Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect, probably others as well


  • This topic is locked This topic is locked
12 replies to this topic

#1 NonPerson

NonPerson

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 18 August 2011 - 05:33 PM

My little brother has just purchased a new laptop and given his previous machine to me. Apparently he has mucked this thing up so badly with malware that he decided to just start over from scratch. Not one to let him simply discard a $3000 Toshiba just because of a few bits of garbage, I come to you BC helpers. I've already run all of your recommended virus and malware scanners and removed what I could on my own. The machine still has Google Redirect that I can't seem to get rid of, and because my brother used peer-to-peer programs and all sorts of other virus superhighways in his daily browsing, I'm sure there are many more problems that MBAM and SAV aren't picking up. I've only had this thing a few days and beyond what I've given here, I don't know much more about its history. Just the same, I'm hoping to get a working rig out of this before I give up.

Toshiba Qosmio running Vista Home 32-bit. That said, here're the logs:

.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_22
Run by Thrash Driveshaft at 16:47:04 on 2011-08-15
AV: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {86355677-4064-3EA7-ABB3-1B136EB04637}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {3D54B793-665E-3129-9103-206115370C8A}
FW: McAfee Firewall *Enabled* {BE0ED752-0A0B-3FFF-80EC-B2269063014C}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\mfevtps.exe
C:\Toshiba\IVP\ISM\pinger.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
C:\Windows\system32\svchost.exe -k imgsvc
c:\Toshiba\IVP\swupdate\swupdtmr.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Toshiba\SmartFaceV\SmartFaceVWatchSrv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe
C:\Program Files\NVIDIA Corporation\Display\nvtray.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe
C:\Program Files\Toshiba\Utilities\KeNotify.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\OpenOffice.org 2.3\program\soffice.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\OpenOffice.org 2.3\program\soffice.BIN
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\conime.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.www.daemon-search.com/default
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\common files\mcafee\systemcore\ScriptSn.20110512214208.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\TOSCDSPD.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [IAAnotif] c:\program files\intel\intel matrix storage manager\iaanotif.exe
mRun: [Camera Assistant Software] "c:\program files\camera assistant software for toshiba\traybar.exe" /start
mRun: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
mRun: [NDSTray.exe] NDSTray.exe
mRun: [HWSetup] \HWSetup.exe hwSetUP
mRun: [SVPWUTIL] c:\program files\toshiba\utilities\SVPWUTIL.exe SVPwUTIL
mRun: [RtHDVCpl] c:\program files\realtek\audio\hda\RtHDVCpl.exe -s
mRun: [KeNotify] c:\program files\toshiba\utilities\KeNotify.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [mcui_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
StartupFolder: c:\users\thrash~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 2.3\program\quickstart.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{5B898E5E-4BEB-494F-96B5-96B8642A02ED} : DhcpNameServer = 192.168.1.254
TCP: Interfaces\{E86EC299-69EB-4F9A-80C4-2B249E2CF0FB} : DhcpNameServer = 192.168.0.1
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\thrash driveshaft\appdata\roaming\mozilla\firefox\profiles\hhly4b8p.default\
FF - prefs.js: browser.startup.homepage - hxxp://katawashoujo.blogspot.com/
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\nvidia corporation\3d vision\npnv3dv.dll
FF - plugin: c:\program files\nvidia corporation\3d vision\npnv3dvstreaming.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Save Image in Folder: {5e594888-3e8e-47da-b2c6-b0b545112f84} - %profile%\extensions\{5e594888-3e8e-47da-b2c6-b0b545112f84}
FF - Ext: DownThemAll!: {DDC359D1-844A-42a7-9AA1-88A850A938A8} - %profile%\extensions\{DDC359D1-844A-42a7-9AA1-88A850A938A8}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TinEye Reverse Image Search: tineye@ideeinc.com - %profile%\extensions\tineye@ideeinc.com
FF - Ext: Greasemonkey: {e4a8a97b-f2ed-450b-b12d-ee082ba24781} - %profile%\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}
FF - Ext: ReloadEvery: {888d99e7-e8b5-46a3-851e-1ec45da1e644} - %profile%\extensions\{888d99e7-e8b5-46a3-851e-1ec45da1e644}
FF - Ext: XUL Cache: {0c886914-4127-4e3a-ac2e-6653489740b8} - %profile%\extensions\{0c886914-4127-4e3a-ac2e-6653489740b8}
FF - Ext: XUL Cache: {8c00f789-a7fb-48c5-9d96-41937a2dba34} - %profile%\extensions\{8c00f789-a7fb-48c5-9d96-41937a2dba34}
FF - Ext: XUL Cache: {d85de5de-40b3-44a5-8031-67ea1594b143} - %profile%\extensions\{d85de5de-40b3-44a5-8031-67ea1594b143}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
============= SERVICES / DRIVERS ===============
.
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2008-10-7 387480]
R1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\drivers\jswpslwf.sys [2008-7-10 20384]
R1 mfenlfk;McAfee NDIS Light Filter;c:\windows\system32\drivers\mfenlfk.sys [2011-2-18 64584]
R1 mfewfpk;McAfee Inc. mfewfpk;c:\windows\system32\drivers\mfewfpk.sys [2011-2-18 165032]
R2 ConfigFree Service;ConfigFree Service;c:\program files\toshiba\configfree\CFSvcs.exe [2008-4-17 40960]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 McMPFSvc;McAfee Personal Firewall Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McProxy;McAfee Proxy Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McShield;McShield;c:\program files\common files\mcafee\systemcore\mcshield.exe [2011-2-18 171168]
R2 mfefire;McAfee Firewall Core Service;c:\program files\common files\mcafee\systemcore\mfefire.exe [2011-2-18 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2011-2-18 141792]
R2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\nvidia corporation\nvidia updatus\daemonu.exe [2011-5-30 2218600]
R2 OpenLibSys;OpenLibSys;c:\program files\nxp\fm radio\OpenLibSys.sys [2008-7-10 14672]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\nvidia corporation\3d vision\nvSCPAPISvr.exe [2011-4-7 378472]
R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2011-2-18 56064]
R3 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [2011-7-31 218688]
R3 JMCR;JMCR;c:\windows\system32\drivers\jmcr.sys [2008-5-21 86672]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2008-10-7 153280]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2008-10-7 52320]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2011-2-18 314088]
R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32v.sys [2011-5-30 139368]
R3 SmartFaceVWatchSrv;SmartFaceVWatchSrv;c:\program files\toshiba\smartfacev\SmartFaceVWatchSrv.exe [2008-4-24 73728]
R3 ubloxusb;ubloxusb;c:\windows\system32\drivers\ubloxusb.sys [2008-5-7 73216]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 RasMan32;Remote Access Connection Manager ;c:\programdata\rdpdd32.exe --> c:\programdata\rdpdd32.exe [?]
S2 WPCSvc32;Parental Controls ;c:\programdata\d3dx9_2432.exe --> c:\programdata\d3dx9_2432.exe [?]
S3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\jumpstart\jswpsapi.exe [2008-7-10 954368]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2011-2-18 84488]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2008-10-7 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2008-10-7 40552]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2011-08-10 22:42:46 2409784 ----a-w- c:\program files\windows mail\OESpamFilter.dat
2011-08-10 22:41:46 3602832 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-08-10 22:41:45 3550096 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-08-10 22:41:43 905104 ----a-w- c:\windows\system32\drivers\tcpip.sys
2011-07-31 21:18:44 218688 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys
2011-07-31 21:17:46 -------- d-----w- c:\users\thrash driveshaft\appdata\roaming\DAEMON Tools Lite
2011-07-31 21:17:46 -------- d-----w- c:\programdata\DAEMON Tools Lite
2011-07-23 20:14:58 0 ---ha-w- c:\windows\system32\tutcdozvjn.tmp
2011-07-23 20:10:25 -------- d-----w- c:\users\thrash driveshaft\appdata\local\temp
2011-07-23 20:09:26 -------- d-sh--w- C:\$RECYCLE.BIN
2011-07-23 18:51:09 -------- d-----w- c:\program files\Dwarf Fortress (3125)
.
==================== Find3M ====================
.
2011-07-22 13:54:40 1383424 ----a-w- c:\windows\system32\mshtml.tlb
2011-07-07 00:52:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-07 00:52:42 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-06 15:31:47 214016 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2011-06-21 15:49:52 834048 ----a-w- c:\windows\system32\wininet.dll
2011-06-21 14:13:51 389632 ----a-w- c:\windows\system32\html.iec
2011-06-17 16:03:18 375808 ----a-w- c:\windows\system32\winsrv.dll
2011-06-02 13:34:49 2043392 ----a-w- c:\windows\system32\win32k.sys
.
============= FINISH: 16:47:54.97 ===============

