Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirector and rootkit?


  • This topic is locked This topic is locked
20 replies to this topic

#1 Magness

Magness

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 23 September 2011 - 08:59 AM

I was using MSE for my antivirus. It currently says "Security Essentials isn't monitoring your computer because the program's service is stopped. You should restart it now." But I can't restart it (nothing happens when I click there). I tried reinstalling it once, and it briefly worked but didn't take very long before it stopped again.

I tried installing Avast instead. It has at times run long enough to get partway through a scan. It removed something the first time it ran (sorry, don't recall the name). It now tells me I have 2 rootkits: mrxsmb.sys, and 2757844742:4188053083.exe. It tried to delete them, but within 2 reboots they were back. It now also has stopped. "The avast! antivirus program has been stopped, or is in an inconsistent state. Please re-start the program to resume protecting your system." But nothing happens when I click start program. I can't uninstall it - it is no longer in the Add/Remove programs list. (I found a tool online that claims to be able to do it manually, but I figured I'd wait for instructions there).

On boot, I get an error "2757844742:4188053083.exe Application Error". It's the error about the instruction at "0x000002c8" tried to reference memory at "0x000002c8" but the memory could not be "read".

When I tried to use google on that computer, I periodically got a redirect to a "find-answers-fast" website. I've read online that that is a common virus side effect.

I have read the preparation guide, and taken the following steps:
1. I have not succesfully backed up all my data (I'm having problems getting the DVD writer drive and the DVD-Rs to cooperate. I don't know if that's related). However, none of the important data is on the C drive. (There are 3 hard drives in the computer).
2. I turned on Windows Firewall, which had not previously been on (we had thought the router was sufficient)
3. I ran Defogger, DDS, and tried to run GMER

I had problems running GMER.
First (probably not relevant) I apparently had a power fluctuation take out my power supply during my first run attempt. The computer is now booting again with a replacement power supply. Then I started it running again. 3.5 hours later, when I went to sleep, it hadn't finished.

This morning, the program was no longer open, and the .exe on the desktop would no longer launch. Error message "Windows cannot access the specified device,path, or file. You may not have the appropriate permission to access the file." I'm thinking it's gone the same way as MSE and Avast?
I put a new copy of GMER on the computer, and started it running again. I let it get through to the point of scanning c:, and then saved a log even though it's not done, so I could go ahead and post. The last entry on the screen is the same I remember being last after 3.5 hours last night. I've left GMER running in case I observe what goes wrong or it finishes this time.

Other information that might be relevant:
I have access to a (hopefully) still clean computer in the same room as the infected one - so I can download things from it and transfer via USB stick fairly easily. The infected computer can still access the internet if plugged in, but I am leaving its network cable disconnected most of
the time to prevent the infection from spreading.

Two days ago, when I first started noticing a problem, I observed an svchost process using up most of my CPU cycles. However, that problem has not recurred since the first time I ran avast, so I'm presuming that avast dealt with that problem.

Thanks for your help!

The DDS report:
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_21
Run by Matt at 11:28:02 on 2011-09-22
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1503 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Intel\IDU\awServ.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\VMware\VMware Virtual Image Editing\vmount2.exe
C:\WINDOWS\system32\vmnat.exe
C:\WINDOWS\system32\vmnetdhcp.exe
C:\Program Files\VMware\VMware Player\vmware-authd.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\ALCWZRD.EXE
C:\Program Files\Intel\IDU\iptray.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\Documents and Settings\Matt\Local Settings\Apps\F.lux\flux.exe
C:\Documents and Settings\Matt\Local Settings\Application Data\Google\Update\1.3.21.69\GoogleCrashHandler.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\iPod\bin\iPodService.exe
.
============== Pseudo HJT Report ===============
.
uSearch Page = hxxp://us.rd.yahoo.com/customize/ycomp_adbe/defaults/sp/*http://www.yahoo.com
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ycomp_adbe/defaults/sb/*http://www.yahoo.com/search/ie.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
uRun: [Google Update] "c:\documents and settings\matt\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [F.lux] "c:\documents and settings\matt\local settings\apps\f.lux\flux.exe" /noshow
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [ipTray.exe] "c:\program files\intel\idu\iptray.exe"
mRun: [NeroCheck] c:\windows\system32\NeroCheck.exe
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [avast] "c:\program files\avast software\avast\avastUI.exe" /nogui
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: mswsock.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1122077426734
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1164405775250
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: Interfaces\{B1C01E6B-D7C4-42D0-8057-979DA5E8AA26} : DhcpNameServer = 68.115.71.53 24.196.64.53 24.159.193.40
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\matt\application data\mozilla\firefox\profiles\pjdm9xsq.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://magness.my3gb.com/ToDo.php
FF - plugin: c:\documents and settings\matt\local settings\application data\google\update\1.3.21.69\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60531.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
.
---- FIREFOX POLICIES ----
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
============= SERVICES / DRIVERS ===============
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2011-9-21 442200]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2011-9-21 320856]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
R1 vcdrom;Virtual CD-ROM Device Driver;c:\windows\system32\drivers\VCdRom.sys [2007-3-9 8576]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2011-9-21 20568]
R2 AWService;Admin Works Agent X8;c:\program files\intel\idu\awServ.exe [2006-12-27 74520]
R2 vpnagent;Cisco AnyConnect VPN Agent;c:\program files\cisco\cisco anyconnect vpn client\vpnagent.exe [2009-6-17 434864]
R3 GigNIC;NDIS5.1 Miniport Driver for Belkin Gigabit Desktop Card;c:\windows\system32\drivers\GigNIC.sys [2005-7-23 169856]
R4 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-6-21 41272]
S1 MpKsl2f85a016;MpKsl2f85a016;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c4c36a20-1f0f-4325-a579-0fb9a3acbe24}\mpksl2f85a016.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c4c36a20-1f0f-4325-a579-0fb9a3acbe24}\MpKsl2f85a016.sys [?]
S1 MpKsl706177f1;MpKsl706177f1;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpksl706177f1.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKsl706177f1.sys [?]
S1 MpKsl94eb2373;MpKsl94eb2373;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{9064812f-924f-458e-9471-b72363364e74}\mpksl94eb2373.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{9064812f-924f-458e-9471-b72363364e74}\MpKsl94eb2373.sys [?]
S1 MpKsla4e9d178;MpKsla4e9d178;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpksla4e9d178.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKsla4e9d178.sys [?]
S1 MpKslc3e1a8bb;MpKslc3e1a8bb;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpkslc3e1a8bb.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKslc3e1a8bb.sys [?]
S2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2011-9-21 44768]
S3 cmvad;C-Media Wi-Sonic Wireless Audio Interface;c:\windows\system32\drivers\cmudaxv.sys --> c:\windows\system32\drivers\cmudaxv.sys [?]
.
=============== Created Last 30 ================
.
2011-09-21 18:00:50 442200 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2011-09-21 18:00:18 41184 ----a-w- c:\windows\avastSS.scr
2011-09-21 13:33:15 -------- d-----w- c:\documents and settings\all users\application data\AVAST Software
2011-09-21 13:33:14 -------- d-----w- c:\program files\AVAST Software
2011-09-21 12:56:47 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{11deae08-f807-44ae-90ed-dbb5cfac6d25}\mpengine.dll
2011-09-21 12:52:50 -------- d-----w- c:\program files\Microsoft Security Client
2011-09-21 12:51:31 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-09-03 13:34:16 -------- d-----w- c:\program files\EasyPHP-5.3.8.0
2011-09-03 10:17:37 599040 -c----w- c:\windows\system32\dllcache\crypt32.dll
.
==================== Find3M ====================
.
2011-09-22 15:24:49 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-07 13:06:01 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-08-31 22:00:50 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-15 13:29:31 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
============= FINISH: 11:29:47.20 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 27 September 2011 - 11:27 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".

information and logs:

  • In your next post I need the following

  • .logs from DDS
  • log from RKUnHooker
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 08:46 AM

Thanks for your help! I am still having problems - the computer has spent most of its time powered down, and most of its powered time disconnected from the internet, so hopefully it hasn't gotten any worse.

