Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search Engine redirect and server 'service' disabler


  • This topic is locked This topic is locked
22 replies to this topic

#1 Slick98

Slick98

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 08 February 2011 - 10:55 PM

Search engine links are randomly redirected to unrelated sites and my server service is repeatedly turned off, preventing me from sharing files across my network. McAfee also can not update and instructs me to check my internet connection, but is otherwise functional (Firewal, Real Time Scanning, etc).


DDS (Ver_10-12-12.02) - NTFSx86
Run by bubba at 20:27:44.53 on Tue 02/08/2011
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_21
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3199.2333 [GMT -7:00]

AV: McAfee Anti-Virus and Anti-Spyware *Enabled/Outdated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *Enabled*

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\KEMailKb\KEMailKb.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Warner Bros. Digital Copy Manager\Warner Bros. Digital Copy Manager.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
C:\WINDOWS\system32\mfevtps.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Documents and Settings\bubba\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://ww2.cox.com/residential/arizona/home.cox
uSearch Page =
uSearch Bar =
uLocal Page =
mLocal Page =
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
mSearchAssistant =
uURLSearchHooks: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\common files\mcafee\systemcore\ScriptSn.20110128000512.dll
BHO: {8A9D74F9-560B-4FE7-ABEB-3B2E638E5CD6} - No File
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [KEMailKb] c:\progra~1\kemailkb\KEMailKb.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
dRunOnce: [RunNarrator] Narrator.exe
StartupFolder: c:\docume~1\bubba\startm~1\programs\startup\warner~1.lnk - c:\program files\warner bros. digital copy manager\Warner Bros. Digital Copy Manager.exe
uPolicies-system: HideFastUserSwitching = 0 (0x0)
mPolicies-system: HideFastUserSwitching = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\mi1933~1\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\mi1933~1\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\mi1933~1\office12\REFIEBAR.DLL
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1243543124921
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 208.67.220.220,208.67.222.222
TCP: {66E0D08D-6674-4DFB-8EB7-E4C911C6A275} = 208.67.220.220,208.67.222.222
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
Hosts: 127.0.0.1 www.spywareinfo.com
Hosts: 69.10.57.34 www.google.com
Hosts: 69.10.57.34 google.com
Hosts: 69.10.57.34 google.com.au
Hosts: 69.10.57.34 www.google.com.au

Note: multiple HOSTS entries found. Please refer to Attach.txt

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\bubba\applic~1\mozilla\firefox\profiles\clv5smve.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: network.proxy.type - 4
FF - component: c:\documents and settings\bubba\application data\mozilla\firefox\profiles\clv5smve.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\bubba\application data\mozilla\firefox\profiles\clv5smve.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\RadioWMPCore.dll
FF - component: c:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - plugin: c:\documents and settings\bubba\application data\facebook\npfbplugin_1_0_1.dll
FF - plugin: c:\documents and settings\bubba\application data\facebook\npfbplugin_1_0_3.dll
FF - plugin: c:\documents and settings\bubba\application data\mozilla\firefox\profiles\clv5smve.default\extensions\{e2883e8f-472f-4fb0-9522-ac9bf37916a7}\plugins\np_gp.dll
FF - plugin: c:\documents and settings\bubba\application data\mozilla\firefox\profiles\clv5smve.default\extensions\gametap@gametap.com\plugins\npGameTapWebUpdater.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\download manager\npfpdlm.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: McAfee SiteAdvisor: {B7082FAA-CB62-4872-9106-E42DD88EDE45} - c:\program files\mcafee\SiteAdvisor
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Download Manager Tweak: {F8A55C97-3DB6-4961-A81D-0DE0080E53CB} - %profile%\extensions\{F8A55C97-3DB6-4961-A81D-0DE0080E53CB}
FF - Ext: PitchDark: {c1dffba0-628e-11d9-9669-0800200c9a66} - %profile%\extensions\{c1dffba0-628e-11d9-9669-0800200c9a66}
FF - Ext: Adobe DLM (powered by getPlus®): {E2883E8F-472F-4fb0-9522-AC9BF37916A7} - %profile%\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}
FF - Ext: ReminderFox: {ada4b710-8346-4b82-8199-5de2b400a6ae} - %profile%\extensions\{ada4b710-8346-4b82-8199-5de2b400a6ae}
FF - Ext: Read It Later: isreaditlater@ideashower.com - %profile%\extensions\isreaditlater@ideashower.com
FF - Ext: Smart Bookmarks Bar: smartbookmarksbar@remy.juteau - %profile%\extensions\smartbookmarksbar@remy.juteau
FF - Ext: GameTap: GameTap@gametap.com - %profile%\extensions\GameTap@gametap.com
FF - Ext: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - %profile%\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: StumbleUpon: {AE93811A-5C9A-4d34-8462-F7B864FC4696} - %profile%\extensions\{AE93811A-5C9A-4d34-8462-F7B864FC4696}
FF - Ext: XUL Cache: {7e43f0d7-73f2-40ce-94f5-cd647e684b98} - %profile%\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2010-10-13 386840]
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [2011-1-28 84072]
R2 cpuz134;cpuz134;c:\windows\system32\drivers\cpuz134_x32.sys [2010-7-23 20328]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;"c:\program files\common files\mcafee\mcsvchost\McSvHost.exe" /McCoreSvc [2011-1-28 271480]
R2 McMPFSvc;McAfee Personal Firewall Service;"c:\program files\common files\mcafee\mcsvchost\McSvHost.exe" /McCoreSvc [2011-1-28 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\common files\mcafee\mcsvchost\McSvHost.exe" /McCoreSvc [2011-1-28 271480]
R2 McProxy;McAfee Proxy Service;"c:\program files\common files\mcafee\mcsvchost\McSvHost.exe" /McCoreSvc [2011-1-28 271480]
R2 McShield;McShield;c:\program files\common files\mcafee\systemcore\mcshield.exe [2011-1-28 171168]
R2 mfefire;McAfee Firewall Core Service;c:\program files\common files\mcafee\systemcore\mfefire.exe [2011-1-28 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2011-1-27 141792]
R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2011-1-28 55840]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2011-1-28 152960]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2011-1-28 52104]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2011-1-28 313288]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [2011-1-28 88544]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [2011-1-28 88544]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2011-1-28 84264]
S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [2010-7-7 14904]
S3 QCEmerald;Logitech QuickCam Web;c:\windows\system32\drivers\OVCE.sys [2010-3-9 31872]

=============== Created Last 30 ================

2011-02-05 15:35:02 -------- d-----w- C:\spoolerlogs
2011-01-31 15:17:44 388096 ----a-r- c:\docume~1\bubba\applic~1\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-01-31 02:07:50 -------- d-----w- c:\windows\Performance
2011-01-31 02:07:41 -------- d-----w- c:\docume~1\bubba\locals~1\applic~1\Microsoft Corporation
2011-01-31 02:07:08 -------- d-----w- c:\program files\Microsoft Windows 7 Upgrade Advisor
2011-01-30 21:57:00 103864 ----a-w- c:\program files\mozilla firefox\plugins\nppdf32.dll
2011-01-30 21:57:00 103864 ----a-w- c:\program files\internet explorer\plugins\nppdf32.dll
2011-01-28 07:05:12 24376 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
2011-01-28 07:05:11 9344 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
2011-01-28 07:05:03 88544 ----a-w- c:\windows\system32\drivers\mfendisk.sys
2011-01-28 07:05:03 84264 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2011-01-28 07:05:03 84072 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
2011-01-28 07:05:03 55840 ----a-w- c:\windows\system32\drivers\cfwids.sys
2011-01-28 07:05:03 52104 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2011-01-28 07:05:03 313288 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2011-01-28 07:05:03 152960 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2011-01-28 07:04:58 -------- d-----w- c:\program files\McAfee.com
2011-01-28 07:04:58 -------- d-----w- c:\program files\common files\Mcafee
2011-01-28 07:04:45 -------- d-----w- c:\program files\McAfee
2011-01-28 06:57:10 141792 ----a-w- c:\windows\system32\mfevtps.exe
2011-01-28 06:53:24 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-01-28 06:53:24 -------- d-----w- c:\windows\system32\wbem\Repository
2011-01-28 06:52:33 -------- d-----w- c:\docume~1\bubba\applic~1\LimeWire
2011-01-28 06:52:32 -------- d-----w- c:\program files\LimeWire
2011-01-27 21:40:29 -------- d-----w- c:\docume~1\alluse~1\applic~1\Norton
2011-01-27 21:40:20 -------- d-----w- c:\docume~1\alluse~1\applic~1\NortonInstaller
2011-01-27 19:39:08 -------- d-sh--w- c:\docume~1\bubba\applic~1\Smart Internet Protection 2011(2)
2011-01-23 20:28:20 -------- d-----w- c:\docume~1\bubba\locals~1\applic~1\SCE
2011-01-23 19:56:48 -------- d-----w- c:\program files\Sony Online Entertainment
2011-01-23 19:56:47 -------- d-----w- c:\docume~1\bubba\applic~1\Sony Online Entertainment
2011-01-22 03:26:09 -------- d-sh--w- c:\docume~1\bubba\applic~1\.#
2011-01-22 03:26:09 -------- d-----w- c:\program files\common files\SWF Studio
2011-01-21 23:06:49 -------- d-----w- c:\docume~1\bubba\locals~1\applic~1\ECSD
2011-01-21 05:05:11 -------- d-----w- c:\program files\Warner Bros. Digital Copy Manager
2011-01-21 04:24:05 -------- d-----w- c:\docume~1\bubba\locals~1\applic~1\FOMM

==================== Find3M ====================

2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll

=================== ROOTKIT ====================

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: ST3320620AS rev.3.AAE -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x89EC8EC5]<<
_asm { PUSH EBP; MOV EBP, ESP; SUB ESP, 0x1c; PUSH EBX; PUSH ESI; MOV DWORD [EBP-0x4], 0x87714872; SUB DWORD [EBP-0x4], 0x8771412e; PUSH EDI; CALL 0xffffffffffffdf33; }
1 ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\Harddisk0\DR0[0x8B0BAAB8]
3 CLASSPNP[0xB80E8FD7] -> ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\0000006a[0x8B0D1F18]
5 ACPI[0xB7F7F620] -> ntkrnlpa!IofCallDriver[0x804EF1A6] -> [0x8B0BE940]
[0x8B0043B0] -> IRP_MJ_CREATE -> 0x89EC8EC5
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskST3320620AS_____________________________3.AAE___#5&145c865d&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x89EC8AEA
user & kernel MBR OK
sectors 625140333 (+255): user != kernel
Warning: possible TDL3 rootkit infection !

============= FINISH: 20:30:34.35 ===============


GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-02-08 20:47:37
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 ST3320620AS rev.3.AAE
Running: gmer.exe; Driver: C:\DOCUME~1\bubba\LOCALS~1\Temp\pxtdypob.sys


---- System - GMER 1.0.15 ----

Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateKey [0xB7EAF0E0]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwDeleteKey [0xB7EAF0F4]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwDeleteValueKey [0xB7EAF120]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwMapViewOfSection [0xB7EAF176]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenKey [0xB7EAF0CC]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenProcess [0xB7EAF0A4]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenThread [0xB7EAF0B8]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwRenameKey [0xB7EAF10A]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetSecurityObject [0xB7EAF14C]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetValueKey [0xB7EAF136]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwTerminateProcess [0xB7EAF1A0]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0xB7EAF18C]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwYieldExecution [0xB7EAF160]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtMapViewOfSection
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenProcess
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenThread
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtSetSecurityObject

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwYieldExecution 80504B08 7 Bytes JMP B7EAF164 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtMapViewOfSection 805B1FE6 7 Bytes JMP B7EAF17A mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwUnmapViewOfSection 805B2DF4 5 Bytes JMP B7EAF190 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtSetSecurityObject 805C05DA 5 Bytes JMP B7EAF150 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenProcess 805CB3FA 5 Bytes JMP B7EAF0A8 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenThread 805CB686 5 Bytes JMP B7EAF0BC mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwTerminateProcess 805D2982 5 Bytes JMP B7EAF1A4 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwSetValueKey 80621D3A 7 Bytes JMP B7EAF13A mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwRenameKey 806231EA 7 Bytes JMP B7EAF10E mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateKey 806237C8 5 Bytes JMP B7EAF0E4 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwDeleteKey 80623C64 7 Bytes JMP B7EAF0F8 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwDeleteValueKey 80623E34 7 Bytes JMP B7EAF124 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwOpenKey 80624BA6 5 Bytes JMP B7EAF0D0 mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB6C85380, 0x550AF5, 0xE8000020]
.rsrc C:\WINDOWS\System32\DRIVERS\RDPCDD.sys entry point in ".rsrc" section [0xB860EC14]
? C:\DOCUME~1\bubba\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\Explorer.EXE[428] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 02720000
.text C:\WINDOWS\Explorer.EXE[428] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 02720FDB
.text C:\WINDOWS\Explorer.EXE[428] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0272001B
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 026E0000
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 026E0F68
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 026E0F8D
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 026E0F9E
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 026E0FAF
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 026E0FCA
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 026E00B0
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 026E009F
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 026E0F17
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 026E0F32
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 026E00CB
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 026E0051
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 026E001B
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 026E0082
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 026E0FDB
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 026E002C
.text C:\WINDOWS\Explorer.EXE[428] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 026E0F4D
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 026C002F
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 026C008A
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 026C0FDE
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 026C0FEF
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 026C0FC3
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 026C0000
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 026C005B
.text C:\WINDOWS\Explorer.EXE[428] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 026C004A
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 0349006E
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!system 77C293C7 5 Bytes JMP 03490049
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 03490038
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!_open 77C2F566 5 Bytes JMP 03490000
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 03490FE3
.text C:\WINDOWS\Explorer.EXE[428] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 03490011
.text C:\WINDOWS\Explorer.EXE[428] WININET.dll!InternetOpenA 3D95D690 5 Bytes JMP 02A70000
.text C:\WINDOWS\Explorer.EXE[428] WININET.dll!InternetOpenW 3D95DB09 5 Bytes JMP 02A70025
.text C:\WINDOWS\Explorer.EXE[428] WININET.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 02A70FEF
.text C:\WINDOWS\Explorer.EXE[428] WININET.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 02A70FDE
.text C:\WINDOWS\Explorer.EXE[428] WS2_32.dll!socket 71AB4211 5 Bytes JMP 02D80FEF
.text C:\WINDOWS\system32\wuauclt.exe[664] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 02E90FE5
.text C:\WINDOWS\system32\wuauclt.exe[664] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 02E9000A
.text C:\WINDOWS\system32\wuauclt.exe[664] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 02E90FD4
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 02E80FEF
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 02E80F64
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 02E8004F
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 02E80F75
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 02E80F90
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 02E80FBC
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 02E80F38
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 02E80F53
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 02E80F09
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 02E800AC
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 02E800BD
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 02E80FAB
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 02E80FDE
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 02E80074
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 02E80FCD
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 02E80014
.text C:\WINDOWS\system32\wuauclt.exe[664] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 02E8009B
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 02EC0FAB
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!system 77C293C7 5 Bytes JMP 02EC0036
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 02EC0FD7
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!_open 77C2F566 5 Bytes JMP 02EC0000
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 02EC0FBC
.text C:\WINDOWS\system32\wuauclt.exe[664] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 02EC0011
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 02E70014
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 02E70F79
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 02E70FC3
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 02E70FD4
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 02E70F94
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 02E70FEF
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 02E70036
.text C:\WINDOWS\system32\wuauclt.exe[664] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 02E70025
.text C:\WINDOWS\system32\wuauclt.exe[664] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 02EA0000
.text C:\WINDOWS\system32\wuauclt.exe[664] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 02EA0FE5
.text C:\WINDOWS\system32\wuauclt.exe[664] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 02EA0011
.text C:\WINDOWS\system32\wuauclt.exe[664] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 02EA0FC0
.text C:\WINDOWS\system32\wuauclt.exe[664] WS2_32.dll!socket 71AB4211 5 Bytes JMP 02EB0000
.text C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00F10FEF
.text C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00F10FC3
.text C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00F10FD4
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00F00000
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00F00098
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00F00FA3
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00F0007D
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00F00FC0
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00F00047
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00F000CB
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00F000BA
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00F00101
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00F000E6
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00F00F4D
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00F00058
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00F0001B
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00F000A9
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00F00FDB
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00F0002C
.text C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00F00F68
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00EF0014
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00EF0F7C
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00EF0FB9
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00EF0FD4
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00EF0F8D
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00EF0FEF
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00EF0F9E
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [0F, 89]
.text C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00EF0025
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01060FCD
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!system 77C293C7 5 Bytes JMP 0106004E
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01060022
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01060000
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01060033
.text C:\WINDOWS\system32\svchost.exe[936] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01060011
.text C:\WINDOWS\system32\svchost.exe[936] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00F20000
.text C:\WINDOWS\system32\svchost.exe[936] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00F2001B
.text C:\WINDOWS\system32\svchost.exe[936] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00F20FE5
.text C:\WINDOWS\system32\svchost.exe[936] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 00F20FD4
.text C:\WINDOWS\system32\svchost.exe[936] WS2_32.dll!socket 71AB4211 5 Bytes JMP 01050FEF
.text C:\WINDOWS\system32\services.exe[1140] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00050000
.text C:\WINDOWS\system32\services.exe[1140] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00050FE5
.text C:\WINDOWS\system32\services.exe[1140] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0005001B
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 0004000A
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 0004007F
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 0004006E
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00040051
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00040F9E
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00040FCA
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00040F4D
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00040F5E
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00040F10
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00040F2B
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 000400C4
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00040FAF
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 0004001B
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00040F6F
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00040FDB
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 0004002C
.text C:\WINDOWS\system32\services.exe[1140] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00040F3C
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 018A0FA8
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 018A0039
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 018A0FC3
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 018A0FD4
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 018A001E
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 018A0FEF
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 018A0F86
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [AA, 89]
.text C:\WINDOWS\system32\services.exe[1140] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 018A0F97
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01890031
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!system 77C293C7 5 Bytes JMP 01890FB0
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01890FD2
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01890000
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01890FC1
.text C:\WINDOWS\system32\services.exe[1140] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01890FE3
.text C:\WINDOWS\system32\services.exe[1140] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00060FEF
.text C:\WINDOWS\system32\services.exe[1140] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00060FDE
.text C:\WINDOWS\system32\services.exe[1140] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00060014
.text C:\WINDOWS\system32\services.exe[1140] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 0006002F
.text C:\WINDOWS\system32\services.exe[1140] WS2_32.dll!socket 71AB4211 5 Bytes JMP 0007000A
.text C:\WINDOWS\system32\lsass.exe[1152] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 01160FEF
.text C:\WINDOWS\system32\lsass.exe[1152] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 01160FD4
.text C:\WINDOWS\system32\lsass.exe[1152] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 01160000
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 0115000A
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 0115004F
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01150F50
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01150F61
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 01150F72
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01150F9E
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 01150F13
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 01150F24
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 011500A2
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 01150091
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 011500BD
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 01150F83
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01150FEF
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01150F35
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 01150FB9
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 01150FCA
.text C:\WINDOWS\system32\lsass.exe[1152] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 01150076
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 01510FD4
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 01510040
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 01510FE5
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 0151001B
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 01510F8D
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 01510000
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 01510FA8
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [71, 89] {JNO 0xffffffffffffff8b}
.text C:\WINDOWS\system32\lsass.exe[1152] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 01510FC3
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01500FA1
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!system 77C293C7 5 Bytes JMP 01500FC6
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0150001B
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01500000
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 0150002C
.text C:\WINDOWS\system32\lsass.exe[1152] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01500FE3
.text C:\WINDOWS\system32\lsass.exe[1152] WS2_32.dll!socket 71AB4211 5 Bytes JMP 01180FEF
.text C:\WINDOWS\system32\lsass.exe[1152] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 01170000
.text C:\WINDOWS\system32\lsass.exe[1152] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 01170011
.text C:\WINDOWS\system32\lsass.exe[1152] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 01170022
.text C:\WINDOWS\system32\lsass.exe[1152] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 01170FD1
.text C:\WINDOWS\system32\svchost.exe[1368] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 02890000
.text C:\WINDOWS\system32\svchost.exe[1368] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 02890FD4
.text C:\WINDOWS\system32\svchost.exe[1368] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 02890FEF
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 0288000A
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 028800BC
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 02880FD1
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 0288009F
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 02880084
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 02880058
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 028800E8
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 028800D7
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 02880F6A
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 02880103
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 02880128
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 02880073
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 0288001B
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 02880FAC
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 02880047
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 0288002C
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 02880F7B
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 02960025
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 02960F94
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 02960FD4
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 0296000A
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 02960FA5
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 02960FEF
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 02960051
.text C:\WINDOWS\system32\svchost.exe[1368] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 02960040
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 02950036
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!system 77C293C7 5 Bytes JMP 0295001B
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 02950000
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!_open 77C2F566 5 Bytes JMP 02950FEF
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 02950FAB
.text C:\WINDOWS\system32\svchost.exe[1368] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 02950FD2
.text C:\WINDOWS\system32\svchost.exe[1368] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 028A0000
.text C:\WINDOWS\system32\svchost.exe[1368] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 028A001B
.text C:\WINDOWS\system32\svchost.exe[1368] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 028A0036
.text C:\WINDOWS\system32\svchost.exe[1368] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 028A0FE5
.text C:\WINDOWS\system32\svchost.exe[1368] WS2_32.dll!socket 71AB4211 5 Bytes JMP 028B0FEF
.text C:\WINDOWS\system32\svchost.exe[1464] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 012A0000
.text C:\WINDOWS\system32\svchost.exe[1464] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 012A0FE5
.text C:\WINDOWS\system32\svchost.exe[1464] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 012A001B
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01290000
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01290F8B
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01290F9C
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01290FAD
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 0129006C
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01290040
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 01290F38
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 01290F49
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 012900A5
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 01290F0C
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 012900B6
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 01290051
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01290FE5
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01290F70
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 01290FD4
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 01290025
.text C:\WINDOWS\system32\svchost.exe[1464] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 01290F27
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 012E001B
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 012E0047
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 012E0FD4
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 012E000A
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 012E0F8A
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 012E0FEF
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 012E002C
.text C:\WINDOWS\system32\svchost.exe[1464] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 012E0FAF
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 012D0F92
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!system 77C293C7 5 Bytes JMP 012D0FA3
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 012D000C
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!_open 77C2F566 5 Bytes JMP 012D0FE3
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 012D001D
.text C:\WINDOWS\system32\svchost.exe[1464] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 012D0FD2
.text C:\WINDOWS\system32\svchost.exe[1464] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 012B0000
.text C:\WINDOWS\system32\svchost.exe[1464] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 012B0011
.text C:\WINDOWS\system32\svchost.exe[1464] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 012B0FE5
.text C:\WINDOWS\system32\svchost.exe[1464] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 012B0FD4
.text C:\WINDOWS\system32\svchost.exe[1464] WS2_32.dll!socket 71AB4211 5 Bytes JMP 012C000A
.text C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe[1628] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 62419A20 C:\Program Files\Common Files\McAfee\McProxy\mcproxy.dll (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe[1628] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 62419AE2 C:\Program Files\Common Files\McAfee\McProxy\mcproxy.dll (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\WINDOWS\system32\svchost.exe[1676] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00C30FEF
.text C:\WINDOWS\system32\svchost.exe[1676] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00C30FD4
.text C:\WINDOWS\system32\svchost.exe[1676] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00C3000A
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00C20FE5
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00C20F68
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00C2005D
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00C20F83
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00C20036
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00C20F9E
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00C2009F
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00C20082
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00C200DF
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00C20F3C
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00C20F2B
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00C20025
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00C20FD4
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00C20F57
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00C20FAF
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00C2000A
.text C:\WINDOWS\system32\svchost.exe[1676] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00C200B0
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00E90036
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00E90087
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00E90FEF
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00E9001B
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00E9006C
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00E90000
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00E90FCA
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [09, 89]
.text C:\WINDOWS\system32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00E90051
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00C5002C
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!system 77C293C7 5 Bytes JMP 00C50F97
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00C50011
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00C50000
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00C50FB2
.text C:\WINDOWS\system32\svchost.exe[1676] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00C50FD7
.text C:\WINDOWS\system32\svchost.exe[1676] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00C4000A
.text C:\WINDOWS\system32\svchost.exe[1676] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00C4001B
.text C:\WINDOWS\system32\svchost.exe[1676] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00C4002C
.text C:\WINDOWS\system32\svchost.exe[1676] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 00C40047
.text C:\WINDOWS\system32\svchost.exe[1788] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 01320000
.text C:\WINDOWS\system32\svchost.exe[1788] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 01320FD4
.text C:\WINDOWS\system32\svchost.exe[1788] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 01320FE5
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00FF0FE5
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00FF0F6D
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00FF0062
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00FF0F88
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00FF0051
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00FF0036
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00FF0F30
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00FF0F41
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00FF0EFA
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00FF0093
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00FF0EE9
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00FF0FAF
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00FF0000
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00FF0F52
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00FF0FCA
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00FF0011
.text C:\WINDOWS\system32\svchost.exe[1788] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00FF0F1F
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 01310FDB
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 01310F94
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 0131002C
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 01310011
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 01310FA5
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 01310000
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 01310FC0
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [51, 89]
.text C:\WINDOWS\system32\svchost.exe[1788] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 0131003D
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01300064
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!system 77C293C7 5 Bytes JMP 01300049
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01300038
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01300000
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01300FE3
.text C:\WINDOWS\system32\svchost.exe[1788] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 0130001D
.text C:\WINDOWS\system32\svchost.exe[1788] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 012E0000
.text C:\WINDOWS\system32\svchost.exe[1788] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 012E0FEF
.text C:\WINDOWS\system32\svchost.exe[1788] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 012E0FD4
.text C:\WINDOWS\system32\svchost.exe[1788] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 012E0FC3
.text C:\WINDOWS\system32\svchost.exe[1788] WS2_32.dll!socket 71AB4211 5 Bytes JMP 012F0FEF
.text C:\WINDOWS\system32\svchost.exe[1948] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 01160000
.text C:\WINDOWS\system32\svchost.exe[1948] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 01160FDE
.text C:\WINDOWS\system32\svchost.exe[1948] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 01160FEF
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 01150FEF
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 01150F68
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 01150F79
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 01150053
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 01150F8A
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 01150FB6
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 011500B0
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 01150095
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 011500E3
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 011500D2
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 011500F4
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 01150FA5
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 01150000
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 01150078
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 0115002C
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 0115001B
.text C:\WINDOWS\system32\svchost.exe[1948] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 011500C1
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00FF0025
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00FF0062
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00FF000A
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00FF0FD4
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00FF0051
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00FF0FEF
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00FF0FA5
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [1F, 89]
.text C:\WINDOWS\system32\svchost.exe[1948] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00FF0036
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 01180FB7
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!system 77C293C7 5 Bytes JMP 01180038
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 01180FD9
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!_open 77C2F566 5 Bytes JMP 01180000
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 01180FC8
.text C:\WINDOWS\system32\svchost.exe[1948] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 01180011
.text C:\WINDOWS\system32\svchost.exe[1948] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 01170FEF
.text C:\WINDOWS\system32\svchost.exe[1948] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 0117000A
.text C:\WINDOWS\system32\svchost.exe[1948] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 0117001B
.text C:\WINDOWS\system32\svchost.exe[1948] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 01170FD4
.text C:\WINDOWS\system32\svchost.exe[1988] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00FB0FEF
.text C:\WINDOWS\system32\svchost.exe[1988] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00FB0FC3
.text C:\WINDOWS\system32\svchost.exe[1988] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00FB0FD4
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001B0FEF
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001B007D
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001B0058
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001B0047
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001B0036
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001B000A
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001B00B5
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001B008E
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001B00DA
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001B0F37
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001B0F26
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001B0025
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001B0FD4
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001B0F63
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001B0F9E
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001B0FB9
.text C:\WINDOWS\system32\svchost.exe[1988] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001B0F52
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00FF003D
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00FF0FAC
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00FF002C
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00FF001B
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00FF0FC7
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00FF000A
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 00FF0069
.text C:\WINDOWS\system32\svchost.exe[1988] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00FF0058
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00FE0FBC
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!system 77C293C7 5 Bytes JMP 00FE0047
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00FE0FD7
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00FE0000
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00FE0036
.text C:\WINDOWS\system32\svchost.exe[1988] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00FE0011
.text C:\WINDOWS\system32\svchost.exe[1988] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00FC0FEF
.text C:\WINDOWS\system32\svchost.exe[1988] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00FC0014
.text C:\WINDOWS\system32\svchost.exe[1988] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00FC0025
.text C:\WINDOWS\system32\svchost.exe[1988] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 00FC0FD4
.text C:\WINDOWS\system32\svchost.exe[1988] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00FD0FE5
.text C:\WINDOWS\system32\svchost.exe[2592] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00090000
.text C:\WINDOWS\system32\svchost.exe[2592] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00090FDE
.text C:\WINDOWS\system32\svchost.exe[2592] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00090FEF
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001E0000
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001E007F
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001E006E
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001E0F94
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001E0FA5
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001E003D
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001E0F48
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001E0090
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001E0EF7
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001E0F12
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001E00AB
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001E0FB6
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001E0011
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001E0F6F
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001E002C
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001E0FE5
.text C:\WINDOWS\system32\svchost.exe[2592] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001E0F2D
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 002D002C
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 002D007D
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 002D001B
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 002D0FDB
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 002D0062
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 002D0000
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 002D0047
.text C:\WINDOWS\system32\svchost.exe[2592] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 002D0FC0
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 0042005A
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!system 77C293C7 5 Bytes JMP 0042003F
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0042001D
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00420FEF
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 0042002E
.text C:\WINDOWS\system32\svchost.exe[2592] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 0042000C
.text C:\WINDOWS\system32\svchost.exe[2592] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00AF0FEF
.text C:\WINDOWS\system32\svchost.exe[2592] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00AF000A
.text C:\WINDOWS\system32\svchost.exe[2592] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00AF0FD4
.text C:\WINDOWS\system32\svchost.exe[2592] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 00AF0025
.text C:\WINDOWS\system32\svchost.exe[2592] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00CC0FEF
.text C:\Program Files\Mozilla Firefox\firefox.exe[2684] ntdll.dll!LdrLoadDll 7C9163C3 5 Bytes JMP 004013F0 C:\Program Files\Mozilla Firefox\firefox.exe (Firefox/Mozilla Corporation)
.text C:\WINDOWS\System32\svchost.exe[2692] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00090000
.text C:\WINDOWS\System32\svchost.exe[2692] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00090FE5
.text C:\WINDOWS\System32\svchost.exe[2692] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0009001B
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 001E0FE5
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001E005B
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 001E004A
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 001E0F66
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 001E0F83
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 001E001B
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 001E0F24
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 001E0F35
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001E00B6
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 001E009B
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 001E00D1
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 001E0F9E
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 001E0000
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 001E006C
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 001E0FB9
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 001E0FCA
.text C:\WINDOWS\System32\svchost.exe[2692] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 001E0F13
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 002D0025
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 002D0F72
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 002D0FD4
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 002D000A
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 002D0F8D
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 002D0FEF
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 002D0FA8
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [4D, 88]
.text C:\WINDOWS\System32\svchost.exe[2692] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 002D0FB9
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00420049
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!system 77C293C7 5 Bytes JMP 00420038
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 0042001D
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!_open 77C2F566 5 Bytes JMP 0042000C
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00420FD2
.text C:\WINDOWS\System32\svchost.exe[2692] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00420FEF
.text C:\WINDOWS\System32\svchost.exe[2692] wininet.dll!InternetOpenA 3D95D690 5 Bytes JMP 00AF0000
.text C:\WINDOWS\System32\svchost.exe[2692] wininet.dll!InternetOpenW 3D95DB09 5 Bytes JMP 00AF0FEF
.text C:\WINDOWS\System32\svchost.exe[2692] wininet.dll!InternetOpenUrlA 3D95F3A4 5 Bytes JMP 00AF0025
.text C:\WINDOWS\System32\svchost.exe[2692] wininet.dll!InternetOpenUrlW 3D9A6D77 5 Bytes JMP 00AF0040
.text C:\WINDOWS\System32\svchost.exe[2692] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001B0FEF

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T1L0-17 89EC8AEA
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 89EC8AEA
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 89EC8AEA
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-f 89EC8AEA

AttachedDevice \Driver\Tcpip \Device\Udp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)

Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskST3320620AS_____________________________3.AAE___#5&145c865d&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x82 0xF5 0x0A 0x7B ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xE2 0xD3 0xEF 0x94 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0xF5 0x52 0x89 0xB8 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x82 0xF5 0x0A 0x7B ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xE2 0xD3 0xEF 0x94 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0xF5 0x52 0x89 0xB8 ...