-------------------------------------------------------------------

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-08-18 06:04:01
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 TOSHIBA_ rev.LV01
Running: gmer.exe; Driver: C:\Users\THRASH~1\AppData\Local\Temp\uxtiyfog.sys


---- System - GMER 1.0.15 ----

Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwMapViewOfSection [0x8B18D1E8]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwTerminateProcess [0x8B18D212]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0x8B18D1FE]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwYieldExecution [0x8B18D1D4]
Code \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtMapViewOfSection

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!ZwYieldExecution 82C82BDE 5 Bytes JMP 8B18D1D8 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwUnmapViewOfSection 82E59A00 5 Bytes JMP 8B18D202 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!NtMapViewOfSection 82E59D89 7 Bytes JMP 8B18D1EC \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
PAGE ntoskrnl.exe!ZwTerminateProcess 82E6953F 5 Bytes JMP 8B18D216 \SystemRoot\system32\drivers\mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
.text C:\Windows\system32\DRIVERS\tos_sps32.sys section is writeable [0x8B556000, 0x4036D, 0xE8000020]
.dsrt C:\Windows\system32\DRIVERS\tos_sps32.sys unknown last section [0x8B59F000, 0x510, 0x40000040]

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\services.exe[800] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 001F0000
.text C:\Windows\system32\services.exe[800] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 001F0FE5
.text C:\Windows\system32\services.exe[800] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 001F001B
.text C:\Windows\system32\services.exe[800] kernel32.dll!GetStartupInfoW 768F1929 1 Byte [E9]
.text C:\Windows\system32\services.exe[800] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 001E0F2D
.text C:\Windows\system32\services.exe[800] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 001E0073
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateProcessW 768F1BF3 1 Byte [E9]
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 001E0EF7
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 001E008E
.text C:\Windows\system32\services.exe[800] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 001E0047
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 001E0FD4
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 001E0FB9
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 001E0062
.text C:\Windows\system32\services.exe[800] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 001E0F79
.text C:\Windows\system32\services.exe[800] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 001E0F94
.text C:\Windows\system32\services.exe[800] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 001E0036
.text C:\Windows\system32\services.exe[800] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 001E0025
.text C:\Windows\system32\services.exe[800] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 001E0F52
.text C:\Windows\system32\services.exe[800] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 001E00A9
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 001E0000
.text C:\Windows\system32\services.exe[800] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 001E0FEF
.text C:\Windows\system32\services.exe[800] kernel32.dll!WinExec 769860CF 5 Bytes JMP 001E0F1C
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 0020007D
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 00200047
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 00200FE5
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00200062
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 00200FC0
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 00200025
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 0020000A
.text C:\Windows\system32\services.exe[800] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00200036
.text C:\Windows\system32\services.exe[800] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00890FC1
.text C:\Windows\system32\services.exe[800] msvcrt.dll!system 777F804B 5 Bytes JMP 00890042
.text C:\Windows\system32\services.exe[800] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00890FD2
.text C:\Windows\system32\services.exe[800] msvcrt.dll!_open 777FD106 5 Bytes JMP 00890FEF
.text C:\Windows\system32\services.exe[800] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00890031
.text C:\Windows\system32\services.exe[800] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 0089000C
.text C:\Windows\system32\services.exe[800] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00210000
.text C:\Windows\system32\lsass.exe[868] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00240FE5
.text C:\Windows\system32\lsass.exe[868] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00240FC3
.text C:\Windows\system32\lsass.exe[868] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00240FD4
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00220096
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00220071
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 002200C2
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00220F21
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00220F6B
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00220FB9
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00220FA8
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00220F46
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00220F7C
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00220F97
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00220039
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 0022001E
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!VirtualProtectEx 7691DC52 1 Byte [E9]
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00220056
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00220F10
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00220FDE
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00220FEF
.text C:\Windows\system32\lsass.exe[868] kernel32.dll!WinExec 769860CF 5 Bytes JMP 002200A7
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 009B0058
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 009B0FC0
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 009B0000
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 009B0047
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 009B0069
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 009B0FDB
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 009B001B
.text C:\Windows\system32\lsass.exe[868] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 009B002C
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00A10027
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!system 777F804B 5 Bytes JMP 00A10016
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00A10FC1
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!_open 777FD106 5 Bytes JMP 00A10FEF
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00A10FB0
.text C:\Windows\system32\lsass.exe[868] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00A10FD2
.text C:\Windows\system32\lsass.exe[868] WS2_32.dll!socket 768C36D1 5 Bytes JMP 009C0FEF
.text C:\Windows\system32\svchost.exe[1028] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00180000
.text C:\Windows\system32\svchost.exe[1028] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 0018001B
.text C:\Windows\system32\svchost.exe[1028] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00180FEF
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00170F74
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 001700BA
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00170F59
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 001700F0
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 0017007D
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00170036
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00170FE5
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 001700A9
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00170062
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00170FB9
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00170051
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00170FCA
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 0017008E
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 0017010B
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 0017001B
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 0017000A
.text C:\Windows\system32\svchost.exe[1028] kernel32.dll!WinExec 769860CF 5 Bytes JMP 001700D5
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00270031
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!system 777F804B 5 Bytes JMP 00270FB0
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00270016
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!_open 777FD106 5 Bytes JMP 00270FEF
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00270FC1
.text C:\Windows\system32\svchost.exe[1028] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00270FDE
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00190FA8
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 00190036
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 00190000
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00190FB9
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 00190065
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 0019001B
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 00190FE5
.text C:\Windows\system32\svchost.exe[1028] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00190FD4
.text C:\Windows\system32\svchost.exe[1028] WS2_32.dll!socket 768C36D1 5 Bytes JMP 001A0000
.text C:\Windows\system32\svchost.exe[1104] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00410FE5
.text C:\Windows\system32\svchost.exe[1104] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 0041000A
.text C:\Windows\system32\svchost.exe[1104] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00410FD4
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00400F3C
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00400F57
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 004000C2
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 004000B1
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00400082
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00400036
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00400FDB
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00400F68
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00400071
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00400FB9
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00400FA8
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00400FCA
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00400F83
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 004000DD
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 0040001B
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00400000
.text C:\Windows\system32\svchost.exe[1104] kernel32.dll!WinExec 769860CF 5 Bytes JMP 00400F2B
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00450F95
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!system 777F804B 5 Bytes JMP 00450020
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00450FC1
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!_open 777FD106 5 Bytes JMP 00450FEF
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00450FB0
.text C:\Windows\system32\svchost.exe[1104] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00450FD2
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegCreateKeyExA 767039AB 1 Byte [E9]
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00420FAF
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 0042004A
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 0042000A
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 0042005B
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 00420076
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 00420FDE
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 00420FEF
.text C:\Windows\system32\svchost.exe[1104] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00420039
.text C:\Windows\system32\svchost.exe[1104] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00440FEF
.text C:\Windows\System32\svchost.exe[1172] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00980000
.text C:\Windows\System32\svchost.exe[1172] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00980011
.text C:\Windows\System32\svchost.exe[1172] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00980FDB
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 002800B0
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 0028009F
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 002800DC
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00280F45
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 0028007D
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00280022
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00280033
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 0028008E
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00280F99
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00280FB6
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!LoadLibraryExA 76919554 1 Byte [E9]
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00280058
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00280FC7
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00280F88
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 002800ED
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00280011
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00280000
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!WinExec 769860CF 5 Bytes JMP 002800C1
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 009A0064
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!system 777F804B 5 Bytes JMP 009A0049
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 009A002E
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!_open 777FD106 5 Bytes JMP 009A0000
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 009A0FD9
.text C:\Windows\System32\svchost.exe[1172] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 009A001D
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00260040
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 00260FB9
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 00260FEF
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00260FA8
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 0026005B
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 0026001B
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 00260000
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00260FD4
.text C:\Windows\System32\svchost.exe[1172] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00990FEF
.text C:\Windows\System32\svchost.exe[1236] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 01960000
.text C:\Windows\System32\svchost.exe[1236] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 0196001B
.text C:\Windows\System32\svchost.exe[1236] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 01960FE5
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 019100B5
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 019100A4
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 019100F2
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 019100D7
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 01910082
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 01910FDE
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 01910039
