A1D8A28 ] TID: 876, 8781837 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A9209B0 ] TID: 880
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89CF02A8 ] TID: 884, 8781837 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BA8020 ] TID: 888
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A148630 ] TID: 900, 8781839 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89D01DA8 ] TID: 916
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A159DA8 ] TID: 920
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A9204A8 ] TID: 924
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D9A28 ] TID: 952, 7602254 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C5CA28 ] TID: 964
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89CEF308 ] TID: 968, 8781842 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D97B0 ] TID: 972
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D9538 ] TID: 976
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x89BA3868 ] TID: 980
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C6E868 ] TID: 984
0x8055B700 Faked ServiceTable-->alg.exe [ ETHREAD 0x8A0B7328 ] TID: 988
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A151670 ] TID: 992, 8781844 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF9020 ] TID: 996
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF9670 ] TID: 1000
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF93F8 ] TID: 1004
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A118020 ] TID: 1008, 8781846 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A1522F0 ] TID: 1012
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1513F8 ] TID: 1032
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CED660 ] TID: 1036
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF7670 ] TID: 1040
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A946DA8 ] TID: 1044
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A158BE8 ] TID: 1056
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A118328 ] TID: 1060
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BC0BA0 ] TID: 1068, 8781849 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89C9D3C0 ] TID: 1084
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D6BE8 ] TID: 1092
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A0FA4E8 ] TID: 1096
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A86F808 ] TID: 1116, 8781852 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF1490 ] TID: 1128
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A14F488 ] TID: 1132, 8781853 bytes
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x8A14C700 ] TID: 1140
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BA9838 ] TID: 1164, 19204852 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CA48B8 ] TID: 1168
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C9E3E8 ] TID: 1176, 8781861 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BA95C0 ] TID: 1200
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BA9348 ] TID: 1208
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C6EDA8 ] TID: 1220
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A118A28 ] TID: 1232
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BBDB30 ] TID: 1236
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C6E5F0 ] TID: 1240, 8781862 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A867B98 ] TID: 1252
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A11A790 ] TID: 1256
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0F9BE8 ] TID: 1260
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0F9970 ] TID: 1264
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D4020 ] TID: 1268
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89BD2B38 ] TID: 1272, 12845059 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A15C898 ] TID: 1276, 6 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89D00898 ] TID: 1280, 12845059 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89C9CDA8 ] TID: 1292
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CF3700 ] TID: 1300, 1 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89C5C538 ] TID: 1308
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C6B3E0 ] TID: 1316
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A9289E8 ] TID: 1328
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A928770 ] TID: 1332
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BBFDA8 ] TID: 1336, 36135240 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A94C620 ] TID: 1340
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB3BE8 ] TID: 1344, 36135184 bytes
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A100548 ] TID: 1352
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A11ABA0 ] TID: 1356
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x89BBD8B8 ] TID: 1360, 576000 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB8DA8 ] TID: 1376
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89C54A28 ] TID: 1380, 196611 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A86CBE8 ] TID: 1392
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB87B0 ] TID: 1404, 196611 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1EE9B8 ] TID: 1408
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A86C2E8 ] TID: 1412, 196611 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C69270 ] TID: 1420
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0D5540 ] TID: 1424, 7733358 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A856DA8 ] TID: 1436