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sectors 625140079 (+254): rootkit-like behavior;

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\System32\DRIVERS\RDPCDD.sys suspicious modification; TDL3 <-- ROOTKIT !!!

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 09 February 2011 - 02:20 PM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • These instructions have been specifically tailored to your computer and the issues you are experiencing with your computer. It's important to note that these instructions are not suitable for any other computer, even if the issues are fairly similar.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Please do not PM me directly for help. If you have any questions, post them in this topic.
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.
____________________________________________________


Running TDSSKiller

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.


    Posted Image

  • If an infected file is detected, the default action will be Cure, click on Continue.


    Posted Image

  • If a suspicious file is detected, the default action will be Skip, click on Continue.


    Posted Image

  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.


    Posted Image

  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.


NEXT:



Running OTL

We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 09 February 2011 - 10:47 PM

Thanks for the fast reply ST! Just FYI, if you don't want people attaching documents to their posts, you should suggest that a mod should change the preparation guide, it asks you to attach a file. Here are the logs you requested.

2011/02/09 20:29:24.0171 6028 TDSS rootkit removing tool 2.4.16.0 Feb 1 2011 10:34:03
2011/02/09 20:29:26.0187 6028 ================================================================================
2011/02/09 20:29:26.0187 6028 SystemInfo:
2011/02/09 20:29:26.0187 6028
2011/02/09 20:29:26.0187 6028 OS Version: 5.1.2600 ServicePack: 3.0
2011/02/09 20:29:26.0187 6028 Product type: Workstation
2011/02/09 20:29:26.0187 6028 ComputerName: JOSH
2011/02/09 20:29:26.0187 6028 UserName: bubba
2011/02/09 20:29:26.0187 6028 Windows directory: C:\WINDOWS
2011/02/09 20:29:26.0187 6028 System windows directory: C:\WINDOWS
2011/02/09 20:29:26.0187 6028 Processor architecture: Intel x86
2011/02/09 20:29:26.0187 6028 Number of processors: 2
2011/02/09 20:29:26.0187 6028 Page size: 0x1000
2011/02/09 20:29:26.0187 6028 Boot type: Normal boot
2011/02/09 20:29:26.0187 6028 ================================================================================
2011/02/09 20:29:26.0343 6028 Initialize success
2011/02/09 20:29:34.0171 2332 ================================================================================
2011/02/09 20:29:34.0171 2332 Scan started
2011/02/09 20:29:34.0171 2332 Mode: Manual;
2011/02/09 20:29:34.0171 2332 ================================================================================
2011/02/09 20:29:35.0109 2332 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/02/09 20:29:35.0187 2332 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/02/09 20:29:35.0234 2332 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/02/09 20:29:35.0265 2332 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2011/02/09 20:29:35.0437 2332 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/02/09 20:29:35.0531 2332 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/02/09 20:29:35.0609 2332 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/02/09 20:29:35.0703 2332 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/02/09 20:29:35.0781 2332 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/02/09 20:29:35.0843 2332 BVRPMPR5 (248dfa5762dde38dfddbbd44149e9d7a) C:\WINDOWS\system32\drivers\BVRPMPR5.SYS
2011/02/09 20:29:35.0921 2332 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/02/09 20:29:35.0984 2332 CCDECODE (fdc06e2ada8c468ebb161624e03976cf) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/02/09 20:29:36.0031 2332 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/02/09 20:29:36.0062 2332 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/02/09 20:29:36.0109 2332 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/02/09 20:29:36.0187 2332 cfwids (7e6f7da1c4de5680820f964562548949) C:\WINDOWS\system32\drivers\cfwids.sys
2011/02/09 20:29:36.0468 2332 cpuz134 (75fa19142531cbf490770c2988a7db64) C:\WINDOWS\system32\drivers\cpuz134_x32.sys
2011/02/09 20:29:36.0593 2332 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/02/09 20:29:36.0687 2332 DKbFltr (e85baba3b1d2e86fea684bba9a92606e) C:\WINDOWS\system32\Drivers\DKbFltr.sys
2011/02/09 20:29:36.0781 2332 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/02/09 20:29:36.0843 2332 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/02/09 20:29:36.0859 2332 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/02/09 20:29:36.0875 2332 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/02/09 20:29:36.0953 2332 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/02/09 20:29:37.0015 2332 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/02/09 20:29:37.0093 2332 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/02/09 20:29:37.0171 2332 FilterService (b73ec688c29f81f9da0fcf63682b3ecb) C:\WINDOWS\system32\DRIVERS\lvuvcflt.sys
2011/02/09 20:29:37.0265 2332 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/02/09 20:29:37.0312 2332 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/02/09 20:29:37.0390 2332 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/02/09 20:29:37.0421 2332 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/02/09 20:29:37.0484 2332 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/02/09 20:29:37.0546 2332 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/02/09 20:29:37.0593 2332 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
2011/02/09 20:29:37.0687 2332 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/02/09 20:29:37.0812 2332 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/02/09 20:29:37.0921 2332 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/02/09 20:29:38.0000 2332 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/02/09 20:29:38.0250 2332 IntcAzAudAddService (fc3a99650afe0b39fe1d214304a7d0d3) C:\WINDOWS\system32\drivers\RtkHDAud.sys
2011/02/09 20:29:38.0359 2332 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2011/02/09 20:29:38.0390 2332 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/02/09 20:29:38.0437 2332 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/02/09 20:29:38.0500 2332 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/02/09 20:29:38.0546 2332 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/02/09 20:29:38.0609 2332 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/02/09 20:29:38.0671 2332 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/02/09 20:29:38.0859 2332 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/02/09 20:29:38.0984 2332 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/02/09 20:29:39.0031 2332 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/02/09 20:29:39.0109 2332 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/02/09 20:29:39.0156 2332 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/02/09 20:29:39.0421 2332 lusbaudio (081caf42d5db1fcf8794fd77befd1b11) C:\WINDOWS\system32\drivers\OVSound2.sys
2011/02/09 20:29:39.0500 2332 LVPr2Mon (1a7db7a00a4b0d8da24cd691a4547291) C:\WINDOWS\system32\DRIVERS\LVPr2Mon.sys
2011/02/09 20:29:39.0578 2332 LVRS (37072ec9299e825f4335cc554b6fac6a) C:\WINDOWS\system32\DRIVERS\lvrs.sys
2011/02/09 20:29:39.0750 2332 LVUVC (a240e42a7402e927a71b6e8aa4629b13) C:\WINDOWS\system32\DRIVERS\lvuvc.sys
2011/02/09 20:29:40.0062 2332 mfeapfk (84d59a3eddfb9438fb94f7f80d37859d) C:\WINDOWS\system32\drivers\mfeapfk.sys
2011/02/09 20:29:40.0140 2332 mfeavfk (67e961988312b1a28d6f93357b0bf998) C:\WINDOWS\system32\drivers\mfeavfk.sys
2011/02/09 20:29:40.0187 2332 mfebopk (19161b1796cf74a6a326abde309062ba) C:\WINDOWS\system32\drivers\mfebopk.sys
2011/02/09 20:29:40.0234 2332 mfefirek (d5f89b4934960c70882924d992c6abfc) C:\WINDOWS\system32\drivers\mfefirek.sys
2011/02/09 20:29:40.0296 2332 mfehidk (0efab2b91b27543fe589de700de07136) C:\WINDOWS\system32\drivers\mfehidk.sys
2011/02/09 20:29:40.0406 2332 mfendisk (549dd4966bf0b1d1fc205ca0755a745b) C:\WINDOWS\system32\DRIVERS\mfendisk.sys
2011/02/09 20:29:40.0406 2332 mfendiskmp (549dd4966bf0b1d1fc205ca0755a745b) C:\WINDOWS\system32\DRIVERS\mfendisk.sys
2011/02/09 20:29:40.0453 2332 mferkdet (c9eda1eada2ab6e34cd1a10c3a24ab25) C:\WINDOWS\system32\drivers\mferkdet.sys
2011/02/09 20:29:40.0515 2332 mfetdi2k (e6c5f7aade5a31c057d73201acfe8adf) C:\WINDOWS\system32\drivers\mfetdi2k.sys
2011/02/09 20:29:40.0609 2332 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/02/09 20:29:40.0656 2332 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/02/09 20:29:40.0718 2332 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/02/09 20:29:40.0781 2332 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/02/09 20:29:40.0812 2332 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/02/09 20:29:40.0890 2332 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/02/09 20:29:40.0968 2332 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/02/09 20:29:41.0046 2332 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/02/09 20:29:41.0125 2332 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/02/09 20:29:41.0187 2332 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/02/09 20:29:41.0281 2332 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/02/09 20:29:41.0359 2332 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/02/09 20:29:41.0390 2332 MSTEE (d5059366b361f0e1124753447af08aa2) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/02/09 20:29:41.0421 2332 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/02/09 20:29:41.0468 2332 NABTSFEC (ac31b352ce5e92704056d409834beb74) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/02/09 20:29:41.0562 2332 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/02/09 20:29:41.0640 2332 NdisIP (abd7629cf2796250f315c1dd0b6cf7a0) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/02/09 20:29:41.0687 2332 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/02/09 20:29:41.0718 2332 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/02/09 20:29:41.0781 2332 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/02/09 20:29:41.0859 2332 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/02/09 20:29:41.0875 2332 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/02/09 20:29:41.0921 2332 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/02/09 20:29:42.0046 2332 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/02/09 20:29:42.0062 2332 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/02/09 20:29:42.0093 2332 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/02/09 20:29:42.0421 2332 nv (cb0ce8de9f66a297cd86eb98921b8e58) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2011/02/09 20:29:42.0781 2332 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/02/09 20:29:42.0812 2332 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/02/09 20:29:42.0843 2332 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/02/09 20:29:42.0875 2332 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/02/09 20:29:42.0890 2332 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/02/09 20:29:42.0937 2332 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/02/09 20:29:43.0031 2332 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/02/09 20:29:43.0093 2332 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/02/09 20:29:43.0406 2332 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/02/09 20:29:43.0468 2332 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/02/09 20:29:43.0500 2332 PSI (1df21f001f3a94eba4a2950c70cc358f) C:\WINDOWS\system32\DRIVERS\psi_mf.sys
2011/02/09 20:29:43.0515 2332 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/02/09 20:29:43.0578 2332 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2011/02/09 20:29:43.0718 2332 QCEmerald (90849934d37133e069f31f3e9a66c9bc) C:\WINDOWS\system32\DRIVERS\OVCE.sys
2011/02/09 20:29:44.0140 2332 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/02/09 20:29:44.0218 2332 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/02/09 20:29:44.0250 2332 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/02/09 20:29:44.0296 2332 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/02/09 20:29:44.0359 2332 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/02/09 20:29:44.0406 2332 RDPCDD (66a28c06b38bc0b2f338cfa8962c8a8b) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/02/09 20:29:44.0421 2332 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\RDPCDD.sys. Real md5: 66a28c06b38bc0b2f338cfa8962c8a8b, Fake md5: 4912d5b403614ce99c28420f75353332
2011/02/09 20:29:44.0421 2332 RDPCDD - detected Rootkit.Win32.TDSS.tdl3 (0)
2011/02/09 20:29:44.0468 2332 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2011/02/09 20:29:44.0531 2332 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/02/09 20:29:44.0687 2332 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/02/09 20:29:44.0781 2332 RTL8023xp (cf84b1f0e8b14d4120aaf9cf35cbb265) C:\WINDOWS\system32\DRIVERS\Rtnicxp.sys
2011/02/09 20:29:44.0859 2332 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/02/09 20:29:44.0890 2332 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/02/09 20:29:44.0984 2332 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/02/09 20:29:45.0031 2332 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/02/09 20:29:45.0109 2332 SLIP (1ffc44d6787ec1ea9a2b1440a90fa5c1) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/02/09 20:29:45.0218 2332 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/02/09 20:29:45.0312 2332 sptd (cdddec541bc3c96f91ecb48759673505) C:\WINDOWS\System32\Drivers\sptd.sys
2011/02/09 20:29:45.0359 2332 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/02/09 20:29:45.0390 2332 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/02/09 20:29:45.0484 2332 streamip (a9f9fd0212e572b84edb9eb661f6bc04) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/02/09 20:29:45.0546 2332 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/02/09 20:29:45.0578 2332 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/02/09 20:29:45.0671 2332 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/02/09 20:29:45.0734 2332 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/02/09 20:29:45.0765 2332 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/02/09 20:29:45.0812 2332 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/02/09 20:29:45.0859 2332 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/02/09 20:29:45.0921 2332 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/02/09 20:29:46.0015 2332 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/02/09 20:29:46.0078 2332 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
2011/02/09 20:29:46.0156 2332 usbbus (5aadc9297c39aa249cd994acdba19034) C:\WINDOWS\system32\DRIVERS\lgusbbus.sys
2011/02/09 20:29:46.0218 2332 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/02/09 20:29:46.0281 2332 UsbDiag (4650ffe04e5922399b0e932319e6b215) C:\WINDOWS\system32\DRIVERS\lgusbdiag.sys
2011/02/09 20:29:46.0328 2332 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/02/09 20:29:46.0375 2332 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/02/09 20:29:46.0437 2332 USBModem (2666fe171e0c2e7085ccd5fe0bac09e3) C:\WINDOWS\system32\DRIVERS\lgusbmodem.sys
2011/02/09 20:29:46.0500 2332 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/02/09 20:29:46.0578 2332 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/02/09 20:29:46.0671 2332 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/02/09 20:29:46.0921 2332 usbvideo (63bbfca7f390f4c49ed4b96bfb1633e0) C:\WINDOWS\system32\Drivers\usbvideo.sys
2011/02/09 20:29:47.0046 2332 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/02/09 20:29:47.0109 2332 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/02/09 20:29:47.0218 2332 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/02/09 20:29:47.0906 2332 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/02/09 20:29:48.0062 2332 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys
2011/02/09 20:29:48.0156 2332 WSTCODEC (233cdd1c06942115802eb7ce6669e099) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/02/09 20:29:48.0421 2332 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/02/09 20:29:48.0765 2332 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/02/09 20:29:49.0000 2332 ================================================================================
2011/02/09 20:29:49.0000 2332 Scan finished
2011/02/09 20:29:49.0000 2332 ================================================================================
2011/02/09 20:29:49.0015 4560 Detected object count: 1
2011/02/09 20:30:10.0687 4560 RDPCDD (66a28c06b38bc0b2f338cfa8962c8a8b) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/02/09 20:30:10.0687 4560 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\RDPCDD.sys. Real md5: 66a28c06b38bc0b2f338cfa8962c8a8b, Fake md5: 4912d5b403614ce99c28420f75353332
2011/02/09 20:30:16.0812 4560 Backup copy found, using it..
2011/02/09 20:30:16.0828 4560 C:\WINDOWS\system32\DRIVERS\RDPCDD.sys - will be cured after reboot
2011/02/09 20:30:16.0828 4560 Rootkit.Win32.TDSS.tdl3(RDPCDD) - User select action: Cure
2011/02/09 20:30:24.0437 2292 Deinitialize success