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 01910093
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 01910F9E
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 0191005B
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 01910FB9
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 0191004A
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 01910F83
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 01910F36
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateFileW 7693B0EB 1 Byte [E9]
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 01910FEF
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 01910000
.text C:\Windows\System32\svchost.exe[1236] kernel32.dll!WinExec 769860CF 5 Bytes JMP 019100C6
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 019C007F
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!system 777F804B 5 Bytes JMP 019C006E
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 019C0038
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!_open 777FD106 5 Bytes JMP 019C0000
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 019C0049
.text C:\Windows\System32\svchost.exe[1236] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 019C001D
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 01900F97
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 01900025
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 01900FEF
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 01900FA8
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 01900F72
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 0190000A
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 01900FD4
.text C:\Windows\System32\svchost.exe[1236] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 01900FC3
.text C:\Windows\System32\svchost.exe[1236] WS2_32.dll!socket 768C36D1 5 Bytes JMP 01970FE5
.text C:\Windows\system32\svchost.exe[1252] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 01570000
.text C:\Windows\system32\svchost.exe[1252] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 01570FD4
.text C:\Windows\system32\svchost.exe[1252] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 01570FE5
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 01560F79
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 01560F94
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 015600FF
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 01560F5E
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 0156009D
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 01560FE5
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 01560FCA
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 015600C9
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 01560082
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 0156004A
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 01560065
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 01560FB9
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 015600B8
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 01560F43
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 0156001B
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 01560000
.text C:\Windows\system32\svchost.exe[1252] kernel32.dll!WinExec 769860CF 5 Bytes JMP 015600DA
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 01690047
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!system 777F804B 5 Bytes JMP 01690036
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 01690011
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!_open 777FD106 5 Bytes JMP 01690FE3
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 01690FC6
.text C:\Windows\system32\svchost.exe[1252] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 01690000
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 01550F72
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 01550F9E
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 0155000A
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 01550F83
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 01550025
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 01550FCA
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 01550FE5
.text C:\Windows\system32\svchost.exe[1252] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 01550FAF
.text C:\Windows\system32\svchost.exe[1252] WS2_32.dll!socket 768C36D1 5 Bytes JMP 015C0000
.text C:\Windows\system32\svchost.exe[1420] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00A10000
.text C:\Windows\system32\svchost.exe[1420] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00A1001B
.text C:\Windows\system32\svchost.exe[1420] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00A10FE5
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00A00F4A
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00A00F5B
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00A00F03
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00A00F1E
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00A0006B
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00A0001B
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00A0002C
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00A00090
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00A00F91
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00A0003D
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00A0004E
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00A00FB6
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00A00F80
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00A000BF
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateFileW 7693B0EB 1 Byte [E9]
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00A00FEF
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00A0000A
.text C:\Windows\system32\svchost.exe[1420] kernel32.dll!WinExec 769860CF 5 Bytes JMP 00A00F2F
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00A30FB9
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!system 777F804B 5 Bytes JMP 00A30FCA
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00A30FEF
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!_open 777FD106 5 Bytes JMP 00A3000C
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00A30044
.text C:\Windows\system32\svchost.exe[1420] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00A3001D
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 005A0F7C
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 005A0FA8
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 005A0000
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 005A0F97
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 005A002F
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 005A0FD4
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 005A0FEF
.text C:\Windows\system32\svchost.exe[1420] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 005A0FB9
.text C:\Windows\system32\svchost.exe[1420] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00A2000A
.text C:\Windows\system32\svchost.exe[1420] WinInet.dll!InternetOpenA 7654D4AD 5 Bytes JMP 00590FEF
.text C:\Windows\system32\svchost.exe[1420] WinInet.dll!InternetOpenW 7654D80A 5 Bytes JMP 0059000A
.text C:\Windows\system32\svchost.exe[1420] WinInet.dll!InternetOpenUrlA 7654FE7B 5 Bytes JMP 0059001B
.text C:\Windows\system32\svchost.exe[1420] WinInet.dll!InternetOpenUrlW 76599189 5 Bytes JMP 00590FC0
.text C:\Windows\system32\svchost.exe[1668] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 02790000
.text C:\Windows\system32\svchost.exe[1668] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 02790FD4
.text C:\Windows\system32\svchost.exe[1668] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 02790FE5
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00F10F3C
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00F10078
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00F100BF
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00F100AE
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00F10F79
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00F10FC3
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00F1001E
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00F10F4D
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00F10F94
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00F10040
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00F10051
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00F1002F
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00F10F68
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00F10F17
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00F10FD4
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00F10FEF
.text C:\Windows\system32\svchost.exe[1668] kernel32.dll!WinExec 769860CF 5 Bytes JMP 00F1009D
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00F20031
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!system 777F804B 5 Bytes JMP 00F20FB0
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00F20FC1
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!_open 777FD106 5 Bytes JMP 00F20FEF
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00F20020
.text C:\Windows\system32\svchost.exe[1668] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00F20FD2
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00EF0F91
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 00EF0FC0
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 00EF0000
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00EF003D
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 00EF0F80
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 00EF002C
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 00EF001B
.text C:\Windows\system32\svchost.exe[1668] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00EF0FDB
.text C:\Windows\system32\svchost.exe[1668] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00F00000
.text C:\Windows\system32\svchost.exe[1772] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 0004000A
.text C:\Windows\system32\svchost.exe[1772] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00040025
.text C:\Windows\system32\svchost.exe[1772] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00040FE5
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 000100D0
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00010F8A
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00010117
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00010106
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00010FAF
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00010FDE
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 0001002F
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 000100BF
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 0001007D
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 0001005B
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 0001006C
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 0001004A
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 000100AE
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00010132
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateFileW 7693B0EB 1 Byte [E9]
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00010FEF
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00010000
.text C:\Windows\system32\svchost.exe[1772] kernel32.dll!WinExec 769860CF 5 Bytes JMP 000100EB
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00060049
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!system 777F804B 5 Bytes JMP 00060FBE
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 0006002E
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!_open 777FD106 5 Bytes JMP 00060000
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00060FCF
.text C:\Windows\system32\svchost.exe[1772] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 0006001D
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 000B0076
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 000B0FD4
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 000B0FEF
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 000B0065
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 000B0FB9
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 000B002F
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 000B000A
.text C:\Windows\system32\svchost.exe[1772] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 000B0040
.text C:\Windows\system32\svchost.exe[1772] WS2_32.dll!socket 768C36D1 5 Bytes JMP 000C000A
.text C:\Windows\system32\svchost.exe[1964] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00ED0FEF
.text C:\Windows\system32\svchost.exe[1964] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00ED0FCD
.text C:\Windows\system32\svchost.exe[1964] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00ED0FDE
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00EB0F39
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00EB0F54
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00EB0EF9
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 00EB0F14
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00EB0F80
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00EB0022
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00EB0FD1
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00EB007F
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00EB005A
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00EB0FAC
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00EB0F9B
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00EB003D
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00EB0F6F
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00EB00AB
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00EB0011
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00EB0000
.text C:\Windows\system32\svchost.exe[1964] kernel32.dll!WinExec 769860CF 5 Bytes JMP 00EB0090
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00EC0F9C
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!system 777F804B 5 Bytes JMP 00EC0027
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00EC0FD2
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!_open 777FD106 5 Bytes JMP 00EC0000
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00EC0FB7
.text C:\Windows\system32\svchost.exe[1964] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00EC0FEF
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 008C004A
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 008C0FB9
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 008C0FEF
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 008C0FA8
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 008C0065
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 008C0FCA
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 008C000A
.text C:\Windows\system32\svchost.exe[1964] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 008C0025
.text C:\Windows\system32\svchost.exe[1964] WS2_32.dll!socket 768C36D1 5 Bytes JMP 00EA0FE5
.text C:\Windows\system32\svchost.exe[2060] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00170000
.text C:\Windows\system32\svchost.exe[2060] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 0017001B
.text C:\Windows\system32\svchost.exe[2060] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00170FE5
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 001500A7
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00150F61
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 001500EE
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 001500DD
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00150F7C
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00150014
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 00150025