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A856B30 ] TID: 1440, 196613 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89D04B30 ] TID: 1456
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A134348 ] TID: 1476
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A137DA8 ] TID: 1484
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A1327B0 ] TID: 1496, 5374020 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A1334A0 ] TID: 1504
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89CB6020 ] TID: 1516
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BCDDA8 ] TID: 1540
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB6868 ] TID: 1544
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C567B0 ] TID: 1552
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C56538 ] TID: 1556
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1DABE8 ] TID: 1560
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1DA970 ] TID: 1564
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CD1DA8 ] TID: 1568
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CD18B8 ] TID: 1576, 19212772 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CD8888 ] TID: 1580
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A1D6868 ] TID: 1592
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12F4E8 ] TID: 1608
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A129020 ] TID: 1620
0x8055B700 Faked ServiceTable-->services.exe [ ETHREAD 0x89CB6378 ] TID: 1636
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12E328 ] TID: 1640
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C9E020 ] TID: 1644
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A128020 ] TID: 1648
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89CB4DA8 ] TID: 1680
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BBD4F0 ] TID: 1700
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CCE518 ] TID: 1708
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0CF510 ] TID: 1740
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CACBE8 ] TID: 1764
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89BB8D68 ] TID: 1768
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89CC1020 ] TID: 1800
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89C5F020 ] TID: 1824
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x89C8D270 ] TID: 1832
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x8A105710 ] TID: 1840
0x8055B700 Faked ServiceTable-->explorer.exe [ ETHREAD 0x8A466DA8 ] TID: 1848
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BAFDA8 ] TID: 1872
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C4D270 ] TID: 1884
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB4DA8 ] TID: 1936
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0C74E8 ] TID: 1940, 7929971 bytes
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C4F7A0 ] TID: 1948
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB2C70 ] TID: 1952
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB29F8 ] TID: 1956
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB36B8 ] TID: 1960
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CB3440 ] TID: 1964
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89BB48B8 ] TID: 1972
0x8055B700 Faked ServiceTable-->csrss.exe [ ETHREAD 0x89BB4640 ] TID: 1976
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89C9C9E8 ] TID: 2124, 5505106 bytes
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89B9F3E8 ] TID: 2128
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89B8CDA8 ] TID: 2132
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89BB0A30 ] TID: 2148
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x8A976878 ] TID: 2156
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89C4BA30 ] TID: 2164
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89CA0868 ] TID: 2168
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0B5DA8 ] TID: 2172
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0B54E8 ] TID: 2180, 32 bytes
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x89B8ADA8 ] TID: 2204
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B8A748 ] TID: 2212
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B8A360 ] TID: 2216
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C966B0 ] TID: 2240
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0B36A8 ] TID: 2272
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C97020 ] TID: 2300
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89CCDB38 ] TID: 2304
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B98020 ] TID: 2312
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B989F8 ] TID: 2316
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B98780 ] TID: 2320
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B98508 ] TID: 2324
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0B4DA8 ] TID: 2328
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0BAB30 ] TID: 2340
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C98B98 ] TID: 2344
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C34BA0 ] TID: 2348
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C12BE8 ] TID: 2352, 6094931 bytes
0x8055B700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x8A0AFDA8 ] TID: 2356
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A0AF7B0 ] TID: 2360
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A12CDA8 ] TID: 2368
0x8055B700 Faked ServiceTable-->spoolsv.exe [ ETHREAD 0x89CEE338 ] TID: 2392
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A0D57C0 ] TID: 2400