OTL logfile created on: 2/9/2011 8:36:50 PM - Run 1
OTL by OldTimer - Version 3.2.20.6 Folder = C:\Documents and Settings\bubba\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 76.00% Memory free
5.00 Gb Paging File | 4.00 Gb Available in Paging File | 87.00% Paging File free
Paging file location(s): C:\pagefile.sys 2046 4092 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 298.08 Gb Total Space | 86.83 Gb Free Space | 29.13% Space Free | Partition Type: NTFS
Drive D: | 2.56 Gb Total Space | 0.00 Gb Free Space | 0.00% Space Free | Partition Type: UDF

Computer Name: JOSH | User Name: bubba | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2011/02/09 20:34:50 | 000,602,624 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\bubba\Desktop\OTL.exe
PRC - [2011/01/23 19:45:15 | 000,912,344 | ---- | M] (Mozilla Corporation) -- C:\Program Files\Mozilla Firefox\firefox.exe
PRC - [2011/01/20 22:05:06 | 000,142,336 | ---- | M] () -- C:\Program Files\Warner Bros. Digital Copy Manager\Warner Bros. Digital Copy Manager.exe
PRC - [2010/11/22 18:15:16 | 001,193,848 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee.com\Agent\mcagent.exe
PRC - [2010/11/22 18:15:16 | 000,822,048 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee.com\Agent\mcupdate.exe
PRC - [2010/10/13 22:28:54 | 000,188,136 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Common Files\Mcafee\SystemCore\mfefire.exe
PRC - [2010/10/13 22:28:54 | 000,171,168 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Common Files\Mcafee\SystemCore\mcshield.exe
PRC - [2010/10/13 22:28:54 | 000,141,792 | ---- | M] (McAfee, Inc.) -- C:\WINDOWS\system32\mfevtps.exe
PRC - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
PRC - [2009/10/07 01:47:34 | 000,154,136 | ---- | M] (Logitech Inc.) -- C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
PRC - [2008/04/13 17:12:19 | 001,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2002/12/31 13:54:06 | 000,253,952 | ---- | M] (Dritek System Inc.) -- C:\Program Files\KEMailKb\KEMailKb.EXE


========== Modules (SafeList) ==========

MOD - [2011/02/09 20:34:50 | 000,602,624 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\bubba\Desktop\OTL.exe
MOD - [2010/08/23 09:12:02 | 001,054,208 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll


========== Win32 Services (SafeList) ==========

SRV - [2010/10/13 22:28:54 | 000,188,136 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe -- (mfefire)
SRV - [2010/10/13 22:28:54 | 000,171,168 | ---- | M] () [Unknown | Running] -- C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe -- (McShield)
SRV - [2010/10/13 22:28:54 | 000,141,792 | ---- | M] (McAfee, Inc.) [Unknown | Running] -- C:\WINDOWS\system32\mfevtps.exe -- (mfevtp)
SRV - [2010/10/07 20:34:28 | 000,364,216 | ---- | M] (McAfee, Inc.) [On_Demand | Stopped] -- C:\Program Files\McAfee\VirusScan\mcods.exe -- (McODS)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (McProxy)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (McNASvc)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (McNaiAnn)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (mcmscsvc)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (McMPFSvc)
SRV - [2010/03/10 10:14:44 | 000,271,480 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe -- (McAfee SiteAdvisor Service)
SRV - [2009/10/07 01:47:34 | 000,154,136 | ---- | M] (Logitech Inc.) [Auto | Running] -- C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe -- (LVPrcSrv)


========== Driver Services (SafeList) ==========

DRV - [2010/10/13 22:28:54 | 000,386,840 | ---- | M] (McAfee, Inc.) [Kernel | Boot | Running] -- C:\WINDOWS\system32\drivers\mfehidk.sys -- (mfehidk)
DRV - [2010/10/13 22:28:54 | 000,313,288 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\mfefirek.sys -- (mfefirek)
DRV - [2010/10/13 22:28:54 | 000,152,960 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\mfeavfk.sys -- (mfeavfk)
DRV - [2010/10/13 22:28:54 | 000,095,600 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\mfeapfk.sys -- (mfeapfk)
DRV - [2010/10/13 22:28:54 | 000,088,544 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\mfendisk.sys -- (mfendiskmp)
DRV - [2010/10/13 22:28:54 | 000,088,544 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\mfendisk.sys -- (mfendisk)
DRV - [2010/10/13 22:28:54 | 000,084,264 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\mferkdet.sys -- (mferkdet)
DRV - [2010/10/13 22:28:54 | 000,084,072 | ---- | M] (McAfee, Inc.) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\mfetdi2k.sys -- (mfetdi2k)
DRV - [2010/10/13 22:28:54 | 000,055,840 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\cfwids.sys -- (cfwids)
DRV - [2010/10/13 22:28:54 | 000,052,104 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\mfebopk.sys -- (mfebopk)
DRV - [2010/07/25 00:13:14 | 000,691,696 | ---- | M] (Duplex Secure Ltd.) [Kernel | Disabled | Stopped] -- C:\WINDOWS\System32\Drivers\sptd.sys -- (sptd)
DRV - [2010/07/09 13:18:54 | 000,020,328 | ---- | M] (Windows ® Win 7 DDK provider) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\cpuz134_x32.sys -- (cpuz134)
DRV - [2010/07/07 07:05:32 | 000,014,904 | ---- | M] (Secunia) [File_System | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\psi_mf.sys -- (PSI)
DRV - [2010/01/12 12:03:34 | 010,276,768 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\nv4_mini.sys -- (nv)
DRV - [2009/10/07 01:49:50 | 000,023,832 | R--- | M] (Logitech Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lvuvcflt.sys -- (FilterService)
DRV - [2009/10/07 01:49:38 | 006,756,632 | R--- | M] (Logitech Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lvuvc.sys -- (LVUVC) Logitech Webcam 500(UVC)
DRV - [2009/10/07 01:47:55 | 000,266,008 | R--- | M] (Logitech Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lvrs.sys -- (LVRS)
DRV - [2009/10/07 01:46:36 | 000,025,752 | ---- | M] () [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\LVPr2Mon.sys -- (LVPr2Mon)
DRV - [2009/03/25 06:29:52 | 000,130,432 | ---- | M] (Realtek Semiconductor Corporation ) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\Rtnicxp.sys -- (RTL8023xp)
DRV - [2008/06/18 08:49:16 | 000,049,904 | R--- | M] (Avanquest Software) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\BVRPMPR5.SYS -- (BVRPMPR5)
DRV - [2008/04/13 11:45:12 | 000,060,032 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\USBAUDIO.sys -- (usbaudio) USB Audio Driver (WDM)
DRV - [2008/04/13 09:36:05 | 000,144,384 | ---- | M] (Windows ® Server 2003 DDK provider) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\hdaudbus.sys -- (HDAudBus)
DRV - [2007/07/23 09:23:46 | 000,021,632 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbmodem.sys -- (USBModem)
DRV - [2007/07/23 09:23:46 | 000,019,840 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbdiag.sys -- (UsbDiag)
DRV - [2007/07/23 09:23:44 | 000,012,416 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbbus.sys -- (usbbus)
DRV - [2006/09/06 01:04:12 | 004,377,600 | R--- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\RtkHDAud.Sys -- (IntcAzAudAddService) Service for Realtek HD Audio (WDM)
DRV - [2002/11/08 16:21:56 | 000,017,071 | ---- | M] (Dritek System Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\DKbFltr.SYS -- (DKbFltr)
DRV - [2001/08/17 14:05:20 | 000,031,872 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\OVCE.sys -- (QCEmerald)
DRV - [2001/08/17 14:05:06 | 000,025,216 | ---- | M] (Microsoft Corporation) [Kernel | System | Stopped] -- C:\WINDOWS\system32\drivers\OVSound2.sys -- (lusbaudio)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page =
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant =


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 1B 02 36 02 46 D8 D4 4C 9F 4C 8D 3E 40 F6 DE 94 [binary data]
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 1B 02 36 02 46 D8 D4 4C 9F 4C 8D 3E 40 F6 DE 94 [binary data]
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

IE - HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 1B 02 36 02 46 D8 D4 4C 9F 4C 8D 3E 40 F6 DE 94 [binary data]

IE - HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 1B 02 36 02 46 D8 D4 4C 9F 4C 8D 3E 40 F6 DE 94 [binary data]

IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page =
IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page =
IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://ww2.cox.com/residential/arizona/home.cox
IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = 1B 02 36 02 46 D8 D4 4C 9F 4C 8D 3E 40 F6 DE 94 [binary data]
IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\..\URLSearchHook: {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
IE - HKU\S-1-5-21-1614895754-926492609-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========

FF - prefs.js..browser.search.defaultenginename: "Fast Browser Search"
FF - prefs.js..browser.search.defaultthis.engineName: "Fast Browser Search"
FF - prefs.js..browser.search.order.1: "Fast Browser Search"
FF - prefs.js..browser.search.selectedEngine: "Yahoo"
FF - prefs.js..browser.search.useDBForOrder: true
FF - prefs.js..browser.startup.homepage: "http://www.google.com/"
FF - prefs.js..extensions.enabledItems: {E2883E8F-472F-4fb0-9522-AC9BF37916A7}:1
FF - prefs.js..extensions.enabledItems: 6
FF - prefs.js..extensions.enabledItems: 2
FF - prefs.js..extensions.enabledItems: 49
FF - prefs.js..extensions.enabledItems: {F8A55C97-3DB6-4961-A81D-0DE0080E53CB}:0.9.5
FF - prefs.js..extensions.enabledItems: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}:0.9.7.2
FF - prefs.js..extensions.enabledItems: GameTap@gametap.com:4.0.80.1588
FF - prefs.js..extensions.enabledItems: jqs@sun.com:1.0
FF - prefs.js..extensions.enabledItems: isreaditlater@ideashower.com:2.1.1
FF - prefs.js..extensions.enabledItems: {ada4b710-8346-4b82-8199-5de2b400a6ae}:1.9.9.2
FF - prefs.js..extensions.enabledItems: smartbookmarksbar@remy.juteau:1.4.3
FF - prefs.js..extensions.enabledItems: {7b13ec3e-999a-4b70-b9cb-2617b8323822}:2.7.1.3
FF - prefs.js..extensions.enabledItems: personas@christopher.beard:1.6.1
FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}:6.0.20
FF - prefs.js..extensions.enabledItems: {AE93811A-5C9A-4d34-8462-F7B864FC4696}:3.76
FF - prefs.js..extensions.enabledItems: {7e43f0d7-73f2-40ce-94f5-cd647e684b98}:1.0
FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}:6.0.21
FF - prefs.js..extensions.enabledItems: {B7082FAA-CB62-4872-9106-E42DD88EDE45}:3.1
FF - prefs.js..extensions.enabledItems: {c1dffba0-628e-11d9-9669-0800200c9a66}:3.6.3
FF - prefs.js..network.proxy.type: 4


FF - HKLM\software\mozilla\Firefox\Extensions\\{B7082FAA-CB62-4872-9106-E42DD88EDE45}: C:\Program Files\McAfee\SiteAdvisor [2011/01/28 04:15:40 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.13\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2011/01/28 00:05:12 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.6.13\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2011/02/08 19:17:05 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Thunderbird 2.0.0.23\extensions\\Plugins: C:\Program Files\Mozilla Thunderbird\plugins

[2009/12/06 10:18:56 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Extensions
[2009/05/28 14:38:54 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Extensions\mozswing@mozswing.org
[2011/02/08 20:36:23 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions
[2010/04/27 10:43:32 | 000,000,000 | ---D | M] (Microsoft .NET Framework Assistant) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{20a82645-c095-46ed-80e3-08825760534b}
[2010/07/19 21:27:26 | 000,000,000 | ---D | M] (Zynga Toolbar) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}
[2010/08/03 17:54:26 | 000,000,000 | ---D | M] (XUL Cache) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}
[2011/02/04 07:50:32 | 000,000,000 | ---D | M] (ReminderFox) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{ada4b710-8346-4b82-8199-5de2b400a6ae}
[2011/01/20 20:27:45 | 000,000,000 | ---D | M] ("StumbleUpon") -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{AE93811A-5C9A-4d34-8462-F7B864FC4696}
[2011/01/20 20:27:40 | 000,000,000 | ---D | M] (PitchDark) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{c1dffba0-628e-11d9-9669-0800200c9a66}
[2011/01/20 20:27:47 | 000,000,000 | ---D | M] (Download Statusbar) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
[2009/12/07 22:36:08 | 000,000,000 | ---D | M] (Adobe DLM (powered by getPlus®)) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}
[2011/01/20 20:27:44 | 000,000,000 | ---D | M] (Download Manager Tweak) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{F8A55C97-3DB6-4961-A81D-0DE0080E53CB}
[2009/12/27 09:30:01 | 000,000,000 | ---D | M] (GameTap) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\GameTap@gametap.com
[2011/01/20 20:27:46 | 000,000,000 | ---D | M] (Read It Later) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\isreaditlater@ideashower.com
[2010/09/14 11:41:12 | 000,000,000 | ---D | M] (Personas) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\personas@christopher.beard
[2009/12/20 08:53:01 | 000,000,000 | ---D | M] (Smart Bookmarks Bar) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\smartbookmarksbar@remy.juteau
[2009/12/06 19:00:13 | 000,005,413 | ---- | M] () -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\searchplugins\fast-browser-search.xml
[2011/02/08 20:36:23 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2010/03/31 07:43:44 | 000,000,000 | ---D | M] (Skype extension for Firefox) -- C:\Program Files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}
[2010/05/14 11:31:17 | 000,000,000 | ---D | M] (Java Console) -- C:\Program Files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
[2010/09/14 12:23:54 | 000,000,000 | ---D | M] (Java Console) -- C:\Program Files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
[2010/05/14 11:31:01 | 000,000,000 | ---D | M] (Java Quick Starter) -- C:\PROGRAM FILES\JAVA\JRE6\LIB\DEPLOY\JQS\FF
[2011/01/28 04:15:40 | 000,000,000 | ---D | M] (McAfee SiteAdvisor) -- C:\PROGRAM FILES\MCAFEE\SITEADVISOR
[2010/10/13 22:28:54 | 000,024,376 | ---- | M] (McAfee, Inc.) -- C:\Program Files\Mozilla Firefox\components\Scriptff.dll
[2010/07/17 05:00:04 | 000,423,656 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Mozilla Firefox\plugins\npdeployJava1.dll