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 0015008C
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00150F8D
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00150FAF
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00150F9E
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00150036
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00150071
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 00150109
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00150FDE
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00150FEF
.text C:\Windows\system32\svchost.exe[2060] kernel32.dll!WinExec 769860CF 5 Bytes JMP 001500CC
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00160FB2
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!system 777F804B 5 Bytes JMP 00160033
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00160FD4
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!_open 777FD106 5 Bytes JMP 0016000C
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00160FC3
.text C:\Windows\system32\svchost.exe[2060] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00160FEF
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 000C0FA5
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 000C0FD4
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 000C0FEF
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 000C0051
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 000C0062
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 000C0025
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 000C000A
.text C:\Windows\system32\svchost.exe[2060] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 000C0036
.text C:\Windows\system32\svchost.exe[2060] WS2_32.dll!socket 768C36D1 5 Bytes JMP 000F0FE5
.text C:\Windows\system32\svchost.exe[2160] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 005B0000
.text C:\Windows\system32\svchost.exe[2160] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 005B0FD4
.text C:\Windows\system32\svchost.exe[2160] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 005B0FEF
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 002B00BF
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 002B00AE
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 002B0F28
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 002B0F43
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 002B0089
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 002B0FEF
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 002B0040
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 002B0F83
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 002B0FAF
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 002B0FCA
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 002B006C
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 002B0051
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 002B0F9E
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 002B00E4
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 002B001B
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 002B0000
.text C:\Windows\system32\svchost.exe[2160] kernel32.dll!WinExec 769860CF 5 Bytes JMP 002B0F5E
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 005A005D
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!system 777F804B 5 Bytes JMP 005A0FD2
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 005A002E
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!_open 777FD106 5 Bytes JMP 005A0000
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 005A0FE3
.text C:\Windows\system32\svchost.exe[2160] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 005A0011
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 001E0051
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 001E0040
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 001E0FEF
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 001E0FB9
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 001E0F94
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 001E0FDE
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 001E0014
.text C:\Windows\system32\svchost.exe[2160] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 001E002F
.text C:\Windows\system32\svchost.exe[2160] WS2_32.dll!socket 768C36D1 5 Bytes JMP 002A0000
.text C:\Windows\System32\svchost.exe[2284] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00600FEF
.text C:\Windows\System32\svchost.exe[2284] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00600FD4
.text C:\Windows\System32\svchost.exe[2284] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 0060000A
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 005D0F46
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 005D0F57
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 005D0F1A
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 005D00B1
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 005D0F72
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 005D000A
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 005D001B
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 005D0082
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 005D0F83
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 005D0F94
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 005D0036
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 005D0FAF
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 005D0071
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 005D0EFF
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 005D0FD4
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 005D0FEF
.text C:\Windows\System32\svchost.exe[2284] kernel32.dll!WinExec 769860CF 5 Bytes JMP 005D0F2B
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 005E002C
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!system 777F804B 5 Bytes JMP 005E0FAB
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 005E0FCD
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!_open 777FD106 5 Bytes JMP 005E0000
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 005E0FBC
.text C:\Windows\System32\svchost.exe[2284] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 005E0011
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 005B006F
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 005B0FC3
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 005B0000
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 005B0054
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 005B008A
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 005B0FE5
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 005B001B
.text C:\Windows\System32\svchost.exe[2284] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 005B0FD4
.text C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe[2604] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 70F09AE2 C:\Program Files\Common Files\McAfee\McProxy\mcproxy.dll (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe[2604] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 70F09A20 C:\Program Files\Common Files\McAfee\McProxy\mcproxy.dll (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\Windows\Explorer.EXE[3340] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 02FE0000
.text C:\Windows\Explorer.EXE[3340] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 02FE0FD4
.text C:\Windows\Explorer.EXE[3340] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 02FE0FEF
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 024C00C2
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 024C00A7
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 024C00FF
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 024C00EE
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 024C005D
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 024C0FB9
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 024C000A
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 024C0F72
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 024C004C
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 024C0025
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 024C0F8D
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 024C0F9E
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 024C0082
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 024C0F57
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 024C0FD4
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 024C0FE5
.text C:\Windows\Explorer.EXE[3340] kernel32.dll!WinExec 769860CF 5 Bytes JMP 024C00DD
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 024A0FA5
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 024A0036
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 024A0FEF
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 024A0047
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 024A006C
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 024A000A
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 024A0FDE
.text C:\Windows\Explorer.EXE[3340] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 024A0025
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 02F60058
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!system 777F804B 5 Bytes JMP 02F60FCD
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 02F6002C
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!_open 777FD106 5 Bytes JMP 02F60000
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 02F6003D
.text C:\Windows\Explorer.EXE[3340] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 02F60011
.text C:\Windows\Explorer.EXE[3340] WS2_32.dll!socket 768C36D1 5 Bytes JMP 024B0FE5
.text C:\Windows\Explorer.EXE[3340] WININET.dll!InternetOpenA 7654D4AD 5 Bytes JMP 02490000
.text C:\Windows\Explorer.EXE[3340] WININET.dll!InternetOpenW 7654D80A 5 Bytes JMP 0249001B
.text C:\Windows\Explorer.EXE[3340] WININET.dll!InternetOpenUrlA 7654FE7B 5 Bytes JMP 02490FE5
.text C:\Windows\Explorer.EXE[3340] WININET.dll!InternetOpenUrlW 76599189 5 Bytes JMP 02490FC0
.text C:\Windows\system32\wuauclt.exe[4220] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00040000
.text C:\Windows\system32\wuauclt.exe[4220] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00040036
.text C:\Windows\system32\wuauclt.exe[4220] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 0004001B
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00010F3E
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00010F59
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 00010F23
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 000100BA
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00010F96
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 00010022
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 0001003D
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00010F6A
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00010FBD
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 0001005F
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 0001007A
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 0001004E
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00010F7B
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 000100DF
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00010011
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00010000
.text C:\Windows\system32\wuauclt.exe[4220] kernel32.dll!WinExec 769860CF 5 Bytes JMP 0001009F
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00070070
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!system 777F804B 5 Bytes JMP 00070055
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 00070029
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!_open 777FD106 5 Bytes JMP 0007000C
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00070044
.text C:\Windows\system32\wuauclt.exe[4220] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00070FEF
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00080047
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 00080FC0
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 0008000A
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00080FA5
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 00080F94
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 00080FE5
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 0008001B
.text C:\Windows\system32\wuauclt.exe[4220] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00080036
.text C:\Windows\System32\svchost.exe[4624] ntdll.dll!NtCreateFile 77C34224 5 Bytes JMP 00040000
.text C:\Windows\System32\svchost.exe[4624] ntdll.dll!NtCreateProcess 77C342E4 5 Bytes JMP 00040FD4
.text C:\Windows\System32\svchost.exe[4624] ntdll.dll!NtProtectVirtualMemory 77C34B84 5 Bytes JMP 00040FE5
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!GetStartupInfoW 768F1929 5 Bytes JMP 00010F37
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!GetStartupInfoA 768F19C9 5 Bytes JMP 00010F48
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateProcessW 768F1BF3 5 Bytes JMP 000100C4
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateProcessA 768F1C28 5 Bytes JMP 000100B3
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!VirtualProtect 768F1DC3 5 Bytes JMP 00010058
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateNamedPipeA 768F2EF5 5 Bytes JMP 0001001B
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateNamedPipeW 768F5C0C 5 Bytes JMP 0001002C
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreatePipe 76918F06 5 Bytes JMP 00010073
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!LoadLibraryExW 7691927C 5 Bytes JMP 00010047
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!LoadLibraryW 76919400 5 Bytes JMP 00010F9B
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!LoadLibraryExA 76919554 5 Bytes JMP 00010F8A
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!LoadLibraryA 7691957C 5 Bytes JMP 00010FB6
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!VirtualProtectEx 7691DC52 5 Bytes JMP 00010F63
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!GetProcAddress 7693925B 5 Bytes JMP 000100D5
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateFileW 7693B0EB 5 Bytes JMP 00010000
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!CreateFileA 7693D07F 5 Bytes JMP 00010FEF
.text C:\Windows\System32\svchost.exe[4624] kernel32.dll!WinExec 769860CF 5 Bytes JMP 000100A2
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!_wsystem 777F7F2F 5 Bytes JMP 00060FB7
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!system 777F804B 5 Bytes JMP 00060042
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!_creat 777FBBE1 5 Bytes JMP 0006001D
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!_open 777FD106 5 Bytes JMP 0006000C
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!_wcreat 777FD326 5 Bytes JMP 00060FD2
.text C:\Windows\System32\svchost.exe[4624] msvcrt.dll!_wopen 777FD501 5 Bytes JMP 00060FE3
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegCreateKeyExA 767039AB 1 Byte [E9]
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegCreateKeyExA 767039AB 5 Bytes JMP 00070FAF
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegCreateKeyA 76703BA9 5 Bytes JMP 0007005B
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegOpenKeyA 767089C7 5 Bytes JMP 0007000A
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegCreateKeyW 7671391E 5 Bytes JMP 00070FCA
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegCreateKeyExW 767141F1 5 Bytes JMP 0007006C
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegOpenKeyExA 76717C42 5 Bytes JMP 0007002F
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegOpenKeyW 7671E2B5 5 Bytes JMP 00070FEF
.text C:\Windows\System32\svchost.exe[4624] ADVAPI32.dll!RegOpenKeyExW 76727BA1 5 Bytes JMP 00070040