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C9C670 ] TID: 2420
0x8055B700 Faked ServiceTable-->lsass.exe [ ETHREAD 0x8A1A5130 ] TID: 2480
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C36020 ] TID: 2496
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A1007C8 ] TID: 2552
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A0B3DA8 ] TID: 2560
0x8055B700 Faked ServiceTable-->firefox.exe [ ETHREAD 0x8A156608 ] TID: 2608
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89B9E4E0 ] TID: 3604
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x8A220A30 ] TID: 3764
0x8055B700 Faked ServiceTable-->svchost.exe [ ETHREAD 0x89C77020 ] TID: 3904
WARNING: Virus alike driver modification [sffp_sd.sys]
WARNING: Virus alike driver modification [HSF_DP.sys]
WARNING: Virus alike driver modification [dxapi.sys]
WARNING: Virus alike driver modification [mup.sys]
WARNING: Virus alike driver modification [mdmxsdk.sys]
WARNING: Virus alike driver modification [sffdisk.sys]
WARNING: Virus alike driver modification [irenum.sys]
WARNING: Virus alike driver modification [sfloppy.sys]
WARNING: Virus alike driver modification [ianswxp.sys]
WARNING: Virus alike driver modification [acpiec.sys]
WARNING: Virus alike driver modification [cpqdap01.sys]
WARNING: Virus alike driver modification [pcmcia.sys]
WARNING: Virus alike driver modification [nikedrv.sys]
WARNING: Virus alike driver modification [rio8drv.sys]
WARNING: Virus alike driver modification [riodrv.sys]
WARNING: Virus alike driver modification [ws2ifsl.sys]
WARNING: Virus alike driver modification [tdpipe.sys]
WARNING: Virus alike driver modification [fsvga.sys]
WARNING: Virus alike driver modification [mouhid.sys]
WARNING: Virus alike driver modification [nwlnkflt.sys]
WARNING: Virus alike driver modification [tunmp.sys]
WARNING: Virus alike driver modification [fltMgr.sys]
WARNING: Virus alike driver modification [ftdisk.sys]
WARNING: Virus alike driver modification [usb8023.sys]
WARNING: Virus alike driver modification [ndisuio.sys]
WARNING: Virus alike driver modification [ipnat.sys]
WARNING: Virus alike driver modification [portcls.sys]
WARNING: Virus alike driver modification [afd.sys]
WARNING: Virus alike driver modification [Hdaudbus.sys]
WARNING: Virus alike driver modification [rdpwd.sys]
WARNING: Virus alike driver modification [cbidf2k.sys]
WARNING: Virus alike driver modification [ks.sys]
WARNING: Virus alike driver modification [diskdump.sys]
WARNING: Virus alike driver modification [aec.sys]
WARNING: Virus alike driver modification [usbport.sys]
WARNING: Virus alike driver modification [asyncmac.sys]
WARNING: Virus alike driver modification [fastfat.sys]
WARNING: Virus alike driver modification [smclib.sys]
WARNING: Virus alike driver modification [Hdaudio.sys]
WARNING: Virus alike driver modification [kbdhid.sys]
WARNING: Virus alike driver modification [tape.sys]
WARNING: Virus alike driver modification [dmio.sys]
WARNING: Virus alike driver modification [mssmbios.sys]
WARNING: Virus alike driver modification [serenum.sys]
WARNING: Virus alike driver modification [usbintel.sys]
WARNING: Virus alike driver modification [a347bus.sys]
WARNING: Virus alike driver modification [Lycosa.sys]
WARNING: Virus alike driver modification [MODEMCSA.sys]
WARNING: Virus alike driver modification [netbt.sys]
WARNING: Virus alike driver modification [secdrv.sys]
WARNING: Virus alike driver modification [windrvr.sys]
WARNING: Virus alike driver modification [raspti.sys]
WARNING: Virus alike driver modification [kmixer.sys]
WARNING: Virus alike driver modification [rdbss.sys]
WARNING: Virus alike driver modification [ptilink.sys]
WARNING: Virus alike driver modification [mrxdav.sys]
WARNING: Virus alike driver modification [ndis.sys]
WARNING: Virus alike driver modification [tdi.sys]
WARNING: Virus alike driver modification [cdaudio.sys]
WARNING: Virus alike driver modification [partmgr.sys]
WARNING: Virus alike driver modification [acpi.sys]
WARNING: Virus alike driver modification [msfs.sys]
WARNING: Virus alike driver modification [rdpdr.sys]
WARNING: Virus alike driver modification [rmcast.sys]
WARNING: Virus alike driver modification [flpydisk.sys]
WARNING: Virus alike driver modification [usbuhci.sys]
WARNING: Virus alike driver modification [update.sys]
WARNING: Virus alike driver modification [mbam.sys]
WARNING: Virus alike driver modification [ipinip.sys]
WARNING: Virus alike driver modification [vga.sys]
WARNING: Virus alike driver modification [HSFHWBS2.sys]
WARNING: Virus alike driver modification [tsbvcap.sys]
WARNING: Virus alike driver modification [tdtcp.sys]
WARNING: Virus alike driver modification [tcpip6.sys]
WARNING: Virus alike driver modification [mouclass.sys]
WARNING: Virus alike driver modification [usbcamd.sys]
WARNING: Virus alike driver modification [usbcamd2.sys]
WARNING: Virus alike driver modification [kbdclass.sys]
WARNING: Virus alike driver modification [hidparse.sys]
WARNING: Virus alike driver modification [pciidex.sys]
WARNING: Virus alike driver modification [sonydcam.sys]
WARNING: Virus alike driver modification [e1e5132.sys]
WARNING: Virus alike driver modification [cinemst2.sys]
WARNING: Virus alike driver modification [http.sys]
WARNING: Virus alike driver modification [USBSTOR.SYS]
WARNING: Virus alike driver modification [usbehci.sys]
WARNING: Virus alike driver modification [bthport.sys]
WARNING: Virus alike driver modification [fdc.sys]
WARNING: Virus alike driver modification [ip6fw.sys]
WARNING: Virus alike driver modification [modem.sys]
WARNING: Virus alike driver modification [rndismp.sys]