Here are the logs from DDS:

dds.txt
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_21
Run by Matt at 8:21:42 on 2011-09-28
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1546 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\ALCWZRD.EXE
C:\Program Files\Intel\IDU\iptray.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\Documents and Settings\Matt\Local Settings\Apps\F.lux\flux.exe
C:\Documents and Settings\Matt\Local Settings\Application Data\Google\Update\1.3.21.69\GoogleCrashHandler.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Intel\IDU\awServ.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\VMware\VMware Virtual Image Editing\vmount2.exe
C:\WINDOWS\system32\vmnat.exe
C:\WINDOWS\system32\vmnetdhcp.exe
C:\Program Files\VMware\VMware Player\vmware-authd.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\iPod\bin\iPodService.exe
.
============== Pseudo HJT Report ===============
.
uSearch Page = hxxp://us.rd.yahoo.com/customize/ycomp_adbe/defaults/sp/*http://www.yahoo.com
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ycomp_adbe/defaults/sb/*http://www.yahoo.com/search/ie.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
uRun: [Google Update] "c:\documents and settings\matt\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [F.lux] "c:\documents and settings\matt\local settings\apps\f.lux\flux.exe" /noshow
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [ipTray.exe] "c:\program files\intel\idu\iptray.exe"
mRun: [NeroCheck] c:\windows\system32\NeroCheck.exe
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [avast] "c:\program files\avast software\avast\avastUI.exe" /nogui
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: mswsock.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1122077426734
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1164405775250
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: Interfaces\{B1C01E6B-D7C4-42D0-8057-979DA5E8AA26} : DhcpNameServer = 68.115.71.53 24.196.64.53 24.159.193.40
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\matt\application data\mozilla\firefox\profiles\pjdm9xsq.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://magness.my3gb.com/ToDo.php
FF - plugin: c:\documents and settings\matt\local settings\application data\google\update\1.3.21.69\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60531.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
.
---- FIREFOX POLICIES ----
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
============= SERVICES / DRIVERS ===============
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2011-9-21 442200]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2011-9-21 320856]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
R1 vcdrom;Virtual CD-ROM Device Driver;c:\windows\system32\drivers\VCdRom.sys [2007-3-9 8576]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2011-9-21 20568]
R2 AWService;Admin Works Agent X8;c:\program files\intel\idu\awServ.exe [2006-12-27 74520]
R2 vpnagent;Cisco AnyConnect VPN Agent;c:\program files\cisco\cisco anyconnect vpn client\vpnagent.exe [2009-6-17 434864]
R3 GigNIC;NDIS5.1 Miniport Driver for Belkin Gigabit Desktop Card;c:\windows\system32\drivers\GigNIC.sys [2005-7-23 169856]
S1 MpKsl2f85a016;MpKsl2f85a016;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c4c36a20-1f0f-4325-a579-0fb9a3acbe24}\mpksl2f85a016.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{c4c36a20-1f0f-4325-a579-0fb9a3acbe24}\MpKsl2f85a016.sys [?]
S1 MpKsl706177f1;MpKsl706177f1;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpksl706177f1.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKsl706177f1.sys [?]
S1 MpKsl94eb2373;MpKsl94eb2373;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{9064812f-924f-458e-9471-b72363364e74}\mpksl94eb2373.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{9064812f-924f-458e-9471-b72363364e74}\MpKsl94eb2373.sys [?]
S1 MpKsla4e9d178;MpKsla4e9d178;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpksla4e9d178.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKsla4e9d178.sys [?]
S1 MpKslc3e1a8bb;MpKslc3e1a8bb;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\mpkslc3e1a8bb.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{846944b7-422f-4d0c-9e4b-f211d73d7164}\MpKslc3e1a8bb.sys [?]
S2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2011-9-21 44768]
S3 cmvad;C-Media Wi-Sonic Wireless Audio Interface;c:\windows\system32\drivers\cmudaxv.sys --> c:\windows\system32\drivers\cmudaxv.sys [?]
.
=============== Created Last 30 ================
.
2011-09-23 13:16:34 -------- d-----w- C:\gmer
2011-09-21 18:00:50 442200 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2011-09-21 18:00:18 41184 ----a-w- c:\windows\avastSS.scr
2011-09-21 13:33:15 -------- d-----w- c:\documents and settings\all users\application data\AVAST Software
2011-09-21 13:33:14 -------- d-----w- c:\program files\AVAST Software
2011-09-21 12:56:47 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{11deae08-f807-44ae-90ed-dbb5cfac6d25}\mpengine.dll
2011-09-21 12:52:50 -------- d-----w- c:\program files\Microsoft Security Client
2011-09-21 12:51:31 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-09-03 13:34:16 -------- d-----w- c:\program files\EasyPHP-5.3.8.0
2011-09-03 10:17:37 599040 -c----w- c:\windows\system32\dllcache\crypt32.dll
.
==================== Find3M ====================
.
2011-09-22 15:24:49 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-07 13:06:01 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-08-31 22:00:50 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-15 13:29:31 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
============= FINISH: 8:23:33.17 ===============