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \Driver\tdx \Device\Tcp mfewfpk.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\tdx \Device\Udp mfewfpk.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Registry - GMER 1.0.15 ----

Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.@\v m\0k\0v\0_\0a\0u\0t\0o\0_\0f\0i\0l\0e

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 21 August 2011 - 06:08 AM

Hi,

Please do the following

Refer to the ComboFix User's Guide

  • Download ComboFix from one of these locations:

    Link 1
    Link 2

    * IMPORTANT !!! Place ComboFix.exe on your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with ComboFix.


    You can get help on disabling your protection programs here
  • Double click on ComboFix.exe & follow the prompts.
  • Your desktop may go blank. This is normal. It will return when ComboFix is done. ComboFix may reboot your machine. This is normal.
  • When finished, it shall produce a log for you. Post that log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


    ---------------------------------------------------------------------------------------------
  • Ensure your AntiVirus and AntiSpyware applications are re-enabled.

    ---------------------------------------------------------------------------------------------

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 NonPerson

NonPerson
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 23 August 2011 - 05:22 PM

Not sure if it's relevant, but the first time I tried to run Combofix it gave me an error saying it could not create the log. After running it a second time everything worked and this is what I got:

ComboFix 11-08-22.04 - Thrash Driveshaft 2/2011 Mon 22:37:51.3.2 - x86
Running from: c:\users\Thrash Driveshaft\Desktop\ComboFix.exe
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {86355677-4064-3EA7-ABB3-1B136EB04637}
FW: McAfee Firewall *Disabled* {BE0ED752-0A0B-3FFF-80EC-B2269063014C}
SP: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {3D54B793-665E-3129-9103-206115370C8A}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2011-07-23 to 2011-08-23 )))))))))))))))))))))))))))))))
.
.
2011-08-23 03:46 . 2011-08-23 03:46 -------- d-----w- c:\users\Thrash Driveshaft\AppData\Local\temp
2011-08-23 03:46 . 2011-08-23 03:46 -------- d-----w- c:\users\UpdatusUser\AppData\Local\temp
2011-08-23 03:46 . 2011-08-23 03:46 -------- d-----w- c:\users\Public\AppData\Local\temp
2011-08-23 03:46 . 2011-08-23 03:46 -------- d-----w- c:\users\Default\AppData\Local\temp
2011-08-10 22:42 . 2011-06-06 10:59 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2011-08-10 22:41 . 2011-06-20 08:54 3602832 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-08-10 22:41 . 2011-06-20 08:54 3550096 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-08-10 22:41 . 2011-06-17 20:13 905104 ----a-w- c:\windows\system32\drivers\tcpip.sys
2011-07-31 21:18 . 2011-07-31 21:18 218688 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys
2011-07-31 21:17 . 2011-07-31 21:21 -------- d-----w- c:\users\Thrash Driveshaft\AppData\Roaming\DAEMON Tools Lite
2011-07-31 21:17 . 2011-07-31 21:17 -------- d-----w- c:\programdata\DAEMON Tools Lite
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-07-24 17:01 . 2011-02-16 05:06 14386337 ----a-w- C:\Emergency Rations.zip
2011-07-23 20:14 . 2011-07-23 20:14 0 ---ha-w- c:\windows\system32\tutcdozvjn.tmp
2011-07-07 00:52 . 2009-01-22 16:04 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-07 00:52 . 2009-01-22 16:04 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-10 18:47 . 2011-06-10 18:47 49152 ----a-r- c:\users\Thrash Driveshaft\AppData\Roaming\Microsoft\Installer\{C109AF5B-69D0-4C93-B360-F28D9FAB6084}\NewShortcut1_C109AF5B69D04C93B360F28D9FAB6084.exe
2011-06-02 13:34 . 2011-07-13 17:28 2043392 ----a-w- c:\windows\system32\win32k.sys
2011-04-14 19:01 . 2011-02-18 19:11 24376 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2008-04-24 430080]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HWSetup"="\HWSetup.exe hwSetUP" [X]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2007-12-15 184320]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-04-16 178712]
"Camera Assistant Software"="c:\program files\Camera Assistant Software for Toshiba\traybar.exe" [2008-04-29 417792]
"ITSecMng"="c:\program files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2007-09-28 75136]
"NDSTray.exe"="NDSTray.exe" [BU]
"SVPWUTIL"="c:\program files\TOSHIBA\Utilities\SVPWUTIL.exe" [2007-09-19 438272]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2009-08-24 7719456]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-05 413696]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2011-06-28 1195408]
.
c:\users\Thrash Driveshaft\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OpenOffice.org 2.3.lnk - c:\program files\OpenOffice.org 2.3\program\quickstart.exe [2007-8-17 393216]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 iPodDrv;iPodDrv;c:\windows\system32\drivers\iPodDrv.sys [x]
R2 RasMan32;Remote Access Connection Manager ;c:\programdata\rdpdd32.exe [x]
R2 WPCSvc32;Parental Controls ;c:\programdata\d3dx9_2432.exe [x]
R3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\Jumpstart\jswpsapi.exe [2008-04-16 954368]
R3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2011-04-14 84488]
R3 TpChoice;Touch Pad Detection Filter driver;c:\windows\system32\DRIVERS\TpChoice.sys [x]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
S1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\DRIVERS\jswpslwf.sys [2008-04-28 20384]
S1 mfenlfk;McAfee NDIS Light Filter;c:\windows\system32\DRIVERS\mfenlfk.sys [2011-04-14 64584]
S1 mfewfpk;McAfee Inc. mfewfpk;c:\windows\system32\drivers\mfewfpk.sys [2011-04-14 165032]
S2 ConfigFree Service;ConfigFree Service;c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe [2008-04-17 40960]
S2 McMPFSvc;McAfee Personal Firewall Service;c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe [2010-03-10 271480]
S2 McNaiAnn;McAfee VirusScan Announcer;c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe [2010-03-10 271480]
S2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\\mfefire.exe [2011-04-14 188136]
S2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2011-04-14 141792]
S2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe [2011-04-08 2218600]
S2 OpenLibSys;OpenLibSys;c:\program files\NXP\FM Radio\OpenLibSys.sys [2007-10-19 14672]
S2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe [2011-04-08 378472]
S3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2011-04-14 56064]
S3 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\DRIVERS\dtsoftbus01.sys [2011-07-31 218688]