WARNING: Virus alike driver modification [npfs.sys]
WARNING: Virus alike driver modification [iqvw32.sys]
WARNING: Virus alike driver modification [atmepvc.sys]
WARNING: Virus alike driver modification [usbccgp.sys]
WARNING: Virus alike driver modification [nwlnkfwd.sys]
WARNING: Virus alike driver modification [ipfltdrv.sys]
WARNING: Virus alike driver modification [rawwan.sys]
WARNING: Virus alike driver modification [netbios.sys]
WARNING: Virus alike driver modification [wanarp.sys]
WARNING: Virus alike driver modification [fips.sys]
WARNING: Virus alike driver modification [msgpc.sys]
WARNING: Virus alike driver modification [atmuni.sys]
WARNING: Virus alike driver modification [srv.sys]
WARNING: Virus alike driver modification [processr.sys]
WARNING: Virus alike driver modification [isapnp.sys]
WARNING: Virus alike driver modification [tcpip.sys]
WARNING: Virus alike driver modification [intelppm.sys]
WARNING: Virus alike driver modification [hidclass.sys]
WARNING: Virus alike driver modification [disk.sys]
WARNING: Virus alike driver modification [crusoe.sys]
WARNING: Virus alike driver modification [amdk6.sys]
WARNING: Virus alike driver modification [amdk7.sys]
WARNING: Virus alike driver modification [ndproxy.sys]
WARNING: Virus alike driver modification [mbamswissarmy.sys]
WARNING: Virus alike driver modification [wpdusb.sys]
WARNING: Virus alike driver modification [cercsr6.sys]
WARNING: Virus alike driver modification [nmnt.sys]
WARNING: Virus alike driver modification [termdd.sys]
WARNING: Virus alike driver modification [raspppoe.sys]
WARNING: Virus alike driver modification [imapi.sys]
WARNING: Virus alike driver modification [beep.sys]
WARNING: Virus alike driver modification [mnmdd.sys]
WARNING: Virus alike driver modification [rdpcdd.sys]
WARNING: Virus alike driver modification [mountmgr.sys]
WARNING: Virus alike driver modification [p3.sys]
WARNING: Virus alike driver modification [swenum.sys]
WARNING: Virus alike driver modification [wmilib.sys]
WARNING: Virus alike driver modification [RtkHDAud.sys]
WARNING: Virus alike driver modification [PxHelp20.sys]
WARNING: Virus alike driver modification [mrxsmb.sys]
WARNING: Virus alike driver modification [usbd.sys]
WARNING: Virus alike driver modification [raspptp.sys]
WARNING: Virus alike driver modification [stream.sys]
WARNING: Virus alike driver modification [cdrom.sys]
WARNING: Virus alike driver modification [classpnp.sys]
WARNING: Virus alike driver modification [MSPQM.sys]
WARNING: Virus alike driver modification [rasl2tp.sys]
WARNING: Virus alike driver modification [tosdvd.sys]
WARNING: Virus alike driver modification [volsnap.sys]
WARNING: Virus alike driver modification [a347scsi.sys]
WARNING: Virus alike driver modification [i8042prt.sys]
WARNING: Virus alike driver modification [DMusic.sys]
WARNING: Virus alike driver modification [MSPCLOCK.sys]
WARNING: Virus alike driver modification [swmidi.sys]
WARNING: Virus alike driver modification [atmlane.sys]
WARNING: Virus alike driver modification [nwlnkspx.sys]
WARNING: Virus alike driver modification [ntfs.sys]
WARNING: Virus alike driver modification [redbook.sys]
WARNING: Virus alike driver modification [usbhub.sys]
WARNING: Virus alike driver modification [vdmindvd.sys]
WARNING: Virus alike driver modification [dmload.sys]
WARNING: Virus alike driver modification [rootmdm.sys]
WARNING: Virus alike driver modification [atmarpc.sys]
WARNING: Virus alike driver modification [drmk.sys]
WARNING: Virus alike driver modification [arp1394.sys]
WARNING: Virus alike driver modification [sysaudio.sys]
WARNING: Virus alike driver modification [nic1394.sys]
WARNING: Virus alike driver modification [nwlnknb.sys]
WARNING: Virus alike driver modification [cdfs.sys]
WARNING: Virus alike driver modification [mf.sys]
WARNING: Virus alike driver modification [splitter.sys]
WARNING: Virus alike driver modification [serial.sys]
WARNING: Virus alike driver modification [udfs.sys]
WARNING: Virus alike driver modification [sdbus.sys]
WARNING: Virus alike driver modification [parvdm.sys]
WARNING: Virus alike driver modification [HSF_CNXT.sys]
WARNING: Virus alike driver modification [pci.sys]
WARNING: Virus alike driver modification [psched.sys]
WARNING: Virus alike driver modification [dxg.sys]
WARNING: Virus alike driver modification [bridge.sys]
WARNING: Virus alike driver modification [sr.sys]
WARNING: Virus alike driver modification [ipsec.sys]
WARNING: Virus alike driver modification [MSKSSRV.sys]
WARNING: Virus alike driver modification [mcd.sys]
WARNING: Virus alike driver modification [WudfPf.sys]
WARNING: Virus alike driver modification [fs_rec.sys]
WARNING: Virus alike driver modification [videoprt.sys]
WARNING: Virus alike driver modification [dmboot.sys]
WARNING: Virus alike driver modification [parport.sys]
WARNING: Virus alike driver modification [nv4_mini.sys]
WARNING: Virus alike driver modification [wdmaud.sys]
WARNING: Virus alike driver modification [WudfRd.sys]
WARNING: Virus alike driver modification [rasacd.sys]
WARNING: Virus alike driver modification [nwlnkipx.sys]
WARNING: Virus alike driver modification [cdr4_xp.sys]
WARNING: Virus alike driver modification [ndiswan.sys]
WARNING: Virus alike driver modification [cdralw2k.sys]
WARNING: Virus alike driver modification [ksecdd.sys]
WARNING: Virus alike driver modification [atapi.sys]
WARNING: Virus alike driver modification [hidusb.sys]
WARNING: Virus alike driver modification [ndistapi.sys]
WARNING: Virus alike driver modification [scsiport.sys]