attach.txt


.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2011-08-26.01)
.
Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume3
Install Date: 7/22/2005 1:36:12 PM
System Uptime: 9/28/2011 8:16:34 AM (0 hours ago)
.
Motherboard: Intel Corporation | | D915PBL
Processor: Intel® Pentium® 4 CPU 3.00GHz | J2E1 | 3000/200mhz
.
==== Disk Partitions =========================
.
A: is Removable
C: is FIXED (NTFS) - 75 GiB total, 2.369 GiB free.
D: is CDROM ()
E: is FIXED (NTFS) - 110 GiB total, 24.621 GiB free.
G: is FIXED (NTFS) - 39 GiB total, 33.937 GiB free.
H: is Removable
I: is Removable
.
==== Disabled Device Manager Items =============
.
Class GUID: {4D36E972-E325-11CE-BFC1-08002BE10318}
Description: Cisco AnyConnect VPN Virtual Miniport Adapter for Windows
Device ID: ROOT\NET\0001
Manufacturer: Cisco Systems
Name: Cisco AnyConnect VPN Virtual Miniport Adapter for Windows
PNP Device ID: ROOT\NET\0001
Service: vpnva
.
==== System Restore Points ===================
.
RP1978: 7/12/2011 9:37:00 AM - Software Distribution Service 3.0
RP1979: 7/13/2011 11:08:55 AM - System Checkpoint
RP1980: 7/13/2011 9:02:24 PM - Software Distribution Service 3.0
RP1981: 7/14/2011 8:06:00 AM - Software Distribution Service 3.0
RP1982: 7/15/2011 11:32:21 AM - Software Distribution Service 3.0
RP1983: 7/18/2011 9:09:10 AM - Software Distribution Service 3.0
RP1984: 7/19/2011 9:26:17 AM - System Checkpoint
RP1985: 7/20/2011 8:21:20 AM - Software Distribution Service 3.0
RP1986: 7/21/2011 9:28:01 AM - System Checkpoint
RP1987: 7/22/2011 7:58:37 AM - Software Distribution Service 3.0
RP1988: 7/23/2011 8:26:41 AM - Software Distribution Service 3.0
RP1989: 7/23/2011 10:42:42 AM - Software Distribution Service 3.0
RP1990: 7/24/2011 7:59:24 AM - Software Distribution Service 3.0
RP1991: 7/25/2011 11:52:45 AM - Software Distribution Service 3.0
RP1992: 7/26/2011 12:39:59 PM - System Checkpoint
RP1993: 7/27/2011 11:39:50 AM - Software Distribution Service 3.0
RP1994: 7/28/2011 11:58:50 AM - System Checkpoint
RP1995: 8/1/2011 12:00:30 PM - Software Distribution Service 3.0
RP1996: 8/2/2011 12:10:52 PM - System Checkpoint
RP1997: 8/3/2011 7:31:51 AM - Software Distribution Service 3.0
RP1998: 8/4/2011 11:33:01 AM - Software Distribution Service 3.0
RP1999: 8/5/2011 11:28:31 AM - Software Distribution Service 3.0
RP2000: 8/6/2011 4:26:53 PM - System Checkpoint
RP2001: 8/7/2011 8:09:50 AM - Software Distribution Service 3.0
RP2002: 8/8/2011 8:15:41 AM - Software Distribution Service 3.0
RP2003: 8/9/2011 3:00:18 AM - Software Distribution Service 3.0
RP2004: 8/10/2011 3:00:19 AM - Software Distribution Service 3.0
RP2005: 8/10/2011 3:47:33 AM - Software Distribution Service 3.0
RP2006: 8/11/2011 7:58:26 AM - Software Distribution Service 3.0
RP2007: 8/12/2011 7:53:12 AM - Software Distribution Service 3.0
RP2008: 8/13/2011 7:54:44 AM - Software Distribution Service 3.0
RP2009: 8/14/2011 7:34:47 AM - Software Distribution Service 3.0
RP2010: 8/15/2011 7:54:49 AM - Software Distribution Service 3.0
RP2011: 8/16/2011 7:56:02 AM - Software Distribution Service 3.0
RP2012: 8/17/2011 7:56:09 AM - Software Distribution Service 3.0
RP2013: 8/18/2011 7:57:31 AM - Software Distribution Service 3.0
RP2014: 8/19/2011 7:57:35 AM - Software Distribution Service 3.0
RP2015: 8/20/2011 7:57:02 AM - Software Distribution Service 3.0
RP2016: 8/21/2011 7:38:07 AM - Software Distribution Service 3.0
RP2017: 8/22/2011 7:58:36 AM - Software Distribution Service 3.0
RP2018: 8/23/2011 7:59:41 AM - Software Distribution Service 3.0
RP2019: 8/24/2011 3:00:19 AM - Software Distribution Service 3.0
RP2020: 8/24/2011 7:59:53 AM - Software Distribution Service 3.0
RP2021: 8/25/2011 8:00:03 AM - Software Distribution Service 3.0
RP2022: 8/30/2011 2:47:51 PM - Software Distribution Service 3.0
RP2023: 8/31/2011 2:42:53 PM - Software Distribution Service 3.0
RP2024: 9/1/2011 3:11:18 PM - System Checkpoint
RP2025: 9/2/2011 9:28:07 AM - Software Distribution Service 3.0
RP2026: 9/3/2011 11:49:55 AM - System Checkpoint
RP2027: 9/3/2011 4:09:32 PM - Software Distribution Service 3.0
RP2028: 9/4/2011 8:25:21 AM - Software Distribution Service 3.0
RP2029: 9/4/2011 4:09:56 PM - Software Distribution Service 3.0
RP2030: 9/5/2011 4:10:32 PM - Software Distribution Service 3.0
RP2031: 9/6/2011 4:10:04 PM - Software Distribution Service 3.0
RP2032: 9/6/2011 8:22:50 PM - Software Distribution Service 3.0
RP2033: 9/8/2011 7:43:44 AM - Software Distribution Service 3.0
RP2034: 9/9/2011 8:47:13 AM - Software Distribution Service 3.0
RP2035: 9/10/2011 9:02:19 AM - System Checkpoint
RP2036: 9/11/2011 8:02:45 AM - Software Distribution Service 3.0
RP2037: 9/12/2011 8:09:55 AM - Software Distribution Service 3.0
RP2038: 9/13/2011 8:30:24 AM - System Checkpoint
RP2039: 9/13/2011 7:13:14 PM - Software Distribution Service 3.0
RP2040: 9/14/2011 7:34:40 PM - System Checkpoint
RP2041: 9/14/2011 9:14:58 PM - Software Distribution Service 3.0
RP2042: 9/15/2011 7:09:49 AM - Software Distribution Service 3.0
RP2043: 9/16/2011 7:04:46 AM - Software Distribution Service 3.0
RP2044: 9/19/2011 7:54:53 AM - Software Distribution Service 3.0
RP2045: 9/20/2011 7:49:52 AM - Software Distribution Service 3.0
RP2046: 9/22/2011 7:39:11 PM - System Checkpoint
RP2047: 9/23/2011 7:45:25 PM - System Checkpoint
RP2048: 9/24/2011 8:26:26 PM - System Checkpoint
RP2049: 9/25/2011 9:01:48 PM - System Checkpoint
RP2050: 9/27/2011 4:46:11 PM - System Checkpoint
.
==== Installed Programs ======================
.
7-Zip 4.57
Adobe Flash Player 10 Plugin
Adobe Flash Player 9 ActiveX
Adobe Reader 8.1.3
Adobe® Photoshop® Album Starter Edition 3.0
AFPL Ghostscript 8.54
AFPL Ghostscript Fonts
AiO_Scan_CDA
AiOSoftwareNPI
Apple Application Support
Apple Mobile Device Support
Apple Software Update
Belkin Gigabit Ethernet
BitTorrent
Bonjour
BufferChm
C3100
c3100_Help
CDBurnerXP Pro 3
CDex extraction audio
CDisplay 1.8
Character Builder
Character Builder Beta
Cisco AnyConnect VPN Client
Compatibility Pack for the 2007 Office system
Critical Update for Windows Media Player 11 (KB959772)
Debugging Tools for Windows
Destinations
DeviceManagementQFolder
DivX Content Uploader
DivX Web Player
DocProc
DocProcQFolder
Dundjinni
eSupportQFolder
F.lux
Fax_CDA
ffdshow [rev 610] [2006-12-01]
FFH Wild Mana 9.0 Beta Update 3
Gaim (remove only)
GameCenter
GIMP 2.4.6
GNU Aspell 0.50-3
Google Chrome
GSview 4.8
GTK+ Runtime 2.6.9 rev a (remove only)
Hamachi 1.0.3.0
High Definition Audio Driver Package - KB835221
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
Hotfix for Windows Internet Explorer 7 (KB947864)
Hotfix for Windows Media Format 11 SDK (KB929399)
Hotfix for Windows Media Player 11 (KB939683)
Hotfix for Windows XP (KB2158563)
Hotfix for Windows XP (KB2443685)
Hotfix for Windows XP (KB2570791)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB954550-v5)
Hotfix for Windows XP (KB961118)
Hotfix for Windows XP (KB970653-v3)
Hotfix for Windows XP (KB976098-v2)
Hotfix for Windows XP (KB979306)
Hotfix for Windows XP (KB981793)
HP Imaging Device Functions 7.0
HP Photosmart and Deskjet 7.0.A
HP Photosmart Essential
HP Product Assistant
HP Solution Center 7.0
HP Update
HPPhotoSmartExpress
HPProductAssistant
InstantShareDevicesMFC
Intel® Desktop Utilities
Intel® PRO Network Adapters and Drivers
Intel® SMBus
iTunes
J2SE Runtime Environment 5.0 Update 11
J2SE Runtime Environment 5.0 Update 6
Java Auto Updater
Java™ 6 Update 21
Java™ SE Development Kit 6
Java™ SE Runtime Environment 6
Loki
Magic Set Editor 2 - 0.3.8 beta
Malwarebytes' Anti-Malware version 1.51.2.1300
Master of Mana Beta Patch
Master of Mana Full Setup
MediaMonkey 3.2
Microsoft .NET Framework (English)
Microsoft .NET Framework (English) v1.0.3705
Microsoft .NET Framework 1.0 Hotfix (KB928367)
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Security Update (KB2416447)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5 SP1
Microsoft Antimalware
Microsoft Application Error Reporting
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft Document Explorer 2005
Microsoft FrontPage Client - English
Microsoft Games for Windows - LIVE Redistributable
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft National Language Support Downlevel APIs
Microsoft Office XP Professional with FrontPage
Microsoft Security Client
Microsoft Security Essentials
Microsoft Silverlight
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
Microsoft Visual C++ 6.0 Professional Edition
Microsoft Visual J# .NET Redistributable Package 1.1
Microsoft Visual J# 2.0 Redistributable Package
Microsoft Visual Studio .NET Professional - English
Microsoft Visual Studio 2005 Standard Edition - ENU
Microsoft Visual Studio 2005 Standard Edition - ENU Service Pack 1 (KB926601)
MiKTeX 2.8
MobileMe Control Panel
Morrowind
Motorola Driver Installation
Motorola Phone Tools
Mozilla Firefox 6.0.2 (x86 en-US)
MSDN Library - Visual Studio 6.0a
MSXML 4.0 SP2 (KB927978)
MSXML 4.0 SP2 (KB936181)
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
MSXML 6.0 Parser (KB933579)
NewCopy_CDA
NewsBin Pro
NVIDIA Drivers
OCR Software by I.R.I.S 7.0
Octoshape add-in for Adobe Flash Player
OGA Notifier 2.0.0048.0
OpenOffice.org 3.2
OpenSource Flash Video Splitter (remove only)
PanoStandAlone
PCGen598
PDF-Viewer
PowerDVD
PRC Pack
ProductContextNPI
QuickPar 0.9
QuickTime
RAD Video Tools
Readme
Real Alternative 1.47
Realtek High Definition Audio Driver
Recuva
Scan
ScannerCopy
Security Update for CAPICOM (KB931906)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2416473)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB2251481)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB2538218)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB2548826)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB947738)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB971023)
Security Update for Microsoft Visual Studio 2005 Standard Edition - ENU (KB973673)
Security Update for Windows Internet Explorer 7 (KB928090)
Security Update for Windows Internet Explorer 7 (KB929969)
Security Update for Windows Internet Explorer 7 (KB931768)
Security Update for Windows Internet Explorer 7 (KB933566)
Security Update for Windows Internet Explorer 7 (KB937143)
Security Update for Windows Internet Explorer 7 (KB938127)
Security Update for Windows Internet Explorer 7 (KB939653)
Security Update for Windows Internet Explorer 7 (KB942615)
Security Update for Windows Internet Explorer 7 (KB944533)
Security Update for Windows Internet Explorer 7 (KB950759)
Security Update for Windows Internet Explorer 7 (KB953838)
Security Update for Windows Internet Explorer 7 (KB956390)
Security Update for Windows Internet Explorer 7 (KB958215)
Security Update for Windows Internet Explorer 7 (KB960714)
Security Update for Windows Internet Explorer 7 (KB961260)
Security Update for Windows Internet Explorer 7 (KB963027)
Security Update for Windows Internet Explorer 7 (KB969897)
Security Update for Windows Internet Explorer 7 (KB972260)
Security Update for Windows Internet Explorer 7 (KB974455)
Security Update for Windows Internet Explorer 8 (KB2183461)
Security Update for Windows Internet Explorer 8 (KB2360131)
Security Update for Windows Internet Explorer 8 (KB2416400)
Security Update for Windows Internet Explorer 8 (KB2482017)
Security Update for Windows Internet Explorer 8 (KB2497640)
Security Update for Windows Internet Explorer 8 (KB2510531)
Security Update for Windows Internet Explorer 8 (KB2530548)
Security Update for Windows Internet Explorer 8 (KB2544521)
Security Update for Windows Internet Explorer 8 (KB2559049)
Security Update for Windows Internet Explorer 8 (KB971961)