O1 HOSTS File: ([2011/01/27 14:47:40 | 000,416,883 | RHS- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: 127.0.0.1 www.007guard.com
O1 - Hosts: 127.0.0.1 007guard.com
O1 - Hosts: 127.0.0.1 008i.com
O1 - Hosts: 127.0.0.1 www.008k.com
O1 - Hosts: 127.0.0.1 008k.com
O1 - Hosts: 127.0.0.1 www.00hq.com
O1 - Hosts: 127.0.0.1 00hq.com
O1 - Hosts: 127.0.0.1 010402.com
O1 - Hosts: 127.0.0.1 www.032439.com
O1 - Hosts: 127.0.0.1 032439.com
O1 - Hosts: 127.0.0.1 www.0scan.com
O1 - Hosts: 127.0.0.1 0scan.com
O1 - Hosts: 127.0.0.1 1000gratisproben.com
O1 - Hosts: 127.0.0.1 www.1000gratisproben.com
O1 - Hosts: 127.0.0.1 1001namen.com
O1 - Hosts: 127.0.0.1 www.1001namen.com
O1 - Hosts: 127.0.0.1 100888290cs.com
O1 - Hosts: 127.0.0.1 www.100888290cs.com
O1 - Hosts: 127.0.0.1 www.100sexlinks.com
O1 - Hosts: 127.0.0.1 100sexlinks.com
O1 - Hosts: 127.0.0.1 10sek.com
O1 - Hosts: 127.0.0.1 www.10sek.com
O1 - Hosts: 127.0.0.1 www.1-2005-search.com
O1 - Hosts: 127.0.0.1 1-2005-search.com
O1 - Hosts: 14394 more lines...
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\Common Files\Mcafee\SystemCore\ScriptSn.20110128000512.dll (McAfee, Inc.)
O2 - BHO: (no name) - {8A9D74F9-560B-4FE7-ABEB-3B2E638E5CD6} - No CLSID value found.
O2 - BHO: (McAfee SiteAdvisor BHO) - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
O2 - BHO: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
O3 - HKLM\..\Toolbar: (McAfee SiteAdvisor Toolbar) - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
O3 - HKLM\..\Toolbar: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
O3 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\..\Toolbar\WebBrowser: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
O4 - HKLM..\Run: [KEMailKb] C:\Program Files\KEMailKb\KEMailKb.EXE (Dritek System Inc.)
O4 - HKLM..\Run: [NvCplDaemon] C:\WINDOWS\System32\NvCpl.dll (NVIDIA Corporation)
O4 - HKU\.DEFAULT..\RunOnce: [RunNarrator] C:\WINDOWS\System32\narrator.exe (Microsoft Corporation)
O4 - HKU\S-1-5-18..\RunOnce: [RunNarrator] C:\WINDOWS\System32\narrator.exe (Microsoft Corporation)
O4 - Startup: C:\Documents and Settings\bubba\Start Menu\Programs\Startup\Warner Bros.lnk = C:\Program Files\Warner Bros. Digital Copy Manager\Warner Bros. Digital Copy Manager.exe ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: HideFastUserSwitching = 0
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoClose = 0
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoLogoff = 0
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: StartMenuLogOff = 0
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableChangePassword = 0
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableLockWorkstation = 0
O7 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: HideFastUserSwitching = 0
O15 - HKU\.DEFAULT\..Trusted Domains: clonewarsadventures.com ([]* in Trusted sites)
O15 - HKU\.DEFAULT\..Trusted Domains: freerealms.com ([]* in Trusted sites)
O15 - HKU\.DEFAULT\..Trusted Domains: soe.com ([]* in Trusted sites)
O15 - HKU\.DEFAULT\..Trusted Domains: sony.com ([]* in Trusted sites)
O15 - HKU\S-1-5-18\..Trusted Domains: clonewarsadventures.com ([]* in Trusted sites)
O15 - HKU\S-1-5-18\..Trusted Domains: freerealms.com ([]* in Trusted sites)
O15 - HKU\S-1-5-18\..Trusted Domains: soe.com ([]* in Trusted sites)
O15 - HKU\S-1-5-18\..Trusted Domains: sony.com ([]* in Trusted sites)
O15 - HKU\S-1-5-19\..Trusted Domains: clonewarsadventures.com ([]* in Trusted sites)
O15 - HKU\S-1-5-19\..Trusted Domains: freerealms.com ([]* in Trusted sites)
O15 - HKU\S-1-5-19\..Trusted Domains: soe.com ([]* in Trusted sites)
O15 - HKU\S-1-5-19\..Trusted Domains: sony.com ([]* in Trusted sites)
O15 - HKU\S-1-5-20\..Trusted Domains: clonewarsadventures.com ([]* in Trusted sites)
O15 - HKU\S-1-5-20\..Trusted Domains: freerealms.com ([]* in Trusted sites)
O15 - HKU\S-1-5-20\..Trusted Domains: soe.com ([]* in Trusted sites)
O15 - HKU\S-1-5-20\..Trusted Domains: sony.com ([]* in Trusted sites)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1243543124921 (WUWebControl Class)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol\Handler\dssrequest {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
O18 - Protocol\Handler\sacore {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2009/04/09 09:21:51 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2009/08/28 15:18:23 | 000,000,000 | R--D | M] - D:\AutoRun -- [ UDF ]
O32 - AutoRun File - [2009/08/28 15:23:36 | 000,703,552 | R--- | M] (Electronic Arts Inc.) - D:\AutoRun.exe -- [ UDF ]
O32 - AutoRun File - [2009/08/28 15:23:37 | 000,715,840 | R--- | M] (Electronic Arts Inc.) - D:\AutoRunGUI.dll -- [ UDF ]
O32 - AutoRun File - [2009/08/28 15:23:31 | 000,000,180 | R--- | M] () - D:\autorun.inf -- [ UDF ]
O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell - "" = AutoRun
O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell\AutoRun - "" = Auto&Play
O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell\AutoRun\command - "" = D:\AutoRun.exe -- [2009/08/28 15:23:36 | 000,703,552 | R--- | M] (Electronic Arts Inc.)
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2011/02/09 20:36:11 | 000,000,000 | ---D | C] -- C:\WINDOWS\LastGood
[2011/02/09 20:34:45 | 000,602,624 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\bubba\Desktop\OTL.exe
[2011/02/09 20:31:38 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\McAfee
[2011/02/09 20:29:07 | 001,360,472 | ---- | C] (Kaspersky Lab ZAO) -- C:\Documents and Settings\bubba\Desktop\TDSSKiller.exe
[2011/02/08 19:39:45 | 000,000,000 | RH-D | C] -- C:\Documents and Settings\bubba\Recent
[2011/02/05 08:35:02 | 000,000,000 | ---D | C] -- C:\spoolerlogs
[2011/02/03 01:34:15 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\My Documents\School
[2011/02/02 00:10:37 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Documents\TI Emulator
[2011/01/31 08:17:44 | 000,000,000 | ---D | C] -- C:\Program Files\HiJackThis
[2011/01/31 08:17:44 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Start Menu\Programs\HiJackThis
[2011/01/30 19:07:50 | 000,000,000 | ---D | C] -- C:\WINDOWS\Performance
[2011/01/30 19:07:41 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Local Settings\Application Data\Microsoft Corporation
[2011/01/30 19:07:08 | 000,000,000 | ---D | C] -- C:\Program Files\Microsoft Windows 7 Upgrade Advisor
[2011/01/28 00:05:11 | 000,009,344 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfeclnk.sys
[2011/01/28 00:05:03 | 000,313,288 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfefirek.sys
[2011/01/28 00:05:03 | 000,152,960 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfeavfk.sys
[2011/01/28 00:05:03 | 000,088,544 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfendisk.sys
[2011/01/28 00:05:03 | 000,084,264 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mferkdet.sys
[2011/01/28 00:05:03 | 000,084,072 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfetdi2k.sys
[2011/01/28 00:05:03 | 000,055,840 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\cfwids.sys
[2011/01/28 00:05:03 | 000,052,104 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\drivers\mfebopk.sys
[2011/01/28 00:04:58 | 000,000,000 | ---D | C] -- C:\Program Files\McAfee.com
[2011/01/28 00:04:58 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Mcafee
[2011/01/28 00:04:45 | 000,000,000 | ---D | C] -- C:\Program Files\McAfee
[2011/01/27 23:57:10 | 000,141,792 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\System32\mfevtps.exe
[2011/01/27 23:52:33 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Application Data\LimeWire
[2011/01/27 23:52:32 | 000,000,000 | ---D | C] -- C:\Program Files\LimeWire
[2011/01/27 23:52:32 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Start Menu\Programs\LimeWire
[2011/01/27 14:40:29 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Norton
[2011/01/27 14:40:20 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\NortonInstaller
[2011/01/27 12:39:08 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\bubba\Application Data\Smart Internet Protection 2011(2)
[2011/01/26 14:37:29 | 000,000,000 | -HSD | C] -- C:\Config.Msi
[2011/01/24 00:08:21 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Unofficial Fallout 3 Patch
[2011/01/23 13:28:20 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Local Settings\Application Data\SCE
[2011/01/23 12:56:48 | 000,000,000 | ---D | C] -- C:\Program Files\Sony Online Entertainment
[2011/01/23 12:56:47 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Application Data\Sony Online Entertainment
[2011/01/21 20:57:17 | 005,308,569 | ---- | C] (KidRocket.org) -- C:\Documents and Settings\bubba\Desktop\kidrocket_v15.exe
[2011/01/21 20:26:09 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\bubba\Application Data\.#
[2011/01/21 20:26:09 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\SWF Studio
[2011/01/21 16:06:49 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Local Settings\Application Data\ECSD
[2011/01/20 22:05:11 | 000,000,000 | ---D | C] -- C:\Program Files\Warner Bros. Digital Copy Manager
[2011/01/20 21:38:49 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\My Documents\FOMM
[2011/01/20 21:24:05 | 000,000,000 | ---D | C] -- C:\Documents and Settings\bubba\Local Settings\Application Data\FOMM
[2011/01/20 21:24:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\Fallout Mod Manager
[6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\Documents and Settings\bubba\*.tmp files -> C:\Documents and Settings\bubba\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2011/02/09 20:34:50 | 000,602,624 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\bubba\Desktop\OTL.exe
[2011/02/09 20:31:38 | 000,001,595 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\McAfee Security Center.lnk
[2011/02/09 20:31:20 | 000,267,725 | ---- | M] () -- C:\WINDOWS\System32\NvApps.xml
[2011/02/09 20:31:16 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2011/02/09 20:31:14 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2011/02/08 20:24:16 | 000,000,176 | ---- | M] () -- C:\Documents and Settings\bubba\defogger_reenable
[2011/02/08 19:17:05 | 000,001,729 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Adobe Reader 9.lnk
[2011/02/06 00:30:33 | 000,000,403 | ---- | M] () -- C:\Documents and Settings\All Users\Documents\Shortcut to My Documents.lnk
[2011/02/04 21:29:20 | 000,222,570 | ---- | M] () -- C:\Documents and Settings\bubba\My Documents\Taxes 2010.pdf
[2011/02/03 01:15:58 | 000,002,515 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\Microsoft Office Word 2007.lnk
[2011/02/02 13:26:01 | 000,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2011/02/01 15:00:00 | 000,000,454 | ---- | M] () -- C:\WINDOWS\tasks\PC Optimizer Pro.job
[2011/02/01 10:36:10 | 001,360,472 | ---- | M] (Kaspersky Lab ZAO) -- C:\Documents and Settings\bubba\Desktop\TDSSKiller.exe
[2011/01/31 09:02:13 | 000,050,477 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\Defogger.exe
[2011/01/31 08:49:03 | 000,624,128 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\dds.scr
[2011/01/31 08:34:48 | 000,010,985 | ---- | M] () -- C:\Documents and Settings\bubba\My Documents\hijackthis1-31
[2011/01/31 08:31:51 | 000,002,559 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\HiJackThis.lnk
[2011/01/27 14:47:40 | 000,416,883 | RHS- | M] () -- C:\WINDOWS\System32\drivers\etc\hosts
[2011/01/23 12:58:09 | 000,001,320 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\Free Realms.lnk
[2011/01/21 20:57:26 | 005,308,569 | ---- | M] (KidRocket.org) -- C:\Documents and Settings\bubba\Desktop\kidrocket_v15.exe
[2011/01/20 21:24:01 | 000,001,168 | ---- | M] () -- C:\Documents and Settings\bubba\Desktop\Fallout Mod Manager.lnk
[6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\Documents and Settings\bubba\*.tmp files -> C:\Documents and Settings\bubba\*.tmp -> ]