S3 JMCR;JMCR;c:\windows\system32\DRIVERS\jmcr.sys [2008-05-21 86672]
S3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2011-04-14 314088]
S3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32v.sys [2011-03-03 139368]
S3 SmartFaceVWatchSrv;SmartFaceVWatchSrv;c:\program files\Toshiba\SmartFaceV\SmartFaceVWatchSrv.exe [2008-04-25 73728]
S3 ubloxusb;ubloxusb;c:\windows\system32\DRIVERS\ubloxusb.sys [2008-05-07 73216]
.
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - mfeavfk01
*Deregistered* - uxtiyfog
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.www.daemon-search.com/default
TCP: DhcpNameServer = 192.168.0.1
FF - ProfilePath - c:\users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\
FF - prefs.js: browser.startup.homepage - hxxp://katawashoujo.blogspot.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Save Image in Folder: {5e594888-3e8e-47da-b2c6-b0b545112f84} - %profile%\extensions\{5e594888-3e8e-47da-b2c6-b0b545112f84}
FF - Ext: DownThemAll!: {DDC359D1-844A-42a7-9AA1-88A850A938A8} - %profile%\extensions\{DDC359D1-844A-42a7-9AA1-88A850A938A8}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TinEye Reverse Image Search: tineye@ideeinc.com - %profile%\extensions\tineye@ideeinc.com
FF - Ext: Greasemonkey: {e4a8a97b-f2ed-450b-b12d-ee082ba24781} - %profile%\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}
FF - Ext: ReloadEvery: {888d99e7-e8b5-46a3-851e-1ec45da1e644} - %profile%\extensions\{888d99e7-e8b5-46a3-851e-1ec45da1e644}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-08-22 22:46
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i???????2e????h?????????????????
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\KISS\ォ0ケ0ソ0・・、0ノ03*D*]
"InstallPath"="c:\\Program Files\\Illusion\\[KISS] Custom Maid"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*]*・・H0・テo'苓la1X]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*]*・・H0・テo'苓la1X\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.* m*k*v*\OpenWithList]
@Class="Shell"
"a"="KMPlayer.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.* m*k*v*\OpenWithProgids]
"?mkv_auto_file"=hex(0):
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*]0n0ヨN]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*]0n0ヨN\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c0}0D0茁h0B}・・n0ッ0・ヒ0ッ0・c0}0D0茁h0【c0}0D0茁]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c0}0D0茁h0B}・・n0ッ0・ヒ0ッ0・c0}0D0茁h0【c0}0D0茁\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*「0ッ0サ0・ネ0]*W0S0_0~0ケ0・、0ヨ0
B0・X0g0ノYケYj0)YOh0ェ`T・]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*「0ッ0サ0・ネ0]*W0S0_0~0ケ0・、0ヨ0
B0・X0g0ノYケYj0)YOh0ェ`T・\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*゙0、0ハ0キ*ネ0・、0「0・ノ0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*゙0、0ハ0キ*ネ0・、0「0・ノ0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*ケYJ・bw0・Y0^J0K0B0U0・・D0c0W0・]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*ケYJ・bw0・Y0^J0K0B0U0・・D0c0W0・\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*ケYJ・bw0・Y0^J0K0B0U0・・D0c0W0・^]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*ケYJ・bw0・Y0^J0K0B0U0・・D0c0W0・^\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*'`ア暑ssY]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*'`ア暑ssY\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\Installation]
"bInstalled"=dword:00000001
"strAbsolutePath"="c:\\Program Files\\VN Collections\\Muv-Luv\\"
"strIciPath"="c:\\Program Files\\VN Collections\\Muv-Luv\\マブラヴ11.rio.ici"
"strInstallSourcePath"="g:\\"
"strInstallSystemType"=""
"strInstallTypeSelect"="1"
"strObjectOcean"="c:\\Program Files\\VN Collections\\Muv-Luv\\マブラヴ11.rio"
"strTTFileName"="マブラヴ11.rbt"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\InstallFont]
"MS Pゴシック%#16%$-B"="マブラヴ11.rio\\MS Pゴシック16B.5RF"
"MS Pゴシック%#24%$-B%$-A"="マブラヴ11.rio\\MS Pゴシック24BA.5RF"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\PeculiarToTheApp]
"strTheAppName"="マブラヴ1.1"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\rUGPBasic]
"nRugpVersion"=dword:0000157c
"strRugpPluginFolder"="c:\\Program Files\\VN Collections\\Muv-Luv\\Plugins"
"bIsIllegalTerminateCheck"=dword:00000000
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\rvmmBoxSettings]
"nFontBlank"=dword:00000002
"nMainFontColor"=dword:ffffffff
"nSelectedFontColor"=dword:ff8090c0
"nWndBaseColor1"=dword:002020a0
"nWndBaseColor2"=dword:00c0c0ff
"nWndBaseGradation"=dword:00000001
"nWndBaseRatioDst"=dword:00000006
"nWndBaseRatioSrc"=dword:000000c0
"nWndFrameLevel"=dword:00000003
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\rvmmInstallation]
"strFontCachePath"="c:\\Program Files\\VN Collections\\Muv-Luv\\"
"strVirtuaRegistryAbsolutePath"="c:\\Program Files\\VN Collections\\Muv-Luv\\Vmreg\\"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\rvmmPeculiarToTheApp]
"bCanSettingFont"=dword:00000001
"bCanSettingSound"=dword:00000001
"bCanSettingWindow"=dword:00000001
"bFullScreenMenuOff"=dword:00000000
"bPageOverNext"=dword:00000000
"bUucAccessMasterKey"=dword:00000001
"bWindowMenuAccessMasterKey"=dword:00000001
"strLowSpecFont"="MS Pゴシック%#16%$-B"
"strStandardFont"="MS Pゴシック%#24%$-B%$-A"
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\relic UGP Applications\age\゙0ヨ0・・1*1*\rvmmUISettings]
"dwMainFontStyle"=dword:0000000c
"nTextSpeed"=dword:00000030
"bFullScreen"=dword:00000000
"strCurrentMonitorDevice"="\\\\.\\DISPLAY1"
"dwCurrentMonitorFlag"=dword:00000001
"nWindowSize"=dword:00000003
"nFaceWindowSize"=dword:00000003
"isBgm"=dword:00000001
"isEffect"=dword:00000001
"nVoiceLevel"=dword:00000001
"nLayeredEffect"=dword:00000001
"nSeenMsgSkip"=dword:00000000
"nAutoMsgSkip"=dword:00000000
"bMouseTrace"=dword:00000001
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"?慴"=hex:35,4b,88,b1,fd,ea,98,18,8b,57,0e,32,60,a2,a9,dc,49,a3,78,06,74,41,8f,
d8,28,2c,45,29,bc,dc,f4,a9,ca,f7,4b,05,ba,ec,8d,d2,cd,b0,42,f9,36,64,a2,1b,\
"?祥"=hex:69,6f,5c,46,6a,89,f9,ee,2d,48,e0,10,87,42,1e,12
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004\Software\SecuROM\License information*]
"datasecu"=hex:8c,8b,59,ae,c9,d8,72,b5,fe,a7,55,7b,2c,bf,2e,36,67,82,04,56,bb,
fa,51,b5,12,72,25,3a,1a,96,e3,4e,e4,b6,ac,8f,61,ce,87,83,9f,42,a0,96,ed,7c,\
"rkeysecu"=hex:2e,ce,8a,f0,a0,d5,99,98,68,7d,e1,3f,39,fa,d8,4f
.
[HKEY_USERS\S-1-5-21-3629657750-2863829441-4247423518-1004_Classes\ m*k*v*_*a*u*t*o*_*f*i*l*e*\shell\open\command]
@="\"c:\\Program Files\\KMPlayer\\KMPlayer.exe\" \"%1\""
DUMPHIVE0.003 (REGF)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2011-08-22 22:48:46
ComboFix-quarantined-files.txt 2011-08-23 03:48
ComboFix2.txt 2011-08-22 23:37
ComboFix3.txt 2011-07-23 20:10
.
Pre-Run: 47,096,774,656 bytes free
Post-Run: 47,059,259,392 bytes free
.
- - End Of File - - 3B8745500EDA2671FB04DE19106A0B49