Security Update for Windows Internet Explorer 8 (KB974455)
Security Update for Windows Internet Explorer 8 (KB976325)
Security Update for Windows Internet Explorer 8 (KB978207)
Security Update for Windows Internet Explorer 8 (KB981332)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB2378111)
Security Update for Windows Media Player (KB911564)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB968816)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB975558)
Security Update for Windows Media Player (KB978695)
Security Update for Windows Media Player 11 (KB936782)
Security Update for Windows Media Player 11 (KB954154)
Security Update for Windows Media Player 6.4 (KB925398)
Security Update for Windows Media Player 9 (KB911565)
Security Update for Windows Media Player 9 (KB917734)
Security Update for Windows Media Player 9 (KB936782)
Security Update for Windows XP (KB2079403)
Security Update for Windows XP (KB2115168)
Security Update for Windows XP (KB2121546)
Security Update for Windows XP (KB2160329)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB2259922)
Security Update for Windows XP (KB2279986)
Security Update for Windows XP (KB2286198)
Security Update for Windows XP (KB2296011)
Security Update for Windows XP (KB2296199)
Security Update for Windows XP (KB2347290)
Security Update for Windows XP (KB2360937)
Security Update for Windows XP (KB2387149)
Security Update for Windows XP (KB2393802)
Security Update for Windows XP (KB2412687)
Security Update for Windows XP (KB2419632)
Security Update for Windows XP (KB2423089)
Security Update for Windows XP (KB2436673)
Security Update for Windows XP (KB2440591)
Security Update for Windows XP (KB2443105)
Security Update for Windows XP (KB2476490)
Security Update for Windows XP (KB2476687)
Security Update for Windows XP (KB2478960)
Security Update for Windows XP (KB2478971)
Security Update for Windows XP (KB2479628)
Security Update for Windows XP (KB2479943)
Security Update for Windows XP (KB2481109)
Security Update for Windows XP (KB2483185)
Security Update for Windows XP (KB2485376)
Security Update for Windows XP (KB2485663)
Security Update for Windows XP (KB2503658)
Security Update for Windows XP (KB2503665)
Security Update for Windows XP (KB2506212)
Security Update for Windows XP (KB2506223)
Security Update for Windows XP (KB2507618)
Security Update for Windows XP (KB2507938)
Security Update for Windows XP (KB2508272)
Security Update for Windows XP (KB2508429)
Security Update for Windows XP (KB2509553)
Security Update for Windows XP (KB2511455)
Security Update for Windows XP (KB2524375)
Security Update for Windows XP (KB2535512)
Security Update for Windows XP (KB2536276-v2)
Security Update for Windows XP (KB2536276)
Security Update for Windows XP (KB2544893)
Security Update for Windows XP (KB2555917)
Security Update for Windows XP (KB2562937)
Security Update for Windows XP (KB2566454)
Security Update for Windows XP (KB2567680)
Security Update for Windows XP (KB2570222)
Security Update for Windows XP (KB2570947)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923689)
Security Update for Windows XP (KB938464)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950760)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951376)
Security Update for Windows XP (KB951698)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB953839)
Security Update for Windows XP (KB954211)
Security Update for Windows XP (KB954459)
Security Update for Windows XP (KB954600)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956391)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956841)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB957095)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958690)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960715)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961371)
Security Update for Windows XP (KB961373)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB969898)
Security Update for Windows XP (KB969947)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971468)
Security Update for Windows XP (KB971486)
Security Update for Windows XP (KB971557)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973346)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973525)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975561)
Security Update for Windows XP (KB975562)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977165)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978037)
Security Update for Windows XP (KB978251)
Security Update for Windows XP (KB978262)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978601)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979559)
Security Update for Windows XP (KB979683)
Security Update for Windows XP (KB979687)
Security Update for Windows XP (KB980195)
Security Update for Windows XP (KB980218)
Security Update for Windows XP (KB980232)
Security Update for Windows XP (KB980436)
Security Update for Windows XP (KB981322)
Security Update for Windows XP (KB981852)
Security Update for Windows XP (KB981957)
Security Update for Windows XP (KB981997)
Security Update for Windows XP (KB982132)
Security Update for Windows XP (KB982214)
Security Update for Windows XP (KB982665)
Security Update for Windows XP (KB982802)
Sid Meier's Civilization 4
Sid Meier's Civilization 4 - Beyond the Sword
Sid Meier's Railroad Tycoon
Skype™ 5.1
SmartDraw 7
SolutionCenter
SSH Secure Shell
Status
Stronghold Legends
TES Construction Set
TeXnicCenter Version 1.0 Stable RC1
Titan Quest
Titan Quest Immortal Throne
Toolbox
TQVault
TrayApp
Unload
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Windows Internet Explorer 8 (KB973874)
Update for Windows Internet Explorer 8 (KB976662)
Update for Windows Internet Explorer 8 (KB976749)
Update for Windows Internet Explorer 8 (KB980182)
Update for Windows XP (KB2141007)
Update for Windows XP (KB2345886)
Update for Windows XP (KB2467659)
Update for Windows XP (KB2541763)
Update for Windows XP (KB2607712)
Update for Windows XP (KB2616676)
Update for Windows XP (KB951072-v2)
Update for Windows XP (KB951978)
Update for Windows XP (KB955759)
Update for Windows XP (KB955839)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB971029)
Update for Windows XP (KB971737)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
Visual Studio .NET Professional - English
Visual Studio.NET Baseline - English
VMware Player
VoiceOver Kit
Ward180
WebFldrs XP
WebReg
Winamp (remove only)
Windows Genuine Advantage Notifications (KB905474)
Windows Genuine Advantage v1.3.0254.0
Windows Genuine Advantage Validation Tool (KB892130)
Windows Internet Explorer 7
Windows Internet Explorer 8
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Service Pack 3
WinRAR archiver
WinZip
Xfire (remove only)
XMLinst
XviD MPEG-4 Video Codec
.
==== Event Viewer Messages From Past Week ========
.
9/26/2011 10:30:19 AM, error: System Error [1003] - Error code 1000008e, parameter1 c000009a, parameter2 804e566b, parameter3 aadc05f0, parameter4 00000000.
9/26/2011 10:30:03 AM, error: System Error [1003] - Error code 1000000a, parameter1 000000b0, parameter2 00000002, parameter3 00000000, parameter4 804ef42a.
9/26/2011 10:29:51 AM, error: System Error [1003] - Error code 1000008e, parameter1 c0000005, parameter2 805e1cc7, parameter3 f6a11c74, parameter4 00000000.
9/23/2011 8:17:21 AM, error: atapi [9] - The device, \Device\Ide\IdePort2, did not respond within the timeout period.
9/23/2011 2:19:08 AM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 480 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/22/2011 8:19:04 PM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 120 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/22/2011 8:15:32 AM, error: Service Control Manager [7009] - Timeout (30000 milliseconds) waiting for the Admin Works Agent X8 service to connect.
9/22/2011 7:19:03 PM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 60 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/22/2011 6:49:03 PM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 30 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/22/2011 5:51:59 PM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 15 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/22/2011 10:19:07 PM, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 240 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)
9/21/2011 8:06:36 AM, error: Service Control Manager [7031] - The Microsoft Antimalware Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 15000 milliseconds: Restart the service.
9/21/2011 7:54:35 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 0.0.0.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: http://www.microsoft.com Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 0.0.0.0 Error code: 0x80072efe Error description: The connection with the server was terminated abnormally
9/21/2011 7:54:03 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 0.0.0.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: http://www.microsoft.com Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 0.0.0.0 Error code: 0x80072efe Error description: The connection with the server was terminated abnormally
9/21/2011 12:54:01 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service wuauserv with arguments "" in order to run the server: {E60687F7-01A1-40AA-86AC-DB1CBF673334}
9/21/2011 12:53:29 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service StiSvc with arguments "" in order to run the server: {A1F4E726-8CF1-11D1-BF92-0060081ED811}
9/21/2011 12:52:39 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments "" in order to run the server: {BA126AE5-2166-11D1-B1D0-00805FC1270E}
9/21/2011 12:52:12 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
9/21/2011 12:40:37 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: Aavmker4 AFD aswRdr aswSnx aswSP aswTdi Fips intelppm IPSec MpFilter MRxSmb NetBIOS NetBT RasAcd Rdbss ssmdrv Tcpip
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The DHCP Client service depends on the NetBios over Tcpip service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The Cisco AnyConnect VPN Agent service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The Bonjour Service service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:40:37 PM, error: Service Control Manager [7001] - The Apple Mobile Device service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
9/21/2011 12:31:29 PM, error: Service Control Manager [7023] - The Network Location Awareness (NLA) service terminated with the following error: The specified procedure could not be found.
9/21/2011 12:31:27 PM, error: Service Control Manager [7000] - The Microsoft Antimalware Service service failed to start due to the following error: Access is denied.
9/21/2011 12:31:23 PM, error: Service Control Manager [7000] - The avast! Antivirus service failed to start due to the following error: Access is denied.
9/21/2011 12:29:36 PM, error: Dhcp [1001] - Your computer was not assigned an address from the network (by the DHCP Server) for the Network Card with network address 7A7900000000. The following error occurred: The semaphore timeout period has expired. . Your computer will continue to try and obtain an address on its own from the network address (DHCP) server.
9/21/2011 11:57:41 AM, error: Service Control Manager [7031] - The avast! Antivirus service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 5000 milliseconds: Restart the service.
9/21/2011 1:00:29 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service MSIServer with arguments "" in order to run the server: {000C101C-0000-0000-C000-000000000046}
.
==== End Of File ===========================