========== Files Created - No Company Name ==========

[2011/02/08 20:24:02 | 000,000,176 | ---- | C] () -- C:\Documents and Settings\bubba\defogger_reenable
[2011/02/06 00:30:33 | 000,000,403 | ---- | C] () -- C:\Documents and Settings\All Users\Documents\Shortcut to My Documents.lnk
[2011/02/04 21:29:19 | 000,222,570 | ---- | C] () -- C:\Documents and Settings\bubba\My Documents\Taxes 2010.pdf
[2011/01/31 09:02:30 | 000,000,702 | ---- | C] () -- C:\Documents and Settings\bubba\defogger_disable.log
[2011/01/31 09:02:12 | 000,050,477 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\Defogger.exe
[2011/01/31 08:53:12 | 000,296,448 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\gmer.exe
[2011/01/31 08:49:00 | 000,624,128 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\dds.scr
[2011/01/31 08:31:02 | 000,010,985 | ---- | C] () -- C:\Documents and Settings\bubba\My Documents\hijackthis1-31
[2011/01/31 08:17:44 | 000,002,559 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\HiJackThis.lnk
[2011/01/28 18:54:12 | 000,001,729 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Adobe Reader 9.lnk
[2011/01/28 00:06:18 | 000,001,595 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\McAfee Security Center.lnk
[2011/01/26 14:38:01 | 000,002,347 | ---- | C] () -- C:\Documents and Settings\All Users\Start Menu\Programs\Adobe Reader 9.lnk
[2011/01/23 12:58:09 | 000,001,320 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\Free Realms.lnk
[2011/01/20 21:24:01 | 000,001,168 | ---- | C] () -- C:\Documents and Settings\bubba\Desktop\Fallout Mod Manager.lnk
[2010/11/26 19:12:56 | 000,000,979 | ---- | C] () -- C:\WINDOWS\DC.ini
[2010/11/26 16:59:10 | 000,000,984 | ---- | C] () -- C:\WINDOWS\OREGON.INI
[2010/08/03 19:36:10 | 000,000,246 | ---- | C] () -- C:\WINDOWS\wininit.ini
[2010/07/25 00:49:26 | 000,043,520 | ---- | C] () -- C:\WINDOWS\System32\CmdLineExt03.dll
[2010/06/24 03:18:43 | 000,084,240 | ---- | C] () -- C:\Documents and Settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
[2010/05/12 09:46:37 | 000,000,262 | ---- | C] () -- C:\WINDOWS\{789289CA-F73A-4A16-A331-54D498CE069F}_WiseFW.ini
[2010/01/05 11:53:10 | 000,082,289 | R--- | C] () -- C:\WINDOWS\System32\lvcoinst.ini
[2009/10/20 22:51:55 | 000,354,816 | ---- | C] () -- C:\WINDOWS\System32\psisdecd.dll
[2009/10/07 01:46:36 | 000,025,752 | ---- | C] () -- C:\WINDOWS\System32\drivers\LVPr2Mon.sys
[2009/10/07 01:23:08 | 000,013,584 | ---- | C] () -- C:\WINDOWS\System32\drivers\iKeyLFT2.dll
[2009/08/03 15:07:42 | 000,403,816 | ---- | C] () -- C:\WINDOWS\System32\OGACheckControl.dll
[2009/07/17 14:03:53 | 000,000,151 | ---- | C] () -- C:\WINDOWS\PhotoSnapViewer.INI
[2009/06/04 23:29:19 | 000,000,000 | ---- | C] () -- C:\WINDOWS\SelSet.INI
[2009/06/03 11:14:16 | 000,000,331 | ---- | C] () -- C:\WINDOWS\doom3.ini
[2009/05/28 18:46:21 | 000,870,128 | ---- | C] () -- C:\Documents and Settings\bubba\Application Data\mcs.rma
[2009/05/28 18:46:21 | 000,000,004 | ---- | C] () -- C:\Documents and Settings\bubba\Application Data\2E30D1
[2009/05/28 15:46:34 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2009/05/28 15:46:33 | 000,000,063 | ---- | C] () -- C:\WINDOWS\mdm.ini
[2009/05/28 15:46:25 | 000,000,000 | ---- | C] () -- C:\WINDOWS\NSREX.INI
[2009/05/04 14:00:59 | 000,057,856 | ---- | C] () -- C:\Documents and Settings\bubba\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2009/04/25 00:49:55 | 000,000,000 | ---- | C] () -- C:\WINDOWS\iplayer.INI
[2009/04/15 22:27:40 | 000,000,156 | ---- | C] () -- C:\WINDOWS\NeroDigital.ini
[2009/04/11 19:07:48 | 000,021,840 | ---- | C] () -- C:\WINDOWS\System32\SIntfNT.dll
[2009/04/11 19:07:48 | 000,017,212 | ---- | C] () -- C:\WINDOWS\System32\SIntf32.dll
[2009/04/11 19:07:48 | 000,012,067 | ---- | C] () -- C:\WINDOWS\System32\SIntf16.dll
[2009/04/10 18:52:25 | 000,000,416 | ---- | C] () -- C:\WINDOWS\hegames.ini
[2009/04/10 14:58:24 | 000,002,554 | ---- | C] () -- C:\WINDOWS\WAVEMIX.INI
[2009/04/10 14:58:16 | 000,000,188 | ---- | C] () -- C:\WINDOWS\SimTower.ini
[2009/04/10 14:50:45 | 000,000,660 | ---- | C] () -- C:\WINDOWS\SIERRA.INI
[2009/04/09 11:38:56 | 000,000,023 | ---- | C] () -- C:\WINDOWS\BlendSettings.ini
[2009/04/09 10:45:57 | 000,143,360 | R--- | C] () -- C:\WINDOWS\System32\RtlCPAPI.dll
[2009/04/09 10:42:39 | 000,006,016 | ---- | C] () -- C:\WINDOWS\System32\drivers\ALLOW-IO.SYS
[2009/04/09 02:13:13 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2009/03/03 12:18:04 | 000,073,728 | ---- | C] () -- C:\WINDOWS\System32\RtNicProp32.dll
[2008/10/28 17:40:48 | 000,173,552 | ---- | C] () -- C:\WINDOWS\System32\xlive.dll.cat
[2008/05/03 08:16:00 | 000,286,720 | ---- | C] () -- C:\WINDOWS\System32\nvnt4cpl.dll
[1999/01/22 13:46:58 | 000,065,536 | ---- | C] () -- C:\WINDOWS\System32\MSRTEDIT.DLL
[1997/06/13 18:56:08 | 000,056,832 | ---- | C] () -- C:\WINDOWS\System32\iyvu9_32.dll

< End of report >

OTL Extras logfile created on: 2/9/2011 8:36:50 PM - Run 1
OTL by OldTimer - Version 3.2.20.6 Folder = C:\Documents and Settings\bubba\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

3.00 Gb Total Physical Memory | 2.00 Gb Available Physical Memory | 76.00% Memory free
5.00 Gb Paging File | 4.00 Gb Available in Paging File | 87.00% Paging File free
Paging file location(s): C:\pagefile.sys 2046 4092 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 298.08 Gb Total Space | 86.83 Gb Free Space | 29.13% Space Free | Partition Type: NTFS
Drive D: | 2.56 Gb Total Space | 0.00 Gb Free Space | 0.00% Space Free | Partition Type: UDF

Computer Name: JOSH | User Name: bubba | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*

[HKEY_USERS\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Classes\<extension>]
.html [@ = FirefoxHTML] -- C:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- rundll32.exe shell32.dll,Control_RunDLL "%1",%*
exefile [open] -- "%1" %*
http [open] -- Reg Error: Key error.
https [open] -- Reg Error: Key error.
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0
"AntiVirusDisableNotify" = 1
"FirewallDisableNotify" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]
"DisableMonitoring" = 1

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

========== System Restore Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sr]
"Start" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SrService]
"Start" = 2

========== Firewall Settings ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List]
"139:TCP" = 139:TCP:*:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:*:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:*:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:*:Enabled:@xpsp2res.dll,-22002