#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 23 August 2011 - 05:37 PM

Hi

Please do the following:

Please download Malwarebytes' Anti-Malware
  • Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Note: You will need to use Internet explorer for this scan
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 NonPerson

NonPerson
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 24 August 2011 - 05:16 PM

MBAM ran fine, logs to follow. However, when attempting to run ESET, I get the error message "Cannot get update. Is proxy configured?" I am not using any proxy, and I've tried all the on-site ESET troubleshooting with no results. I am accordingly unable to run ESET at this time.


Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7548

Windows 6.0.6002 Service Pack 2
Internet Explorer 7.0.6002.18005

8/23/2011 10:32:10 PM
mbam-log-2011-08-23 (22-32-10).txt

Scan type: Quick scan
Objects scanned: 171519
Time elapsed: 5 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 24 August 2011 - 05:32 PM

Hi

Please do the following:

  • Go to Start > Control Panel, and choose Network Connections.
  • Right click on your default connection, usually Local Area Connection for cable and DSL or Dial-up Connection if you are using Dial-up, and choose Properties.
  • Click the Networking tab
  • Double-click on the Internet Protocol (TCP/IP) item.
  • Write down the settings in case you should need to change them back.
  • Select the radio button that says "Obtain DNS servers automatically".
  • Click OK twice to get out of the properties screen and restart your computer.
  • If not prompted to reboot go ahead and reboot manually.

In I.E.
  • Check internet options settings.
  • Tools > Internet Options > Connections
  • LAN settings
  • Choose "automatically detect settings"
  • uncheck both proxy settings boxes

In FireFox
  • Click on Advanced -> Network -> Settings…
  • the No Proxy option should be selected


NEXT

Reset your Router:

  • This can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router.
  • Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds).
  • If you don’t know the router's default password, you can look it up. HERE
  • You also need to reconfigure any security settings you had in place prior to the reset.
  • You may also need to consult with your Internet service provider to find out which DNS servers your network should be using.

NEXT

  • Go to Start > Run > type: cmd
  • Press OK or Hit Enter.
  • At the command prompt, type or copy/paste: ipconfig /flushdns (note the space between “..g /f…” it needs to be there)
  • Hit Enter.
  • You will get a confirmation that the flush was successful.
  • Close the command box.


NEXT



Download TFC to your desktop
Mirror
  • Close any open windows.
  • Double click the TFC icon to run the program
  • TFC will close all open programs itself in order to run,
  • Click the Start button to begin the process.
  • Allow TFC to run uninterrupted.
  • The program should not take long to finish it's job
  • Once its finished it should automatically reboot your machine,
  • if it doesn't, manually reboot to ensure a complete clean
It's normal after running TFC cleaner that the PC will be slower to boot the first time.



NEXT


Now give ESET another try

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 NonPerson

NonPerson
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 24 August 2011 - 11:14 PM

Here's the ESET log before I retire for the night:

C:\Program Files\Cheat Engine\cheatengine-i386.exe a variant of Win32/HackTool.CheatEngine.AB application
C:\Program Files\Cheat Engine\CE6\cheatengine-i386.exe a variant of Win32/HackTool.CheatEngine.AB application
C:\Program Files\Cheat Engine\CE6\dbk32.sys probably a variant of Win32/HackTool.CheatEngine.AA application
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{0c886914-4127-4e3a-ac2e-6653489740b8}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{0c886914-4127-4e3a-ac2e-6653489740b8}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{0cdbb889-a64b-48d0-a62a-758108da5edc}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{0cdbb889-a64b-48d0-a62a-758108da5edc}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{669e6bc0-61d3-4b2d-b07f-d0630ef6deba}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{669e6bc0-61d3-4b2d-b07f-d0630ef6deba}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{8c00f789-a7fb-48c5-9d96-41937a2dba34}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{8c00f789-a7fb-48c5-9d96-41937a2dba34}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{d85de5de-40b3-44a5-8031-67ea1594b143}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Users\Thrash Driveshaft\AppData\Roaming\Mozilla\Firefox\Profiles\hhly4b8p.default\extensions\{d85de5de-40b3-44a5-8031-67ea1594b143}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
C:\Users\Thrash Driveshaft\The Dojo\06_Installers\CheatEngine6.exe multiple threats

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 25 August 2011 - 05:02 AM

Hi,

Most of the items found by ESET are already in quarantine which will be cleaned up at the end.
Do you use the CheatEngine program?

As long as you are aware of it and installed it yourself, but it usually comes bundled with adware and you need to ensure you are not violating any EULA with it.


Please do the following:

Visit ADOBE and download the latest version of Acrobat Reader (version X)
Having the latest updates ensures there are no security vulnerabilities in your system.

NEXT

Posted Image
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update.
  • Download the latest version of Java Runtime Environment (JRE) 7 and save it to your desktop.
  • Scroll down to where it says JDK 7 (JDK or JRE)
  • Click the Download JDK button tunderneath
  • Select the Windows platform from the dropdown menu.
  • Read the License Agreement and then check the box that says: "Oracle Binary Code License Agreement for Java SE ". Click on Continue. The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add or Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java™ 6) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.



NEXT



Please post a fresh DDS Log and advise how the computer is running now and if there are any outstanding issues

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 NonPerson

NonPerson
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 25 August 2011 - 07:00 PM

As before, I only got this laptop last week, and initially I didn't even know what Cheat Engine was. Now that I've looked it up, I am certain that I don't need it. Since several components involved are flagged, should I take any special steps to remove it (beyond a normal uninstall)? Aside from that, Google Redirect is gone, and there appear to be no other problems (that I can discern at least).