I had problems running RKUnhookerLE. The first time I ran it, I came back to find an error message and the program gone
Windows - Application Error
The instruction at "0x004418dc" referenced memory at "0x00000004". The memory could not be "written".

The second time I ran it, I saved a log while it was still running, which follows. About ten seconds after I saved the log, I got the following error message:
RKUnhookerLE.EXE has encoutered a problem and needs to close.

On second thought - perhaps I will post that log in the next reply. The current post is too long with it included.

#4 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 08:54 AM

Okay, I guess I'm going to have to ask how much of this you really need. This is the first eighth of the file, which is about all I can fit in one post's length limit. I can post seven more replies with the other pieces if you need them, but if you don't I won't fill the thread up with all that data.

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
0x8055C700 Faked ServiceTable-->AvastUI.exe [ ETHREAD 0x89CCE3A8 ] TID: 120, 393592 bytes
Masqueraded service-->NtAcceptConnectPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheck [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckAndAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckByType [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckByTypeAndAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckByTypeResultList [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarmByHandle [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAddAtom [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAddBootEntry [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAdjustGroupsToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAdjustPrivilegesToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAlertResumeThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAlertThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAllocateLocallyUniqueId [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAllocateUserPhysicalPages [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAllocateUuids [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAllocateVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAreMappedFilesTheSame [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtAssignProcessToJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCallbackReturn [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCancelDeviceWakeupRequest [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCancelIoFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCancelTimer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtClearEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtClose [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCloseObjectAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCompactKeys [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCompareTokens [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCompleteConnectPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCompressKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtConnectPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtContinue [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateDebugObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateDirectoryObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateIoCompletion [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateJobSet [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateMailslotFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateMutant [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateNamedPipeFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreatePagingFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreatePort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateProcessEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateProfile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateSection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateSemaphore [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateSymbolicLinkObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateTimer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateWaitablePort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDebugActiveProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDebugContinue [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDelayExecution [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteAtom [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteBootEntry [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteObjectAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeleteValueKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDeviceIoControlFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDisplayString [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDuplicateObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtDuplicateToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtEnumerateBootEntries [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtEnumerateKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtEnumerateSystemEnvironmentValuesEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtEnumerateValueKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtExtendSection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFilterToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFindAtom [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFlushBuffersFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFlushInstructionCache [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFlushKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFlushVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFlushWriteBuffer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFreeUserPhysicalPages [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFreeVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtFsControlFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtGetContextThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtGetDevicePowerState [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtGetPlugPlayEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtGetWriteWatch [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtImpersonateAnonymousToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtImpersonateClientOfPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtImpersonateThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtInitializeRegistry [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtInitiatePowerAction [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtIsProcessInJob [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtIsSystemResumeAutomatic [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtListenPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLoadDriver [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLoadKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLoadKey2 [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLockFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLockProductActivationKeys [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLockRegistryKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtLockVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtMakePermanentObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtMakeTemporaryObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtMapUserPhysicalPages [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtMapUserPhysicalPagesScatter [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtMapViewOfSection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtModifyBootEntry [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtNotifyChangeDirectoryFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtNotifyChangeKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtNotifyChangeMultipleKeys [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenDirectoryObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenIoCompletion [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenMutant [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenObjectAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenProcessToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenProcessTokenEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenSection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenSemaphore [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenSymbolicLinkObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenThreadToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenThreadTokenEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenTimer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPlugPlayControl [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPowerInformation [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPrivilegeCheck [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPrivilegeObjectAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPrivilegedServiceAuditAlarm [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtProtectVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtPulseEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryAttributesFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryBootEntryOrder [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryBootOptions [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryDebugFilterState [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryDefaultLocale [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryDefaultUILanguage [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryDirectoryFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryDirectoryObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryEaFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryFullAttributesFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationAtom [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInformationToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryInstallUILanguage [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryIntervalProfile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryIoCompletion [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryMultipleValueKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryMutant [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryOpenSubKeys [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryPerformanceCounter [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryQuotaInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySecurityObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySemaphore [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySymbolicLinkObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySystemEnvironmentValue [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySystemEnvironmentValueEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySystemInformation [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQuerySystemTime [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryTimer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryTimerResolution [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryValueKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryVolumeInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueueApcThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRaiseException [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRaiseHardError [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReadFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReadFileScatter [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReadRequestData [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReadVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRegisterThreadTerminatePort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReleaseMutant [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReleaseSemaphore [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRemoveIoCompletion [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRemoveProcessDebug [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRenameKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReplaceKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReplyPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReplyWaitReceivePort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReplyWaitReceivePortEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReplyWaitReplyPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRequestDeviceWakeup [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRequestPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRequestWaitReplyPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRequestWakeupLatency [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtResetEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtResetWriteWatch [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtRestoreKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtResumeProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtResumeThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSaveKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSaveKeyEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSaveMergedKeys [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSecureConnectPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetBootEntryOrder [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetBootOptions [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetContextThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetDebugFilterState [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetDefaultHardErrorPort [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetDefaultLocale [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetDefaultUILanguage [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetEaFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetEventBoostPriority [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetHighEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetHighWaitLowEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationDebugObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetInformationToken [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetIntervalProfile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetIoCompletion [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetLdtEntries [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetLowEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetLowWaitHighEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetQuotaInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSecurityObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSystemEnvironmentValue [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSystemEnvironmentValueEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSystemInformation [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSystemPowerState [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetSystemTime [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetThreadExecutionState [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetTimer [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetTimerResolution [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetUuidSeed [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetValueKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSetVolumeInformationFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtShutdownSystem [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSignalAndWaitForSingleObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtStartProfile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtStopProfile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSuspendProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSuspendThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtSystemDebugControl [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTerminateJobObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTerminateProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTerminateThread [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTestAlert [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTraceEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtTranslateFilePath [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnloadDriver [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnloadKey [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnloadKeyEx [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnlockFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnlockVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtUnmapViewOfSection [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtVdmControl [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitForDebugEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitForMultipleObjects [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitForSingleObject [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitHighEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitLowEventPair [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWriteFile [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWriteFileGather [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWriteRequestData [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWriteVirtualMemory [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtYieldExecution [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtCreateKeyedEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtOpenKeyedEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtReleaseKeyedEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtWaitForKeyedEvent [ ETHREAD 0x89CCE3A8 ] TID: 120
Masqueraded service-->NtQueryPortInformationProcess [ ETHREAD 0x89CCE3A8 ] TID: 120
0x8055C700 Faked ServiceTable-->AvastUI.exe [ ETHREAD 0x89946B80 ] TID: 124, 393592 bytes
Masqueraded service-->NtAcceptConnectPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheck [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckAndAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckByType [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckByTypeAndAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckByTypeResultList [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarmByHandle [ ETHREAD 0x89946B80 ]