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 0
"DoNotAllowExceptions" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008
"139:TCP" = 139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"C:\WINDOWS\explorer.exe" = C:\WINDOWS\explorer.exe:*:Enabled:Windows Shell -- (Microsoft Corporation)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\Diablo II\Game.exe" = C:\Program Files\Diablo II\Game.exe:*:Enabled:Diablo II -- (Blizzard North)
"D:\Installation\Setupx.exe" = D:\Installation\Setupx.exe:*:Enabled:Nero ProductSetup
"C:\Program Files\Microsoft Games\Age of Empires II\age2_x1\AGE2_X1.ICD" = C:\Program Files\Microsoft Games\Age of Empires II\age2_x1\AGE2_X1.ICD:*:Enabled:Age of Empires II Expansion -- (Microsoft Corporation)
"C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Civilization4.exe" = C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Civilization4.exe:*:Enabled:Sid Meier's Civilization 4 Gold -- (Firaxis Games)
"C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Warlords\Civ4Warlords.exe" = C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Warlords\Civ4Warlords.exe:*:Enabled:Sid Meier's Civilization 4: Warlords -- (Firaxis Games)
"C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Beyond the Sword\Civ4BeyondSword.exe" = C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Beyond the Sword\Civ4BeyondSword.exe:*:Enabled:Sid Meier's Civilization 4 Beyond the Sword -- (Firaxis Games)
"C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Beyond the Sword\Civ4BeyondSword_PitBoss.exe" = C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization 4 Gold\Beyond the Sword\Civ4BeyondSword_PitBoss.exe:*:Enabled:Sid Meier's Civilization 4 Beyond the Sword Pitboss -- (Firaxis Games)
"C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization IV Colonization\Colonization.exe" = C:\Program Files\2K Games\Firaxis Games\Sid Meier's Civilization IV Colonization\Colonization.exe:*:Enabled:Sid Meier's Civilization IV Colonization -- (Firaxis Games)
"C:\Program Files\Ubisoft\Heroes of Might and Magic V\bin\H5_Game.exe" = C:\Program Files\Ubisoft\Heroes of Might and Magic V\bin\H5_Game.exe:*:Enabled:Heroes of Might and Magic V -- ()
"C:\Program Files\Ubisoft\Heroes of Might and Magic V - Tribes of the East\bin\H5_Game.exe" = C:\Program Files\Ubisoft\Heroes of Might and Magic V - Tribes of the East\bin\H5_Game.exe:*:Enabled:Heroes of Might and Magic V -- ()
"C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Dx9.exe" = C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Dx9.exe:*:Enabled:Assassin's Creed Dx9 -- (Ubisoft)
"C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Dx10.exe" = C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Dx10.exe:*:Enabled:Assassin's Creed Dx10 -- (Ubisoft)
"C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Launcher.exe" = C:\Program Files\Ubisoft\Assassin's Creed\AssassinsCreed_Launcher.exe:*:Enabled:Assassin's Creed Update -- (Ubisoft)
"C:\Program Files\THQ\Dawn Of War\W40k.exe" = C:\Program Files\THQ\Dawn Of War\W40k.exe:*:Enabled:W40k -- (THQ Canada Inc.)
"C:\Program Files\THQ\Dawn Of War\W40kWA.exe" = C:\Program Files\THQ\Dawn Of War\W40kWA.exe:*:Enabled:W40kWA -- (THQ Canada Inc.)
"C:\Program Files\THQ\DarkCrusade\DarkCrusade.exe" = C:\Program Files\THQ\DarkCrusade\DarkCrusade.exe:*:Enabled:DarkCrusade -- (THQ Canada Inc.)
"C:\Program Files\Electronic Arts\EADM\Core.exe" = C:\Program Files\Electronic Arts\EADM\Core.exe:*:Enabled:EA Download Manager -- (Electronic Arts)
"C:\Program Files\Starcraft\StarCraft.exe" = C:\Program Files\Starcraft\StarCraft.exe:*:Enabled:Starcraft -- (Blizzard Entertainment)
"C:\Program Files\BitTorrent\bittorrent.exe" = C:\Program Files\BitTorrent\bittorrent.exe:*:Enabled:BitTorrent -- (BitTorrent, Inc.)
"C:\Program Files\Warcraft III\Warcraft III.exe" = C:\Program Files\Warcraft III\Warcraft III.exe:*:Enabled:Warcraft III -- (Blizzard Entertainment)
"C:\Program Files\V CAST Music with Rhapsody\rhapsody.exe" = C:\Program Files\V CAST Music with Rhapsody\rhapsody.exe:*:Enabled:Rhapsody Media Player -- (RealNetworks, Inc.)
"C:\Program Files\GameTap Web Player\bin\release\GameTapPlayer.exe" = C:\Program Files\GameTap Web Player\bin\release\GameTapPlayer.exe:*:Enabled:GameTap Web Player
"C:\Program Files\GameSpy\Comrade\Comrade.exe" = C:\Program Files\GameSpy\Comrade\Comrade.exe:*:Enabled:Comrade
"C:\Program Files\Steam\Steam.exe" = C:\Program Files\Steam\Steam.exe:*:Enabled:Steam -- (Valve Corporation)
"C:\Program Files\Steam\steamapps\common\prey\prey.exe" = C:\Program Files\Steam\steamapps\common\prey\prey.exe:*:Enabled:Prey -- (Human Head Studios)
"C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" = C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe:*:Enabled:Yahoo! Messenger -- (Yahoo! Inc.)
"C:\Program Files\LimeWire\LimeWire.exe" = C:\Program Files\LimeWire\LimeWire.exe:*:Enabled:LimeWire -- (Lime Wire, LLC)
"C:\Program Files\Skype\Plugin Manager\skypePM.exe" = C:\Program Files\Skype\Plugin Manager\skypePM.exe:*:Enabled:Skype Extras Manager
"C:\Program Files\Common Files\Nero\Nero Web\SetupX.exe" = C:\Program Files\Common Files\Nero\Nero Web\SetupX.exe:*:Enabled:Nero ControlCenter
"C:\Documents and Settings\bubba\Local Settings\Temp\OnlineUpdate8\SetupXu.exe" = C:\Documents and Settings\bubba\Local Settings\Temp\OnlineUpdate8\SetupXu.exe:*:Enabled:Nero ControlCenter
"C:\Program Files\MoRUN.net\StickerLite\sticker.exe" = C:\Program Files\MoRUN.net\StickerLite\sticker.exe:*:Enabled:MoRUN.net Sticker Lite
"C:\Program Files\SecondLife\SLVoice.exe" = C:\Program Files\SecondLife\SLVoice.exe:*:Enabled:SLVoice
"C:\Program Files\World of Warcraft\WoW-3.2.0-enUS-downloader.exe" = C:\Program Files\World of Warcraft\WoW-3.2.0-enUS-downloader.exe:*:Enabled:Blizzard Downloader
"C:\Program Files\World of Warcraft\Launcher.exe" = C:\Program Files\World of Warcraft\Launcher.exe:*:Enabled:Blizzard Launcher
"C:\Program Files\Ventrilo\Ventrilo.exe" = C:\Program Files\Ventrilo\Ventrilo.exe:*:Enabled:Ventrilo.exe -- (Flagship Industries, Inc.)
"C:\Documents and Settings\bubba\Local Settings\Apps\2.0\1NEBWX2E.ECL\3XVPH847.6KT\curs..tion_eee711038731a406_0004.0000_172b37d8269e5e48\CurseClient.exe" = C:\Documents and Settings\bubba\Local Settings\Apps\2.0\1NEBWX2E.ECL\3XVPH847.6KT\curs..tion_eee711038731a406_0004.0000_172b37d8269e5e48\CurseClient.exe:*:Enabled:Curse Client 4.0
"C:\Program Files\Google\Google Earth\client\googleearth.exe" = C:\Program Files\Google\Google Earth\client\googleearth.exe:*:Enabled:Google Earth
"C:\Program Files\Activision\Prototype\prototypef.exe" = C:\Program Files\Activision\Prototype\prototypef.exe:*:Enabled:Prototype™ -- (Activision)
"C:\Program Files\StarCraft II\StarCraft II.exe" = C:\Program Files\StarCraft II\StarCraft II.exe:*:Enabled:Blizzard Launcher -- (Blizzard Entertainment)
"C:\Program Files\StarCraft II\Versions\Base15405\SC2.exe" = C:\Program Files\StarCraft II\Versions\Base15405\SC2.exe:*:Enabled:StarCraft II -- (Blizzard Entertainment, Inc.)
"C:\Program Files\Google\Google Earth\plugin\geplugin.exe" = C:\Program Files\Google\Google Earth\plugin\geplugin.exe:*:Enabled:Google Earth
"C:\Program Files\Steam\steamapps\common\fallout new vegas\FalloutNVLauncher.exe" = C:\Program Files\Steam\steamapps\common\fallout new vegas\FalloutNVLauncher.exe:*:Enabled:Fallout: New Vegas -- (Bethesda Softworks, Obsidian Entertainment)
"C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe" = C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe:*:Enabled:McAfee Shared Service Host -- (McAfee, Inc.)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}" = Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
"{014585C8-7557-11D4-9ABA-006067325E47}" = Baldur's Gate™ II - Shadows of Amn™ Bonus CD
"{048298C9-A4D3-490B-9FF9-AB023A9238F3}" = Steam
"{13F3917B56CD4C25848BDC69916971BB}" = DivX Converter
"{18D10072035C4515918F7E37EAFAACFC}" = AutoUpdate
"{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
"{20071984-5EB1-4881-8EDB-082532ACEC6D}" = Heroes of Might and Magic V
"{238DCFCD-70B3-46B2-B90B-2CDCC69A3D03}" = Zoo Tycoon 2 - Zookeeper Collection
"{26A24AE4-039D-4CA4-87B4-2F83216020FF}" = Java™ 6 Update 21
"{28BE306E-5DA6-4F9C-BDB0-DBA3C8C6FFFD}" = QuickTime
"{297C7552-BA68-4F73-AB83-82510777421D}_is1" = Fallout 3 - Unofficial Fallout 3 Patch
"{2A9A40C7-6670-4D5F-8F41-D12E2E08B48B}" = Star Wars®: Knights of the Old Republic ™
"{2D37F6AE-D201-4580-B91A-6BF9BB93ED2D}" = The Sims™ 2 Double Deluxe
"{32E4F0D2-C135-475E-A841-1D59A0D22989}" = Sid Meier's Civilization 4 - Beyond the Sword
"{32F27FAA-60D1-4EC3-8502-51AEC72BF50F}" = DarkCrusade
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{35CB6715-41F8-4F99-8881-6FC75BF054B0}" = Oblivion
"{3921A67A-5AB1-4E48-9444-C71814CF3027}" = VCRedistSetup
"{3FC7CBBC4C1E11DCA1A752EA55D89593}" = DivX Version Checker
"{45A66726-69BC-466B-A7A4-12FCBA4883D7}" = HiJackThis
"{46C045BF-2B3F-4BC4-8E4C-00E0CF8BD9DB}" = Adobe AIR
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{4AA3D64E-9EC3-4B0F-AB91-5885AC55641F}" = Microsoft Games for Windows - LIVE
"{553255F3-78FD-40F1-A6F8-6882140265FE}" = Apple Application Support
"{55502C49-F061-428C-BF26-06ECDFB3AC29}" = Sid Meier's Civilization 4 Gold
"{56C049BE-79E9-4502-BEA7-9754A3E60F9B}" = neroxml
"{584267B8-0BB0-4D18-9FFA-726576619E9A}" = Doom 3
"{5C474A83-A45F-470C-9AC8-2BD1C251BF9A}" = Skype™ 4.2
"{5EE7D259-D137-4438-9A5F-42F432EC0421}" = VC80CRTRedist - 8.0.50727.4053
"{65422AD6-A33F-49C6-A02C-A6FD81FAAEB2}_is1" = Tropico Reloaded
"{66FF4C48-0083-4E60-8556-B883AB200091}" = Heroes of Might & Magic V: Hammers of Fate
"{66FF4C48-0083-4E60-8556-B883AB200092}" = Heroes of Might and Magic V - Tribes of the East
"{6956856F-B6B3-4BE0-BA0B-8F495BE32033}" = Apple Software Update
"{7299052b-02a4-4627-81f2-1818da5d550d}" = Microsoft Visual C++ 2005 Redistributable
"{76703039-C98C-4e62-A12C-4D7066BE9985}" = The Sims™ 2 University Life Collection
"{789289CA-F73A-4A16-A331-54D498CE069F}" = Ventrilo Client
"{7B63B2922B174135AFC0E1377DD81EC2}" = DivX Codec
"{7FE01684-4C95-FB0E-061D-EDB29166B98B}" = Warner Bros. Digital Copy Manager
"{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" = Microsoft Visual C++ 2005 Redistributable
"{87F6C83D-F949-4d14-B5CB-DC8C75F8932D}" = The Sims™ 2 FreeTime
"{8ADFC4160D694100B5B8A22DE9DCABD9}" = DivX Player
"{8CFA9151-6404-409A-AF22-4632D04582FD}" = Assassin's Creed
"{8F99E711-CE74-4718-BE04-19D1A53A735C}" = Warhammer 40,000: Dawn Of War - Platinum Edition
"{90120000-0010-0409-0000-0000000FF1CE}" = Microsoft Software Update for Web Folders (English) 12
"{90120000-0015-0409-0000-0000000FF1CE}" = Microsoft Office Access MUI (English) 2007
"{90120000-0015-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0016-0409-0000-0000000FF1CE}" = Microsoft Office Excel MUI (English) 2007
"{90120000-0016-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0018-0409-0000-0000000FF1CE}" = Microsoft Office PowerPoint MUI (English) 2007
"{90120000-0018-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0019-0409-0000-0000000FF1CE}" = Microsoft Office Publisher MUI (English) 2007
"{90120000-0019-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-001A-0409-0000-0000000FF1CE}" = Microsoft Office Outlook MUI (English) 2007
"{90120000-001A-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-001B-0409-0000-0000000FF1CE}" = Microsoft Office Word MUI (English) 2007
"{90120000-001B-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-001F-0409-0000-0000000FF1CE}" = Microsoft Office Proof (English) 2007
"{90120000-001F-0409-0000-0000000FF1CE}_ENTERPRISE_{ABDDE972-355B-4AF1-89A8-DA50B7B5C045}" = Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
"{90120000-001F-040C-0000-0000000FF1CE}" = Microsoft Office Proof (French) 2007
"{90120000-001F-040C-0000-0000000FF1CE}_ENTERPRISE_{F580DDD5-8D37-4998-968E-EBB76BB86787}" = Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
"{90120000-001F-0C0A-0000-0000000FF1CE}" = Microsoft Office Proof (Spanish) 2007
"{90120000-001F-0C0A-0000-0000000FF1CE}_ENTERPRISE_{187308AB-5FA7-4F14-9AB9-D290383A10D9}" = Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
"{90120000-0020-0409-0000-0000000FF1CE}" = Compatibility Pack for the 2007 Office system
"{90120000-002C-0409-0000-0000000FF1CE}" = Microsoft Office Proofing (English) 2007
"{90120000-0030-0000-0000-0000000FF1CE}" = Microsoft Office Enterprise 2007
"{90120000-0030-0000-0000-0000000FF1CE}_ENTERPRISE_{0B36C6D6-F5D8-4EAF-BF94-4376A230AD5B}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0030-0000-0000-0000000FF1CE}_ENTERPRISE_{3D019598-7B59-447A-80AE-815B703B84FF}" = Security Update for Microsoft Office system 2007 (972581)
"{90120000-0044-0409-0000-0000000FF1CE}" = Microsoft Office InfoPath MUI (English) 2007
"{90120000-0044-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-006E-0409-0000-0000000FF1CE}" = Microsoft Office Shared MUI (English) 2007
"{90120000-006E-0409-0000-0000000FF1CE}_ENTERPRISE_{DE5A002D-8122-4278-A7EE-3121E7EA254E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-00A1-0409-0000-0000000FF1CE}" = Microsoft Office OneNote MUI (English) 2007
"{90120000-00A1-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-00BA-0409-0000-0000000FF1CE}" = Microsoft Office Groove MUI (English) 2007
"{90120000-00BA-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0114-0409-0000-0000000FF1CE}" = Microsoft Office Groove Setup Metadata MUI (English) 2007
"{90120000-0114-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0115-0409-0000-0000000FF1CE}" = Microsoft Office Shared Setup Metadata MUI (English) 2007
"{90120000-0115-0409-0000-0000000FF1CE}_ENTERPRISE_{DE5A002D-8122-4278-A7EE-3121E7EA254E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90120000-0117-0409-0000-0000000FF1CE}" = Microsoft Office Access Setup Metadata MUI (English) 2007
"{90120000-0117-0409-0000-0000000FF1CE}_ENTERPRISE_{2FC4457D-409E-466F-861F-FB0CB796B53E}" = Microsoft Office 2007 Service Pack 2 (SP2)
"{90850409-6000-11D3-8CFE-0150048383C9}" = Microsoft Office Word Viewer 2003
"{9322A850-9091-4D0E-B252-3E82EDA3D94A}" = Prototype™
"{941F9BA8-06F6-42FD-AB91-CFB99B5E13BF}" = Fallout
"{974C4B12-4D02-4879-85E0-61C95CC63E9E}" = Fallout 3
"{97A19679-4C07-4B34-8ACB-D5565C3440FC}" = Stronghold
"{981029E0-7FC9-4CF3-AB39-6F133621921A}" = Skype Toolbars
"{9A00D1BA-D03A-44E5-AF28-86A1F377DF61}" = The Sims Makin' Magic
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{A96E97134CA649888820BCDE5E300BBD}" = H.264 Decoder
"{AAC389499AEF40428987B3D30CFC76C9}" = MKV Splitter
"{AB05F2C8-F608-403b-95E1-FD8ADFACD31E}" = Windows 7 Upgrade Advisor
"{AC76BA86-7AD7-1033-7B44-A93000000001}" = Adobe Reader 9.3.4
"{AC76BA86-7AD7-1033-7B44-A94000000001}" = Adobe Reader 9.4.2
"{ACCA20B0-C4D1-4BF5-BF21-0A0EB5EF9730}" = REALTEK GbE & FE Ethernet PCI NIC Driver
"{AEF9DC35ADDF4825B049ACBFD1C6EB37}" = AAC Decoder
"{B13A7C41581B411290FBC0395694E2A9}" = DivX Converter
"{B2544A03-10D0-4E5E-BA69-0362FFC20D18}" = OGA Notifier 2.0.0048.0
"{B343B0E3-212A-40B9-8207-1BD299228F5D}" = Fallout 3 - The Garden of Eden Creation Kit
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{B7050CBDB2504B34BC2A9CA0A692CC29}" = DivX Plus Web Player
"{B8C3B479-1716-11D5-968A-0050BA84F5F7}" = Baldur's Gate™ II - Throne of Bhaal ™
"{BAF78226-3200-4DB4-BE33-4D922A799840}" = Windows Presentation Foundation
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{C27BC2A2-30DD-4014-B22E-63EB0DB572F9}" = Logitech Webcam Software
"{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}" = Microsoft .NET Framework 1.1
"{CBE0FCA1-4E95-11D4-9875-00105ACE7734}" = Logitech User's Guide
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{E280923D-C5D9-4728-8C79-AC9A0DC75875}" = BioShock
"{EA450D5D-95EA-4FD0-B8B0-6D8E68FBE2C7}" = Impulse
"{EBC0E8C0-63AC-11D4-BEF2-00A0C9E0B324}" = StarTopia
"{EEFB15EB-FE8B-47DF-A496-1C4D1420294A}" = Doom 3
"{EF36A836-BF89-4A4F-B079-057B0C68C1E0}" = Sid Meier's Civilization IV Colonization
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"{FD052FB9-FE90-4438-B355-15EDC89D8FB1}" = Microsoft Games for Windows - LIVE Redistributable
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 10 Plugin
"Age of Empires 2.0" = Microsoft Age of Empires II
"Age of Empires Gold 1.0" = Microsoft Age of Empires Gold
"Age of Empires II: The Conquerors Expansion 1.0" = Microsoft Age of Empires II: The Conquerors Expansion
"Are You Smarter Than a 5th Grader_is1" = Are You Smarter Than a 5th Grader
"BitTorrent" = BitTorrent
"Build A Lot_is1" = Build A Lot
"CCleaner" = CCleaner (remove only)
"com.warnerbros.DigitalCopyManager.449F66ACC381FDC604DC2AA255FEECEEBBBEE1E5.1" = Warner Bros. Digital Copy Manager
"CPUID CPU-Z_is1" = CPUID CPU-Z 1.55
"Diablo II" = Diablo II
"DivX Plus DirectShow Filters" = DivX Plus DirectShow Filters
"DOOM Collector's Edition" = DOOM Collector's Edition
"Download Manager" = Download Manager 2.3.10
"EADM" = EA Download Manager
"ENTERPRISE" = Microsoft Office Enterprise 2007
"Fallout 2 Restoration Project_is1" = FO2 Expansion Pack 1.2
"Fallout Tactics" = Fallout Tactics
"Fallout2" = Fallout2
"Galactic Civilizations II - Dread Lords" = Galactic Civilizations II - Dread Lords
"Generic Mod Manager_is1" = Fallout Mod Manager 0.13.21
"Half-Life" = Half-Life
"ie8" = Windows Internet Explorer 8
"Impulse" = Impulse
"InstallShield_{9322A850-9091-4D0E-B252-3E82EDA3D94A}" = Prototype™
"InstallShield_{EEFB15EB-FE8B-47DF-A496-1C4D1420294A}" = Doom 3
"KEMailKb" = KEMailKb
"LimeWire" = LimeWire 5.5.7
"lvdrivers_12.10" = Logitech Webcam Software Driver Package
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 1.1 (1033)" = Microsoft .NET Framework 1.1
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Mozilla Firefox (3.6.13)" = Mozilla Firefox (3.6.13)
"MSC" = McAfee SecurityCenter
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"NVIDIA Drivers" = NVIDIA Drivers
"NVIDIA nView Desktop Manager" = NVIDIA nView Desktop Manager
"Oblivion mod manager_is1" = Oblivion mod manager 1.1.12
"OT32CD12" = The Oregon Trail
"Prison Tycoon 2" = Prison Tycoon 2
"Secunia PSI" = Secunia PSI
"Sid Meier's Pirates!" = Sid Meier's Pirates!
"Sierra Utilities" = Sierra Utilities
"SimCity 3000" = SimCity 3000
"SimTown95v1" = SimTown
"Starcraft" = Starcraft
"StarCraft II" = StarCraft II
"Steam App 22380" = Fallout: New Vegas
"Steam App 3970" = Prey
"Unofficial Oblivion Patch_is1" = Unofficial Oblivion Patch v3.2.0
"V CAST Music with Rhapsody" = V CAST Music with Rhapsody
"WIC" = Windows Imaging Component
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"WinRAR archiver" = WinRAR archiver
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0
"XpsEPSC" = XML Paper Specification Shared Components Pack 1.0
"Yahoo! Messenger" = Yahoo! Messenger

========== HKEY_USERS Uninstall List ==========

[HKEY_USERS\S-1-5-21-1614895754-926492609-725345543-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Facebook Plug-In" = Facebook Plug-In
"SOE-Free Realms" = Free Realms
"Warcraft III" = Warcraft III: All Products
"WinDirStat" = WinDirStat 1.1.2
"XBMC" = XBMC

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:14 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 3:09:16 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 2/6/2011 10:24:49 PM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: A connection with the server could not be established

Error - 2/7/2011 11:23:37 AM | Computer Name = JOSH | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

[ System Events ]
Error - 2/5/2011 5:02:21 PM | Computer Name = JOSH | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 2/5/2011 5:06:44 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7032
Description = The Service Control Manager tried to take a corrective action (Restart
the service) after the unexpected termination of the Windows Management Instrumentation
service, but this action failed with the following error: %%1056

Error - 2/5/2011 6:21:32 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7032
Description = The Service Control Manager tried to take a corrective action (Restart
the service) after the unexpected termination of the Windows Management Instrumentation
service, but this action failed with the following error: %%1056

Error - 2/5/2011 6:42:43 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7032
Description = The Service Control Manager tried to take a corrective action (Restart
the service) after the unexpected termination of the Windows Management Instrumentation
service, but this action failed with the following error: %%1056

Error - 2/8/2011 5:50:50 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7000
Description = The MCSTRM service failed to start due to the following error: %%2

Error - 2/8/2011 5:50:50 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7000
Description = The X4HSX32 service failed to start due to the following error: %%3

Error - 2/8/2011 5:50:58 PM | Computer Name = JOSH | Source = Ftdisk | ID = 262189
Description = The system could not sucessfully load the crash dump driver.

Error - 2/8/2011 5:50:58 PM | Computer Name = JOSH | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 2/8/2011 9:15:07 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7000
Description = The MCSTRM service failed to start due to the following error: %%2

Error - 2/8/2011 9:15:07 PM | Computer Name = JOSH | Source = Service Control Manager | ID = 7000
Description = The X4HSX32 service failed to start due to the following error: %%3


< End of report >

#4 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 10 February 2011 - 04:49 PM

Hello Slick98,

Just FYI, if you don't want people attaching documents to their posts, you should suggest that a mod should change the preparation guide, it asks you to attach a file. Here are the logs you requested.