!!POSSIBLE ROOTKIT ACTIVITY DETECTED!! =)

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 02 January 2011 - 07:14 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 07:30 PM

ComboFix 11-01-02.02 - Nick 01/01/2011 20:20:40.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2046.1675 [GMT -8:00]
Running from: c:\documents and settings\Nick\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\drivers\hwinterface.sys
I:\Autorun.inf

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_hwinterface
-------\Service_hwinterface


((((((((((((((((((((((((( Files Created from 2010-12-02 to 2011-01-02 )))))))))))))))))))))))))))))))
.

2011-01-01 19:26 . 2011-01-01 19:26 -------- dc----w- c:\windows\system32\wbem\Repository
2010-12-28 06:07 . 2011-01-01 19:26 -------- dc----w- c:\documents and settings\Administrator.NICK-644A2214FE
2010-12-09 16:50 . 2010-12-09 16:51 -------- dc----w- c:\program files\Midnight Rescue
2010-12-06 00:35 . 2008-06-24 01:47 -------- dc----w- c:\program files\Super Solvers Outnumbered

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-12-01 07:08 . 2010-05-12 17:20 2079 -c--a-w- C:\debug.fz10.reg
2010-10-28 05:44 . 2010-10-28 05:44 49152 -c--a-r- c:\windows\system32\inetwh32.dll
2010-10-28 05:44 . 2010-10-28 05:44 1044480 -c--a-r- c:\windows\system32\roboex32.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-06-10 13758464]
"Lycosa"="c:\program files\Razer\Lycosa\razerhid.exe" [2007-11-20 147456]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-04-12 22:46 1135912 -c--a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-04 08:06 1667584 -c----w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2009-06-10 15:28 13758464 -c--a-w- c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2009-06-10 15:28 86016 -c--a-w- c:\windows\system32\nvmctray.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
2009-06-10 15:29 1657376 -c--a-w- c:\windows\system32\nwiz.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-02-18 18:43 248040 -c--a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UnlockerAssistant]
2010-03-09 02:52 15872 -c--a-w- c:\program files\Unlocker\UnlockerAssistant.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"upnphost"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"JavaQuickStarterService"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=