TID: 124
Masqueraded service-->NtAddAtom [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAddBootEntry [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAdjustGroupsToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAdjustPrivilegesToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAlertResumeThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAlertThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAllocateLocallyUniqueId [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAllocateUserPhysicalPages [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAllocateUuids [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAllocateVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAreMappedFilesTheSame [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtAssignProcessToJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCallbackReturn [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCancelDeviceWakeupRequest [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCancelIoFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCancelTimer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtClearEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtClose [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCloseObjectAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCompactKeys [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCompareTokens [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCompleteConnectPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCompressKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtConnectPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtContinue [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateDebugObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateDirectoryObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateIoCompletion [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateJobSet [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateMailslotFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateMutant [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateNamedPipeFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreatePagingFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreatePort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateProcessEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateProfile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateSection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateSemaphore [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateSymbolicLinkObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateTimer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateWaitablePort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDebugActiveProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDebugContinue [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDelayExecution [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteAtom [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteBootEntry [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteObjectAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeleteValueKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDeviceIoControlFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDisplayString [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDuplicateObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtDuplicateToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtEnumerateBootEntries [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtEnumerateKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtEnumerateSystemEnvironmentValuesEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtEnumerateValueKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtExtendSection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFilterToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFindAtom [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFlushBuffersFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFlushInstructionCache [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFlushKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFlushVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFlushWriteBuffer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFreeUserPhysicalPages [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFreeVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtFsControlFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtGetContextThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtGetDevicePowerState [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtGetPlugPlayEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtGetWriteWatch [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtImpersonateAnonymousToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtImpersonateClientOfPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtImpersonateThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtInitializeRegistry [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtInitiatePowerAction [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtIsProcessInJob [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtIsSystemResumeAutomatic [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtListenPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLoadDriver [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLoadKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLoadKey2 [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLockFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLockProductActivationKeys [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLockRegistryKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtLockVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtMakePermanentObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtMakeTemporaryObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtMapUserPhysicalPages [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtMapUserPhysicalPagesScatter [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtMapViewOfSection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtModifyBootEntry [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtNotifyChangeDirectoryFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtNotifyChangeKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtNotifyChangeMultipleKeys [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenDirectoryObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenIoCompletion [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenMutant [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenObjectAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenProcessToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenProcessTokenEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenSection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenSemaphore [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenSymbolicLinkObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenThreadToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenThreadTokenEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenTimer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPlugPlayControl [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPowerInformation [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPrivilegeCheck [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPrivilegeObjectAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPrivilegedServiceAuditAlarm [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtProtectVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtPulseEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryAttributesFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryBootEntryOrder [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryBootOptions [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryDebugFilterState [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryDefaultLocale [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryDefaultUILanguage [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryDirectoryFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryDirectoryObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryEaFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryFullAttributesFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationAtom [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInformationToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryInstallUILanguage [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryIntervalProfile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryIoCompletion [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryMultipleValueKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryMutant [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryOpenSubKeys [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryPerformanceCounter [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryQuotaInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySecurityObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySemaphore [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySymbolicLinkObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySystemEnvironmentValue [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySystemEnvironmentValueEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySystemInformation [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQuerySystemTime [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryTimer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryTimerResolution [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryValueKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryVolumeInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueueApcThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRaiseException [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRaiseHardError [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReadFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReadFileScatter [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReadRequestData [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReadVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRegisterThreadTerminatePort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReleaseMutant [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReleaseSemaphore [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRemoveIoCompletion [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRemoveProcessDebug [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRenameKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReplaceKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReplyPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReplyWaitReceivePort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReplyWaitReceivePortEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReplyWaitReplyPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRequestDeviceWakeup [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRequestPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRequestWaitReplyPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRequestWakeupLatency [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtResetEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtResetWriteWatch [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtRestoreKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtResumeProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtResumeThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSaveKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSaveKeyEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSaveMergedKeys [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSecureConnectPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetBootEntryOrder [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetBootOptions [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetContextThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetDebugFilterState [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetDefaultHardErrorPort [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetDefaultLocale [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetDefaultUILanguage [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetEaFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetEventBoostPriority [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetHighEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetHighWaitLowEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationDebugObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetInformationToken [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetIntervalProfile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetIoCompletion [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetLdtEntries [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetLowEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetLowWaitHighEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetQuotaInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSecurityObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSystemEnvironmentValue [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSystemEnvironmentValueEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSystemInformation [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSystemPowerState [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetSystemTime [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetThreadExecutionState [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetTimer [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetTimerResolution [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetUuidSeed [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetValueKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSetVolumeInformationFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtShutdownSystem [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSignalAndWaitForSingleObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtStartProfile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtStopProfile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSuspendProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSuspendThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtSystemDebugControl [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTerminateJobObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTerminateProcess [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTerminateThread [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTestAlert [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTraceEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtTranslateFilePath [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnloadDriver [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnloadKey [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnloadKeyEx [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnlockFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnlockVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtUnmapViewOfSection [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtVdmControl [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitForDebugEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitForMultipleObjects [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitForSingleObject [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitHighEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitLowEventPair [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWriteFile [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWriteFileGather [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWriteRequestData [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWriteVirtualMemory [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtYieldExecution [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtCreateKeyedEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtOpenKeyedEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtReleaseKeyedEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtWaitForKeyedEvent [ ETHREAD 0x89946B80 ] TID: 124
Masqueraded service-->NtQueryPortInformationProcess [ ETHREAD 0x89946B80 ] TID: 124
0x8055C700 Faked ServiceTable-->msseces.exe [ ETHREAD 0x89D10DA8 ] TID: 128, 393592 bytes
Masqueraded service-->NtAcceptConnectPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheck [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckAndAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckByType [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckByTypeAndAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckByTypeResultList [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarmByHandle [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAddAtom [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAddBootEntry [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAdjustGroupsToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAdjustPrivilegesToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAlertResumeThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAlertThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAllocateLocallyUniqueId [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAllocateUserPhysicalPages [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAllocateUuids [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAllocateVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAreMappedFilesTheSame [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtAssignProcessToJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCallbackReturn [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCancelDeviceWakeupRequest [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCancelIoFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCancelTimer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtClearEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtClose [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCloseObjectAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCompactKeys [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCompareTokens [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCompleteConnectPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCompressKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtConnectPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtContinue [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateDebugObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateDirectoryObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateIoCompletion [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateJobSet [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateMailslotFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateMutant [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateNamedPipeFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreatePagingFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreatePort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateProcessEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateProfile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateSection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateSemaphore [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateSymbolicLinkObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateTimer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateWaitablePort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDebugActiveProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDebugContinue [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDelayExecution [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteAtom [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteBootEntry [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteObjectAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeleteValueKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDeviceIoControlFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDisplayString [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDuplicateObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtDuplicateToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtEnumerateBootEntries [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtEnumerateKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtEnumerateSystemEnvironmentValuesEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtEnumerateValueKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtExtendSection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFilterToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFindAtom [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFlushBuffersFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFlushInstructionCache [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFlushKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFlushVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFlushWriteBuffer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFreeUserPhysicalPages [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFreeVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtFsControlFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtGetContextThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtGetDevicePowerState [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtGetPlugPlayEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtGetWriteWatch [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtImpersonateAnonymousToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtImpersonateClientOfPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtImpersonateThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtInitializeRegistry [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtInitiatePowerAction [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtIsProcessInJob [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtIsSystemResumeAutomatic [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtListenPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLoadDriver [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLoadKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLoadKey2 [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLockFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLockProductActivationKeys [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLockRegistryKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtLockVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtMakePermanentObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtMakeTemporaryObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtMapUserPhysicalPages [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtMapUserPhysicalPagesScatter [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtMapViewOfSection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtModifyBootEntry [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtNotifyChangeDirectoryFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtNotifyChangeKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtNotifyChangeMultipleKeys [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenDirectoryObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenIoCompletion [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenMutant [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenObjectAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenProcessToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenProcessTokenEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenSection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenSemaphore [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenSymbolicLinkObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenThreadToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenThreadTokenEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenTimer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPlugPlayControl [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPowerInformation [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPrivilegeCheck [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPrivilegeObjectAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPrivilegedServiceAuditAlarm [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtProtectVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtPulseEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryAttributesFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryBootEntryOrder [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryBootOptions [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryDebugFilterState [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryDefaultLocale [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryDefaultUILanguage [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryDirectoryFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryDirectoryObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryEaFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryFullAttributesFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationAtom [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInformationToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryInstallUILanguage [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryIntervalProfile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryIoCompletion [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryMultipleValueKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryMutant [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryOpenSubKeys [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryPerformanceCounter [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryQuotaInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySecurityObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySemaphore [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySymbolicLinkObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySystemEnvironmentValue [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySystemEnvironmentValueEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySystemInformation [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQuerySystemTime [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryTimer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryTimerResolution [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryValueKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryVolumeInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueueApcThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRaiseException [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRaiseHardError [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReadFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReadFileScatter [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReadRequestData [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReadVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRegisterThreadTerminatePort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReleaseMutant [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReleaseSemaphore [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRemoveIoCompletion [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRemoveProcessDebug [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRenameKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReplaceKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReplyPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReplyWaitReceivePort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReplyWaitReceivePortEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReplyWaitReplyPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRequestDeviceWakeup [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRequestPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRequestWaitReplyPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRequestWakeupLatency [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtResetEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtResetWriteWatch [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtRestoreKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtResumeProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtResumeThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSaveKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSaveKeyEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSaveMergedKeys [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSecureConnectPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetBootEntryOrder [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetBootOptions [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetContextThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetDebugFilterState [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetDefaultHardErrorPort [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetDefaultLocale [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetDefaultUILanguage [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetEaFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetEventBoostPriority [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetHighEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetHighWaitLowEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationDebugObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetInformationToken [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetIntervalProfile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetIoCompletion [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetLdtEntries [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetLowEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetLowWaitHighEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetQuotaInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSecurityObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSystemEnvironmentValue [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSystemEnvironmentValueEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSystemInformation [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSystemPowerState [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetSystemTime [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetThreadExecutionState [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetTimer [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetTimerResolution [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetUuidSeed [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetValueKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSetVolumeInformationFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtShutdownSystem [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSignalAndWaitForSingleObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtStartProfile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtStopProfile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSuspendProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSuspendThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtSystemDebugControl [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTerminateJobObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTerminateProcess [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTerminateThread [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTestAlert [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTraceEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtTranslateFilePath [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnloadDriver [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnloadKey [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnloadKeyEx [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnlockFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnlockVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtUnmapViewOfSection [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtVdmControl [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitForDebugEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitForMultipleObjects [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitForSingleObject [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitHighEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitLowEventPair [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWriteFile [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWriteFileGather [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWriteRequestData [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWriteVirtualMemory [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtYieldExecution [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtCreateKeyedEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtOpenKeyedEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtReleaseKeyedEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtWaitForKeyedEvent [ ETHREAD 0x89D10DA8 ] TID: 128
Masqueraded service-->NtQueryPortInformationProcess [ ETHREAD 0x89D10DA8 ] TID: 128
0x8055C700 Faked ServiceTable-->winlogon.exe [ ETHREAD 0x89E885A0 ] TID: 132, 393592 bytes
Masqueraded service-->NtAcceptConnectPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheck [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckAndAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckByType [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckByTypeAndAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckByTypeResultList [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarmByHandle [ ETHREAD 0x89E885A0 ]