The main reason why I have that tidbit in my introduction post is because there are some sites that I do help out on like BleepingComputer that instruct users to attach their logs instead of posting them to their post. I personally prefer to have the logs posted as it is easier for me to work with them, and avoids cluttering my Desktop with all of the files. Nonetheless, I appreciate you taking the time to bring it to my attention anyways. :)


The TDSSKiller scan found an infection on your computer. Please read the warning after the snippet of text below:

2011/02/09 20:29:49.0015 4560 Detected object count: 1
2011/02/09 20:30:10.0687 4560 RDPCDD (66a28c06b38bc0b2f338cfa8962c8a8b) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/02/09 20:30:10.0687 4560 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\RDPCDD.sys. Real md5: 66a28c06b38bc0b2f338cfa8962c8a8b, Fake md5: 4912d5b403614ce99c28420f75353332
2011/02/09 20:30:16.0812 4560 Backup copy found, using it..
2011/02/09 20:30:16.0828 4560 C:\WINDOWS\system32\DRIVERS\RDPCDD.sys - will be cured after reboot
2011/02/09 20:30:16.0828 4560 Rootkit.Win32.TDSS.tdl3(RDPCDD) - User select action: Cure
2011/02/09 20:30:24.0437 2292 Deinitialize success




Posted Image One or more of the identified infections is a backdoor trojan and password stealer.

This type of infection allows hackers to access and remotely control your computer, log keystrokes, steal critical system information, and download and execute files without your knowledge.
If you do any banking or other financial transactions on the PC or if it contains any other sensitive information, then from a clean computer, change all passwords where applicable.
It would also be wise to contact those same financial institutions to appraise them of your situation.


I highly suggest you take a look at the two links provided below:
1. How Do I Handle Possible Identify Theft, Internet Fraud, and CC Fraud?
2. When should I re-format? How should I reinstall?


We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.



NEXT:



OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.

    :Services
    :OTL
    FF - prefs.js..browser.search.defaultenginename: "Fast Browser Search"
    FF - prefs.js..browser.search.defaultthis.engineName: "Fast Browser Search"
    FF - prefs.js..browser.search.order.1: "Fast Browser Search"
    FF - prefs.js..network.proxy.type: 4
    [2010/08/03 17:54:26 | 000,000,000 | ---D | M] (XUL Cache) -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}
    [2009/12/06 19:00:13 | 000,005,413 | ---- | M] () -- C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\searchplugins\fast-browser-search.xml
    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
    O2 - BHO: (no name) - {8A9D74F9-560B-4FE7-ABEB-3B2E638E5CD6} - No CLSID value found.
    O2 - BHO: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
    O3 - HKU\S-1-5-21-1614895754-926492609-725345543-1003\..\Toolbar\WebBrowser: (no name) - {D4027C7F-154A-4066-A1AD-4243D8127440} - No CLSID value found.
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
    O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell - "" = AutoRun
    O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell\AutoRun - "" = Auto&Play
    O33 - MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\Shell\AutoRun\command - "" = D:\AutoRun.exe -- [2009/08/28 15:23:36 | 000,703,552 | R--- | M] (Electronic Arts Inc.)
    [2011/01/27 12:39:08 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\bubba\Application Data\Smart Internet Protection 2011(2)
    [2011/01/21 20:26:09 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\bubba\Application Data\.#
    [6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
    [1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
    [1 C:\Documents and Settings\bubba\*.tmp files -> C:\Documents and Settings\bubba\*.tmp -> ]
    [6 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
    [1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
    [1 C:\Documents and Settings\bubba\*.tmp files -> C:\Documents and Settings\bubba\*.tmp -> ]
    [2009/05/28 18:46:21 | 000,870,128 | ---- | C] () -- C:\Documents and Settings\bubba\Application Data\mcs.rma
    [2009/05/28 18:46:21 | 000,000,004 | ---- | C] () -- C:\Documents and Settings\bubba\Application Data\2E30D1
    
    :Reg
    
    :Files
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [emptytemp]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click Posted Image.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:



Malwarebytes' Anti-Malware

I see that you have Malwarebytes' Anti-Malware installed on your computer could you please do a scan using these settings:

  • Open Malwarebytes' Anti-Malware
  • Select the Update tab
  • Click Check for Updates
  • After the update have been completed, Select the Scanner tab.
  • Select Perform quick scan, then click on Scan
  • Leave the default options as it is and click on Start Scan
  • When done, you will be prompted. Click OK, then click on Show Results
  • Checked (ticked) all items and click on Remove Selected
  • After it has removed the items, Notepad will open. Please post this log in your next reply. You can also find the log in the Logs tab. The bottom most log is the latest
Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT:



Please provide me with an update on how things are currently running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#5 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 11 February 2011 - 09:51 PM

ST, I'd like to go ahead and see what can be done to clean the system up. Here are the logs.




All processes killed
========== SERVICES/DRIVERS ==========
========== OTL ==========
Prefs.js: "Fast Browser Search" removed from browser.search.defaultenginename
Prefs.js: "Fast Browser Search" removed from browser.search.defaultthis.engineName
Prefs.js: "Fast Browser Search" removed from browser.search.order.1
Prefs.js: 4 removed from network.proxy.type
C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\defaults\preferences folder moved successfully.
C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\defaults folder moved successfully.
C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\chrome folder moved successfully.
C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98} folder moved successfully.
C:\Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\searchplugins\fast-browser-search.xml moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8A9D74F9-560B-4FE7-ABEB-3B2E638E5CD6}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8A9D74F9-560B-4FE7-ABEB-3B2E638E5CD6}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{D4027C7F-154A-4066-A1AD-4243D8127440} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}\ not found.
Registry value HKEY_USERS\S-1-5-21-1614895754-926492609-725345543-1003\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{D4027C7F-154A-4066-A1AD-4243D8127440} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}\ not found.
Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7}
Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\DownloadInformation\\INF .
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72375343-24e6-11de-a4df-806d6172696f}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72375343-24e6-11de-a4df-806d6172696f}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{72375343-24e6-11de-a4df-806d6172696f}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72375343-24e6-11de-a4df-806d6172696f}\ not found.
File move failed. D:\AutoRun.exe scheduled to be moved on reboot.
C:\Documents and Settings\bubba\Application Data\Smart Internet Protection 2011(2) folder moved successfully.
C:\Documents and Settings\bubba\Application Data\.# folder moved successfully.
C:\WINDOWS\003054_.tmp deleted successfully.
C:\WINDOWS\msdownld.tmp folder deleted successfully.
C:\WINDOWS\SET29.tmp deleted successfully.
C:\WINDOWS\SET3.tmp deleted successfully.
C:\WINDOWS\SET4.tmp deleted successfully.
C:\WINDOWS\SET8.tmp deleted successfully.
C:\WINDOWS\System32\CONFIG.TMP deleted successfully.
C:\Documents and Settings\bubba\bqjnoivcwc.tmp deleted successfully.
C:\Documents and Settings\bubba\Application Data\mcs.rma moved successfully.
C:\Documents and Settings\bubba\Application Data\2E30D1 moved successfully.
========== REGISTRY ==========
========== FILES ==========
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Documents and Settings\bubba\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\bubba\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
Restore point Set: OTL Restore Point (0)

[EMPTYTEMP]

User: All Users

User: bubba
->Temp folder emptied: 471369 bytes
->Temporary Internet Files folder emptied: 250584297 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 73759979 bytes
->Flash cache emptied: 4826152 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 56502 bytes

User: LocalService
->Temp folder emptied: 66016 bytes
->Temporary Internet Files folder emptied: 226766 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 908002 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 109080 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 53542320 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 3121985 bytes

Total Files Cleaned = 370.00 mb


[EMPTYFLASH]

User: All Users

User: bubba
->Flash cache emptied: 0 bytes

User: Default User
->Flash cache emptied: 0 bytes

User: LocalService

User: NetworkService

Total Flash Files Cleaned = 0.00 mb


OTL by OldTimer - Version 3.2.20.6 log created on 02112011_192701

Files\Folders moved on Reboot...
File move failed. D:\AutoRun.exe scheduled to be moved on reboot.

Registry entries deleted on Reboot...


Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5743

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/11/2011 7:41:07 PM
mbam-log-2011-02-11 (19-41-07).txt

Scan type: Quick scan
Objects scanned: 136937
Time elapsed: 3 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\bubba\application data\020000006781c806976c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\bubba\application data\020000006781c806976o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\bubba\application data\020000006781c806976p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\bubba\application data\020000006781c806976s.manifest (Malware.Trace) -> Quarantined and deleted successfully.

#6 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 12 February 2011 - 09:45 AM

Slick98,

ST, I'd like to go ahead and see what can be done to clean the system up. Here are the logs.

Okay. :)


ESET Online Scanner
I'd like us to scan your machine with ESET Online Scan

Note: It is recommended to disable on-board anti-virus program and anti-spyware programs while performing scans so there are no conflicts and it will speed up scan time.
Please don't go surfing while your resident protection is disabled!
Once the scan is finished remember to re-enable your anti-virus along with your anti-spyware programs.



  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Make sure that the option "Remove found threats" is Unchecked
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin
    scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as
    ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NEXT:



Security Check
Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#7 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 12 February 2011 - 09:33 PM

Here you go. I also just realized the onboard speaker beeps occasionally, which has been going on since before you started helping me.


C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinProlacop.zip Win32/Bagle.gen.zip worm
C:\_OTL\MovedFiles\02112011_192701\C_Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\_OTL\MovedFiles\02112011_192701\C_Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\chrome\xulcache.jar JS/Agent.NCP trojan



Results of screen317's Security Check version 0.99.8
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Disabled!
ESET Online Scanner v3
McAfee SecurityCenter
Antivirus up to date! (On Access scanning disabled!)
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
CCleaner (remove only)
Java™ 6 Update 21
Out of date Java installed!
Adobe Flash Player 10.1.102.64
Adobe Reader 9.3.4
Adobe Reader 9.4.2
Out of date Adobe Reader installed!
Mozilla Firefox (3.6.13)
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````

#8 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 12 February 2011 - 09:36 PM

Java™ 6 Update 21
Out of date Java installed!
Adobe Flash Player 10.1.102.64
Adobe Reader 9.3.4
Adobe Reader 9.4.2
Out of date Adobe Reader installed!


I swear I update Java and Adobe every day. Not sure if that's related though.

#9 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 13 February 2011 - 09:34 AM

Slick98,

Lets review the results from ESET Online Scanner:

C:\_OTL\MovedFiles\02112011_192701\C_Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\_OTL\MovedFiles\02112011_192701\C_Documents and Settings\bubba\Application Data\Mozilla\Firefox\Profiles\clv5smve.default\extensions\{7e43f0d7-73f2-40ce-94f5-cd647e684b98}\chrome\xulcache.jar JS/Agent.NCP trojan

The following 2 files are in Quarantine, and will be dealt with once we clean-up our tools.


Update Adobe Reader
Earlier versions of Adobe Reader have known security flaws so it is recommended that you update your copy
  • Go to Start > Control Panel > Add/Remove Programs
  • Remove ALL instances of Adobe Reader
  • Re-boot your computer as required.
  • Once ALL versions of Adobe Reader have been uninstalled, visit: <<here>> and download the latest version of Adobe Reader
Alternative Option: after uninstalling Adobe Reader, you could try installing Foxit Reader from >here< Foxit Reader has fewer add-ons therefore loads more quickly.



NEXT:



Java Outdated
Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Microsoft: ‘Unprecedented Wave of Java Exploitation’
Drive-by Trojan preying on out-of-date Java installations
Ghosts of Java Haunt UsersPlease follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows" (32-bit) or "Windows x64" (64-bit).
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "I agree to the Java SE...License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u23-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


NEXT



OTL Fix

We need to run an OTL Fix
  • Please reopen Posted Image on your desktop.
  • Copy and Paste the following code into the Posted Image textbox.

    :Services
    :OTL
    
    :Reg
    
    :Files
    C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinProlacop.zip
    ipconfig /flushdns /c
    :Commands
    [purity]
    [resethosts]
    [CreateRestorePoint]
    [emptytemp]
    [EMPTYFLASH]
    
  • Push Posted Image
  • OTL may ask to reboot the machine. Please do so if asked.
  • Click Posted Image.
  • A report will open. Copy and Paste that report in your next reply.
  • If the machine reboots, the log will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.


NEXT:



Please be sure to include an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#10 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 13 February 2011 - 07:57 PM

ST, Adobe had two instances 9.3.4 and 9.4.x, I was able to remove the 9.4 version, yet the other does not let me remove it. I also tried CCleaner to both remove the program and delete the entry, which stated that I "Can not delete the MSI installer." Here's the reject when trying to uninstall.

"This patch package could not be opened. Verify that the patch package exsists and that you can acess it, or contact the application vendor to verify there is a valid Windows Installer patch package."

I verified, there are still some files in C:\Program Files\Adobe\Reader 9.0.

Java is updated.

All processes killed
========== SERVICES/DRIVERS ==========
========== OTL ==========
========== REGISTRY ==========
========== FILES ==========
File\Folder C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinProlacop.zip not found.
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Documents and Settings\bubba\Desktop\cmd.bat deleted successfully.
C:\Documents and Settings\bubba\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
Restore point Set: OTL Restore Point (0)

[EMPTYTEMP]

User: All Users

User: bubba
->Temp folder emptied: 195951 bytes
->Temporary Internet Files folder emptied: 184875219 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 69091650 bytes
->Flash cache emptied: 62652 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 56502 bytes

User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 109080 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 243.00 mb


[EMPTYFLASH]

User: All Users

User: bubba
->Flash cache emptied: 0 bytes

User: Default User
->Flash cache emptied: 0 bytes

User: LocalService

User: NetworkService

Total Flash Files Cleaned = 0.00 mb


OTL by OldTimer - Version 3.2.20.6 log created on 02132011_174721

Files\Folders moved on Reboot...

Registry entries deleted on Reboot...

#11 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 13 February 2011 - 08:11 PM

Sorry, left off the last direction, google is no longer being redirected. And my server service is staying active.

#12 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 13 February 2011 - 08:17 PM

Slick98,

ST, Adobe had two instances 9.3.4 and 9.4.x, I was able to remove the 9.4 version, yet the other does not let me remove it. I also tried CCleaner to both remove the program and delete the entry, which stated that I "Can not delete the MSI installer." Here's the reject when trying to uninstall.

"This patch package could not be opened. Verify that the patch package exsists and that you can acess it, or contact the application vendor to verify there is a valid Windows Installer patch package."

Try this program to remove the outdated Adobe Reader:

RevoUninstaller
Download and install Revo Uninstaller
  • Double click the Revo Uninstaller icon on your desktop to start the program
  • Scroll through the listed programs and Right Click on the program you wish to uninstall
  • From the pop out menu choose Uninstall
  • Click Yes to the confirmation dialogue
  • In the next window select the Advanced mode
  • Click Next to start uninstalling the program
  • Answer Yes to confirm the uninstall
  • When the program has completed the four steps, click Next to allow the program to search for leftovers
  • Once complete, click Next, then Finish
  • Repeat the above steps for any other programs you wish to remove.


If that doesn't work try this:

Please proceed with running the Adobe Reader removal. After it loads run RevoUninstaller and click on the Hunter Mode button. You should see a bulls-eye appear on your screen. Click and drag it onto the Adobe Reader window. When the drop down menu appears click on Uninstall. See if that will allow you to remove it.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#13 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 14 February 2011 - 12:08 PM

While mulling this over in my head this morning, I just remembered, despite the fact that it is pasted everywhere, that my laptop is an MSI. Could that be related to this issue?

#14 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:08:05 PM

Posted 14 February 2011 - 12:14 PM

No, I don't really think that's the issue. I'd proceed with the previous set of instructions.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#15 Slick98

Slick98
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Phoenix, AZ
  • Local time:05:05 PM

Posted 14 February 2011 - 12:20 PM

RevoUninstaller removed the files. Since I currently have no .pdf reader on the system I went ahead and dumped the leftover registry files and other misc folders. I've never heard of Foxit Reader, do you have any personal preference between the two?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users