R3 LycoFltr;Lycosa Keyboard;c:\windows\system32\drivers\Lycosa.sys [10/6/2009 12:31 PM 16128]
S3 nosGetPlusHelper;getPlus® Helper 3004;c:\windows\System32\svchost.exe -k nosGetPlusHelper [8/4/2004 2:00 AM 14336]
S4 a347bus;a347bus;c:\windows\system32\drivers\a347bus.sys [9/11/2010 9:17 AM 160640]
S4 a347scsi;a347scsi;c:\windows\system32\drivers\a347scsi.sys [9/11/2010 9:17 AM 5248]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
nosGetPlusHelper REG_MULTI_SZ nosGetPlusHelper
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-Adobe Reader Speed Launcher - c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe
MSConfigStartUp-avast5 - c:\program files\Alwil Software\Avast5\avastUI.exe
AddRemove-{E2883E8F-472F-4fb0-9522-AC9BF37916A7} - c:\program files\NOS\bin\getPlus_Helper_3004.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-01-01 20:26
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-746137067-630328440-725345543-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-746137067-630328440-725345543-1004\Software\SecuROM\License information*]
"datasecu"=hex:62,a4,e0,75,31,0b,cf,e7,d2,48,17,aa,0a,b8,5e,ba,74,94,f9,7f,9e,
99,ad,53,86,c4,9d,c8,26,9b,99,05,e9,1c,4d,1e,d8,e6,70,50,57,6f,4c,eb,da,8b,\
"rkeysecu"=hex:29,23,be,84,e1,6c,d6,ae,52,90,49,f1,f1,bb,e9,eb
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2936)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\program files\Razer\Lycosa\razertra.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-01-01 20:28:02 - machine was rebooted
ComboFix-quarantined-files.txt 2011-01-02 04:28

Pre-Run: 2,536,079,360 bytes free
Post-Run: 2,523,656,192 bytes free

- - End Of File - - D616532851D584EFFEF3A642B23EF36D

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 02 January 2011 - 07:39 PM

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realise. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.

FBI Cyber Education Letter
File sharing infects 500,000 computers
USAToday
infoworld


These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 08:09 PM

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5446

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

1/1/2011 6:59:22 PM
mbam-log-2011-01-01 (18-59-22).txt

Scan type: Quick scan
Objects scanned: 143169
Time elapsed: 6 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)









Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 7:06:05 PM, on 1/1/2011
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Razer\Lycosa\razerhid.exe
F:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Razer\Lycosa\razertra.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
F:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: (no name) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - (no file)
O3 - Toolbar: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Lycosa] "C:\Program Files\Razer\Lycosa\razerhid.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - http://download.eset.com/special/eos/OnlineScanner.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 3196 bytes

#8 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 09:05 PM

I did what you said Gringo lets keep going

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 02 January 2011 - 09:45 PM

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded hijackthis entries:

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
      O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
      O2 - BHO: (no name) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - (no file)
      O3 - Toolbar: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 02 January 2011 - 11:35 PM

this scan is taking forever

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 02 January 2011 - 11:37 PM

yes it can but do be patient
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 03 January 2011 - 09:51 AM

Its still not finish OMG lol!

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 03 January 2011 - 09:53 AM

Ill be around

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 RealNoob

RealNoob
  • Topic Starter

  • Members
  • 53 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:38 PM

Posted 03 January 2011 - 05:49 PM

C:\Program Files\Cheat Engine\Cheat Engine.exe a variant of Win32/HackTool.CheatEngine.AA application
C:\Program Files\Cheat Engine\dbk32.dll a variant of Win32/HackTool.CheatEngine.AA application
C:\Program Files\Cheat Engine\dbk32.sys a variant of Win32/HackTool.CheatEngine.AA application
C:\Program Files\Cheat Engine\Systemcallretriever.exe a variant of Win32/HackTool.SystemCall.AA application
C:\Program Files\Cheat Engine\systemcallsignal.exe a variant of Win32/HackTool.SystemCall.AA application
F:\Documents and Settings\Nick\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\extensions\{4c5a4076-36e2-4f32-8d9f-67c6cb0b520b}\chrome\xulcache.jar JS/Agent.NCP trojan

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:38 PM

Posted 03 January 2011 - 07:22 PM

Greetings

There are somethings in the online scan I want to remove so run this scrript for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

Folder::
C:\Program Files\Cheat Engine
F:\Documents and Settings\Nick\Application Data\Mozilla\Firefox\Profiles\35wp1mpn.default\extensions\{4c5a4076-36e2-4f32-8d9f-67c6cb0b520b}


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users