TID: 132
Masqueraded service-->NtAddAtom [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAddBootEntry [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAdjustGroupsToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAdjustPrivilegesToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAlertResumeThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAlertThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAllocateLocallyUniqueId [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAllocateUserPhysicalPages [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAllocateUuids [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAllocateVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAreMappedFilesTheSame [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtAssignProcessToJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCallbackReturn [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCancelDeviceWakeupRequest [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCancelIoFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCancelTimer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtClearEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtClose [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCloseObjectAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCompactKeys [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCompareTokens [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCompleteConnectPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCompressKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtConnectPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtContinue [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateDebugObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateDirectoryObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateIoCompletion [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateJobSet [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateMailslotFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateMutant [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateNamedPipeFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreatePagingFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreatePort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateProcessEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateProfile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateSection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateSemaphore [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateSymbolicLinkObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateTimer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateWaitablePort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDebugActiveProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDebugContinue [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDelayExecution [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteAtom [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteBootEntry [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteObjectAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeleteValueKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDeviceIoControlFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDisplayString [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDuplicateObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtDuplicateToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtEnumerateBootEntries [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtEnumerateKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtEnumerateSystemEnvironmentValuesEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtEnumerateValueKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtExtendSection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFilterToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFindAtom [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFlushBuffersFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFlushInstructionCache [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFlushKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFlushVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFlushWriteBuffer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFreeUserPhysicalPages [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFreeVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtFsControlFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtGetContextThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtGetDevicePowerState [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtGetPlugPlayEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtGetWriteWatch [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtImpersonateAnonymousToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtImpersonateClientOfPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtImpersonateThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtInitializeRegistry [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtInitiatePowerAction [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtIsProcessInJob [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtIsSystemResumeAutomatic [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtListenPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLoadDriver [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLoadKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLoadKey2 [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLockFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLockProductActivationKeys [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLockRegistryKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtLockVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtMakePermanentObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtMakeTemporaryObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtMapUserPhysicalPages [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtMapUserPhysicalPagesScatter [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtMapViewOfSection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtModifyBootEntry [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtNotifyChangeDirectoryFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtNotifyChangeKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtNotifyChangeMultipleKeys [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenDirectoryObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenIoCompletion [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenMutant [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenObjectAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenProcessToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenProcessTokenEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenSection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenSemaphore [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenSymbolicLinkObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenThreadToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenThreadTokenEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenTimer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPlugPlayControl [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPowerInformation [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPrivilegeCheck [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPrivilegeObjectAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPrivilegedServiceAuditAlarm [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtProtectVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtPulseEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryAttributesFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryBootEntryOrder [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryBootOptions [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryDebugFilterState [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryDefaultLocale [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryDefaultUILanguage [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryDirectoryFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryDirectoryObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryEaFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryFullAttributesFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationAtom [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInformationToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryInstallUILanguage [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryIntervalProfile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryIoCompletion [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryMultipleValueKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryMutant [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryOpenSubKeys [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryPerformanceCounter [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryQuotaInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySecurityObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySemaphore [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySymbolicLinkObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySystemEnvironmentValue [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySystemEnvironmentValueEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySystemInformation [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQuerySystemTime [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryTimer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryTimerResolution [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryValueKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryVolumeInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueueApcThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRaiseException [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRaiseHardError [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReadFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReadFileScatter [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReadRequestData [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReadVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRegisterThreadTerminatePort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReleaseMutant [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReleaseSemaphore [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRemoveIoCompletion [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRemoveProcessDebug [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRenameKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReplaceKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReplyPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReplyWaitReceivePort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReplyWaitReceivePortEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReplyWaitReplyPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRequestDeviceWakeup [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRequestPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRequestWaitReplyPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRequestWakeupLatency [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtResetEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtResetWriteWatch [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtRestoreKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtResumeProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtResumeThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSaveKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSaveKeyEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSaveMergedKeys [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSecureConnectPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetBootEntryOrder [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetBootOptions [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetContextThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetDebugFilterState [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetDefaultHardErrorPort [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetDefaultLocale [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetDefaultUILanguage [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetEaFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetEventBoostPriority [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetHighEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetHighWaitLowEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationDebugObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetInformationToken [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetIntervalProfile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetIoCompletion [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetLdtEntries [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetLowEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetLowWaitHighEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetQuotaInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSecurityObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSystemEnvironmentValue [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSystemEnvironmentValueEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSystemInformation [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSystemPowerState [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetSystemTime [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetThreadExecutionState [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetTimer [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetTimerResolution [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetUuidSeed [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetValueKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSetVolumeInformationFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtShutdownSystem [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSignalAndWaitForSingleObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtStartProfile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtStopProfile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSuspendProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSuspendThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtSystemDebugControl [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTerminateJobObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTerminateProcess [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTerminateThread [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTestAlert [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTraceEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtTranslateFilePath [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnloadDriver [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnloadKey [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnloadKeyEx [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnlockFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnlockVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtUnmapViewOfSection [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtVdmControl [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitForDebugEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitForMultipleObjects [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitForSingleObject [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitHighEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitLowEventPair [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWriteFile [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWriteFileGather [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWriteRequestData [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWriteVirtualMemory [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtYieldExecution [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtCreateKeyedEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtOpenKeyedEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtReleaseKeyedEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtWaitForKeyedEvent [ ETHREAD 0x89E885A0 ] TID: 132
Masqueraded service-->NtQueryPortInformationProcess [ ETHREAD 0x89E885A0 ] TID: 132
0x8055C700 Faked ServiceTable-->iTunesHelper.exe [ ETHREAD 0x89CA7C10 ] TID: 152, 393592 bytes
Masqueraded service-->NtAcceptConnectPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheck [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckAndAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckByType [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckByTypeAndAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckByTypeResultList [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAccessCheckByTypeResultListAndAuditAlarmByHandle [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAddAtom [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAddBootEntry [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAdjustGroupsToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAdjustPrivilegesToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAlertResumeThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAlertThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAllocateLocallyUniqueId [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAllocateUserPhysicalPages [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAllocateUuids [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAllocateVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAreMappedFilesTheSame [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtAssignProcessToJobObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCallbackReturn [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCancelDeviceWakeupRequest [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCancelIoFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCancelTimer [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtClearEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtClose [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCloseObjectAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCompactKeys [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCompareTokens [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCompleteConnectPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCompressKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtConnectPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtContinue [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateDebugObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateDirectoryObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateEventPair [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateIoCompletion [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateJobObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateJobSet [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateMailslotFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateMutant [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateNamedPipeFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreatePagingFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreatePort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateProcessEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateProfile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateSection [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateSemaphore [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateSymbolicLinkObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateTimer [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtCreateWaitablePort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDebugActiveProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDebugContinue [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDelayExecution [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteAtom [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteBootEntry [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteObjectAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeleteValueKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDeviceIoControlFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDisplayString [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDuplicateObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtDuplicateToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtEnumerateBootEntries [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtEnumerateKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtEnumerateSystemEnvironmentValuesEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtEnumerateValueKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtExtendSection [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFilterToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFindAtom [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFlushBuffersFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFlushInstructionCache [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFlushKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFlushVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFlushWriteBuffer [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFreeUserPhysicalPages [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFreeVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtFsControlFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtGetContextThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtGetDevicePowerState [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtGetPlugPlayEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtGetWriteWatch [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtImpersonateAnonymousToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtImpersonateClientOfPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtImpersonateThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtInitializeRegistry [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtInitiatePowerAction [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtIsProcessInJob [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtIsSystemResumeAutomatic [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtListenPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLoadDriver [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLoadKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLoadKey2 [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLockFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLockProductActivationKeys [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLockRegistryKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtLockVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtMakePermanentObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtMakeTemporaryObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtMapUserPhysicalPages [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtMapUserPhysicalPagesScatter [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtMapViewOfSection [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtModifyBootEntry [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtNotifyChangeDirectoryFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtNotifyChangeKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtNotifyChangeMultipleKeys [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenDirectoryObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenEventPair [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenIoCompletion [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenJobObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenMutant [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenObjectAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenProcessToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenProcessTokenEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenSection [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenSemaphore [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenSymbolicLinkObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenThreadToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenThreadTokenEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtOpenTimer [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPlugPlayControl [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPowerInformation [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPrivilegeCheck [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPrivilegeObjectAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPrivilegedServiceAuditAlarm [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtProtectVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtPulseEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryAttributesFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryBootEntryOrder [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryBootOptions [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryDebugFilterState [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryDefaultLocale [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryDefaultUILanguage [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryDirectoryFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryDirectoryObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryEaFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryFullAttributesFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationAtom [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationJobObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInformationToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryInstallUILanguage [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryIntervalProfile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryIoCompletion [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryMultipleValueKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryMutant [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryOpenSubKeys [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryPerformanceCounter [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryQuotaInformationFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySection [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySecurityObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySemaphore [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySymbolicLinkObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySystemEnvironmentValue [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySystemEnvironmentValueEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySystemInformation [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQuerySystemTime [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryTimer [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryTimerResolution [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryValueKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueryVolumeInformationFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtQueueApcThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRaiseException [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRaiseHardError [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReadFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReadFileScatter [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReadRequestData [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReadVirtualMemory [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRegisterThreadTerminatePort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReleaseMutant [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReleaseSemaphore [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRemoveIoCompletion [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRemoveProcessDebug [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRenameKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReplaceKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReplyPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReplyWaitReceivePort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReplyWaitReceivePortEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtReplyWaitReplyPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRequestDeviceWakeup [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRequestPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRequestWaitReplyPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRequestWakeupLatency [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtResetEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtResetWriteWatch [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtRestoreKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtResumeProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtResumeThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSaveKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSaveKeyEx [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSaveMergedKeys [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSecureConnectPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetBootEntryOrder [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetBootOptions [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetContextThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetDebugFilterState [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetDefaultHardErrorPort [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetDefaultLocale [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetDefaultUILanguage [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetEaFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetEvent [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetEventBoostPriority [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetHighEventPair [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetHighWaitLowEventPair [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationDebugObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationFile [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationJobObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationKey [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationObject [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationProcess [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationThread [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetInformationToken [ ETHREAD 0x89CA7C10 ] TID: 152
Masqueraded service-->NtSetIntervalProfile [ ETHREAD 0x89CA7C10 ] TID: 152