.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 10.0.0
Run by Thrash Driveshaft at 18:57:02 on 2011-08-25
AV: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {86355677-4064-3EA7-ABB3-1B136EB04637}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {3D54B793-665E-3129-9103-206115370C8A}
FW: McAfee Firewall *Enabled* {BE0ED752-0A0B-3FFF-80EC-B2269063014C}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Program Files\NVIDIA Corporation\Display\NvXDSync.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\mfevtps.exe
C:\Toshiba\IVP\ISM\pinger.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
C:\Windows\system32\svchost.exe -k imgsvc
c:\Toshiba\IVP\swupdate\swupdtmr.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Toshiba\SmartFaceV\SmartFaceVWatchSrv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe
C:\Program Files\Toshiba\Utilities\KeNotify.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\NVIDIA Corporation\Display\nvtray.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\OpenOffice.org 2.3\program\soffice.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\OpenOffice.org 2.3\program\soffice.BIN
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
C:\Windows\system32\conime.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\system32\msiexec.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.www.daemon-search.com/default
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\common files\mcafee\systemcore\ScriptSn.20110512214208.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\TOSCDSPD.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [IAAnotif] c:\program files\intel\intel matrix storage manager\iaanotif.exe
mRun: [Camera Assistant Software] "c:\program files\camera assistant software for toshiba\traybar.exe" /start
mRun: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
mRun: [NDSTray.exe] NDSTray.exe
mRun: [HWSetup] \HWSetup.exe hwSetUP
mRun: [SVPWUTIL] c:\program files\toshiba\utilities\SVPWUTIL.exe SVPwUTIL
mRun: [RtHDVCpl] c:\program files\realtek\audio\hda\RtHDVCpl.exe -s
mRun: [KeNotify] c:\program files\toshiba\utilities\KeNotify.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [mcui_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
StartupFolder: c:\users\thrash~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 2.3\program\quickstart.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
DPF: {CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0-windows-i586.cab
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{5B898E5E-4BEB-494F-96B5-96B8642A02ED} : DhcpNameServer = 192.168.1.254
TCP: Interfaces\{E86EC299-69EB-4F9A-80C4-2B249E2CF0FB} : DhcpNameServer = 192.168.0.1
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\thrash driveshaft\appdata\roaming\mozilla\firefox\profiles\hhly4b8p.default\
FF - prefs.js: browser.startup.homepage - hxxp://katawashoujo.blogspot.com/
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\nvidia corporation\3d vision\npnv3dv.dll
FF - plugin: c:\program files\nvidia corporation\3d vision\npnv3dvstreaming.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Save Image in Folder: {5e594888-3e8e-47da-b2c6-b0b545112f84} - %profile%\extensions\{5e594888-3e8e-47da-b2c6-b0b545112f84}
FF - Ext: DownThemAll!: {DDC359D1-844A-42a7-9AA1-88A850A938A8} - %profile%\extensions\{DDC359D1-844A-42a7-9AA1-88A850A938A8}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TinEye Reverse Image Search: tineye@ideeinc.com - %profile%\extensions\tineye@ideeinc.com
FF - Ext: Greasemonkey: {e4a8a97b-f2ed-450b-b12d-ee082ba24781} - %profile%\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}
FF - Ext: ReloadEvery: {888d99e7-e8b5-46a3-851e-1ec45da1e644} - %profile%\extensions\{888d99e7-e8b5-46a3-851e-1ec45da1e644}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
============= SERVICES / DRIVERS ===============
.
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2008-10-7 387480]
R1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\drivers\jswpslwf.sys [2008-7-10 20384]
R1 mfenlfk;McAfee NDIS Light Filter;c:\windows\system32\drivers\mfenlfk.sys [2011-2-18 64584]
R1 mfewfpk;McAfee Inc. mfewfpk;c:\windows\system32\drivers\mfewfpk.sys [2011-2-18 165032]
R2 ConfigFree Service;ConfigFree Service;c:\program files\toshiba\configfree\CFSvcs.exe [2008-4-17 40960]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 McMPFSvc;McAfee Personal Firewall Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McProxy;McAfee Proxy Service;c:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2011-2-18 271480]
R2 McShield;McShield;c:\program files\common files\mcafee\systemcore\mcshield.exe [2011-2-18 171168]
R2 mfefire;McAfee Firewall Core Service;c:\program files\common files\mcafee\systemcore\mfefire.exe [2011-2-18 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2011-2-18 141792]
R2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\nvidia corporation\nvidia updatus\daemonu.exe [2011-5-30 2218600]
R2 OpenLibSys;OpenLibSys;c:\program files\nxp\fm radio\OpenLibSys.sys [2008-7-10 14672]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\nvidia corporation\3d vision\nvSCPAPISvr.exe [2011-4-7 378472]
R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [2011-2-18 56064]
R3 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [2011-7-31 218688]
R3 JMCR;JMCR;c:\windows\system32\drivers\jmcr.sys [2008-5-21 86672]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2008-10-7 153280]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2008-10-7 52320]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [2011-2-18 314088]
R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32v.sys [2011-5-30 139368]
R3 SmartFaceVWatchSrv;SmartFaceVWatchSrv;c:\program files\toshiba\smartfacev\SmartFaceVWatchSrv.exe [2008-4-24 73728]
R3 ubloxusb;ubloxusb;c:\windows\system32\drivers\ubloxusb.sys [2008-5-7 73216]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 RasMan32;Remote Access Connection Manager ;c:\programdata\rdpdd32.exe --> c:\programdata\rdpdd32.exe [?]
S2 WPCSvc32;Parental Controls ;c:\programdata\d3dx9_2432.exe --> c:\programdata\d3dx9_2432.exe [?]
S3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\jumpstart\jswpsapi.exe [2008-7-10 954368]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2011-2-18 84488]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2008-10-7 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2008-10-7 40552]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2011-08-24 22:02:35 -------- d-----w- c:\program files\ESET
2011-08-24 22:00:14 2048 ----a-w- c:\windows\system32\tzres.dll
2011-08-23 03:48:48 -------- d-----w- c:\users\thrash driveshaft\appdata\local\temp
2011-08-23 03:47:58 -------- d-sh--w- C:\$RECYCLE.BIN
2011-08-23 03:35:54 -------- d-----w- C:\ComboFix
2011-08-22 23:21:41 98816 ----a-w- c:\windows\sed.exe
2011-08-22 23:21:41 518144 ----a-w- c:\windows\SWREG.exe
2011-08-22 23:21:41 256000 ----a-w- c:\windows\PEV.exe
2011-08-22 23:21:41 208896 ----a-w- c:\windows\MBR.exe
2011-08-10 22:42:46 2409784 ----a-w- c:\program files\windows mail\OESpamFilter.dat
2011-08-10 22:41:46 3602832 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-08-10 22:41:45 3550096 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-08-10 22:41:43 905104 ----a-w- c:\windows\system32\drivers\tcpip.sys
2011-07-31 21:18:44 218688 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys
2011-07-31 21:17:46 -------- d-----w- c:\users\thrash driveshaft\appdata\roaming\DAEMON Tools Lite
2011-07-31 21:17:46 -------- d-----w- c:\programdata\DAEMON Tools Lite
.
==================== Find3M ====================
.
2011-08-25 23:55:14 544656 ----a-w- c:\windows\system32\deployJava1.dll
2011-07-23 20:14:58 0 ---ha-w- c:\windows\system32\tutcdozvjn.tmp
2011-07-22 13:54:40 1383424 ----a-w- c:\windows\system32\mshtml.tlb
2011-07-07 00:52:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-07 00:52:42 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-06 15:31:47 214016 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2011-06-21 15:49:52 834048 ----a-w- c:\windows\system32\wininet.dll
2011-06-21 14:13:51 389632 ----a-w- c:\windows\system32\html.iec
2011-06-17 16:03:18 375808 ----a-w- c:\windows\system32\winsrv.dll
2011-06-02 13:34:49 2043392 ----a-w- c:\windows\system32\win32k.sys
.
============= FINISH: 18:57:57.77 ===============

#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 25 August 2011 - 07:14 PM

You can uninstall it normally through Add/Remove programs, nothing special is required.

We just need to do some house cleaning now, please do the following:


You can delete the DDS and GMER logs and programs from your desktop.


NEXT


Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Click START then RUN
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Posted Image


If there are any logs/tools remaining on your desktop > right click and delete them.


NEXT


Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

  • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
    • Green to go
    • Yellow for caution
    • Red to stop
    WOT has an addon available for both Firefox and IE

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at this well written article:
    PC Safety and Security--What Do I Need?.


**Be very wary with any security software that is advertised in popups or in other ways. They are not only usually of no use, but often have malware in them.


Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 NonPerson

NonPerson
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:45 AM

Posted 26 August 2011 - 05:33 PM

All appears to be well, and the case seems closed.

Thanks for all the work you folks do; not just for me, but for all the average travelers out here on the Interbutts.

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 26 August 2011 - 07:09 PM

You are welcome

stay safe :hello:

~CB

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:45 AM

Posted 26 August 2011 - 07:09 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users