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 28 September 2011 - 09:35 AM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

:multiple Anti Virus programs:

It looks like you are operating your computer with multiple Anti Virus programs running in memory at once:

AV: Microsoft Security Essentials
AV: avast! Antivirus
AV: Microsoft Security Essentials


Anti-virus programs take up an enormous amount of your computer's resources when they are actively scanning your computer. Having two anti-virus programs running at the same time can cause your computer to run very slow, become unstable and even, in rare cases, crash.

Please remove all but one of them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 11:20 AM

First: removing antivirus software (I attempted to remove them all, since none were actually functioning)
I removed MSE from the Add/Remve programs list
Avast was harder to take out (required me to download an uninstaller and run it from Safe Mode) but I think I got it
I don't know why there were two copies of MSE in your list, so I don't know if I need to do anything else to remove it.

Then I ran combofix. After running it, a few tests of google did not show any redirection. My other major symptom was that antivirus software kept dying - I won't know if that's better until I reinstall one (which free software do you suggest?)


Here is the ComboFix log:

ComboFix 11-09-28.01 - Matt 09/28/2011 10:31:04.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1632 [GMT -5:00]
Running from: c:\documents and settings\Matt\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\devenv.exe.7dc18209.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\devenv.exe.7dc18209.ini.inuse
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\DotNetInstaller.exe.607453ff.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\Launcher.exe.74629957.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\ngen.exe.89f695a3.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\PolMigrate.exe.ea58b626.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\PRCModuleUpdater.exe.172e8822.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\SL76.tmp.c65211e1.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\SLD0.tmp.1494efee.ini
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\VSConvert.exe.8151e1e.ini.inuse
c:\documents and settings\Matt\Local Settings\Application Data\ApplicationHistory\VSConvert.exe.b4108af5.ini
c:\documents and settings\Matt\System
c:\documents and settings\Matt\System\win_qs7.jqx
c:\program files\codec
c:\windows\$NtUninstallKB38916$
c:\windows\$NtUninstallKB38916$\106914212\@
c:\windows\$NtUninstallKB38916$\106914212\bckfg.tmp
c:\windows\$NtUninstallKB38916$\106914212\cfg.ini
c:\windows\$NtUninstallKB38916$\106914212\Desktop.ini
c:\windows\$NtUninstallKB38916$\106914212\keywords
c:\windows\$NtUninstallKB38916$\106914212\kwrd.dll
c:\windows\$NtUninstallKB38916$\106914212\L\snwdyjtl
c:\windows\$NtUninstallKB38916$\106914212\lsflt7.ver
c:\windows\$NtUninstallKB38916$\106914212\U\00000001.@
c:\windows\$NtUninstallKB38916$\106914212\U\00000002.@
c:\windows\$NtUninstallKB38916$\106914212\U\80000000.@
c:\windows\$NtUninstallKB38916$\106914212\U\80000032.@
c:\windows\$NtUninstallKB38916$\1803254092
c:\windows\system32\d3d9caps.dat
c:\windows\system32\drivers\etc\lmhosts
.
Infected copy of c:\windows\system32\drivers\mrxsmb.sys was found and disinfected
Restored copy from - The cat found it :)
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_65f61a4
.
.
((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-28 )))))))))))))))))))))))))))))))
.
.
2011-09-28 15:24 . 2011-07-15 13:29 456320 -c--a-w- c:\windows\system32\dllcache\mrxsmb.sys
2011-09-28 15:24 . 2011-07-15 13:29 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-23 13:16 . 2011-09-23 13:16 -------- d-----w- C:\gmer
2011-09-22 13:23 . 2011-09-22 13:24 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2011-09-21 18:00 . 2011-09-06 20:45 41184 ----a-w- c:\windows\avastSS.scr
2011-09-21 13:33 . 2011-09-21 17:59 -------- d-----w- c:\documents and settings\All Users\Application Data\AVAST Software
2011-09-21 12:51 . 2011-09-21 12:51 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-09-21 12:50 . 2011-09-21 12:50 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2011-09-03 13:34 . 2011-09-03 13:35 -------- d-----w- c:\program files\EasyPHP-5.3.8.0
2011-09-03 10:17 . 2011-09-09 09:12 599040 -c----w- c:\windows\system32\dllcache\crypt32.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-09 09:12 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-07 13:06 . 2011-06-23 13:15 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-07-08 14:02 . 2004-08-04 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-09-07 13:06 . 2011-06-04 12:12 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"F.lux"="c:\documents and settings\Matt\Local Settings\Apps\F.lux\flux.exe" [2009-08-29 966656]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-10-22 7700480]
"nwiz"="nwiz.exe" [2006-10-22 1622016]
"High Definition Audio Property Page Shortcut"="HDAudPropShortcut.exe" [2004-03-17 61952]
"SoundMan"="SOUNDMAN.EXE" [2004-06-17 69632]
"AlcWzrd"="ALCWZRD.EXE" [2004-06-17 2550272]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2006-10-22 86016]
"ipTray.exe"="c:\program files\Intel\IDU\iptray.exe" [2006-12-29 2242328]
"NeroCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2010-03-12 49208]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-13 421160]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AppleSyncNotifier]
2008-09-04 01:12 111936 ----a-w- c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-12-13 23:16 421160 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-11-29 23:38 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VMware hqtray]
2008-05-16 05:47 55856 ----a-w- c:\program files\VMware\VMware Player\hqtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\ftp.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\java.exe"=
"c:\\Program Files\\Java\\jdk1.6.0\\bin\\java.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Cyanide\\GameCenter\\GameCenter.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\Dreamcatcher\\Loki\\Loki.exe"=
"c:\\Program Files\\Dreamcatcher\\Loki\\Autorun\\AutoRun.exe"=
"g:\\Sid Meier's Civilization 4\\Beyond the Sword\\Civ4BeyondSword.exe"=
"c:\\Program Files\\Firaxis Games\\Sid Meier's Civalization 4\\Beyond the Sword\\Civ4BeyondSword.exe"=
"c:\\Program Files\\Firefly Studios\\Stronghold Legends\\StrongholdLegends.exe"=
"e:\\Program Files\\THQ\\Titan Quest Immortal Throne\\Tqit.exe"=
"c:\\cygwin\\usr\\X11R6\\bin\\XWin.exe"=
.
R1 vcdrom;Virtual CD-ROM Device Driver;c:\windows\system32\drivers\VCdRom.sys [3/9/2007 11:26 PM 8576]
R2 vpnagent;Cisco AnyConnect VPN Agent;c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe [6/17/2009 3:17 PM 434864]
R3 GigNIC;NDIS5.1 Miniport Driver for Belkin Gigabit Desktop Card;c:\windows\system32\drivers\GigNIC.sys [7/23/2005 1:24 PM 169856]
S1 MpKsl2f85a016;MpKsl2f85a016;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C4C36A20-1F0F-4325-A579-0FB9A3ACBE24}\MpKsl2f85a016.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C4C36A20-1F0F-4325-A579-0FB9A3ACBE24}\MpKsl2f85a016.sys [?]
S1 MpKsl706177f1;MpKsl706177f1;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsl706177f1.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsl706177f1.sys [?]
S1 MpKsl94eb2373;MpKsl94eb2373;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9064812F-924F-458E-9471-B72363364E74}\MpKsl94eb2373.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9064812F-924F-458E-9471-B72363364E74}\MpKsl94eb2373.sys [?]
S1 MpKsla4e9d178;MpKsla4e9d178;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsla4e9d178.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsla4e9d178.sys [?]
S1 MpKslc3e1a8bb;MpKslc3e1a8bb;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKslc3e1a8bb.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKslc3e1a8bb.sys [?]
S3 BlackBox;BlackBox SR2; [x]
S3 cmvad;C-Media Wi-Sonic Wireless Audio Interface;c:\windows\system32\drivers\cmudaxv.sys --> c:\windows\system32\drivers\cmudaxv.sys [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]
.
2011-09-26 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-823518204-1637723038-839522115-1003Core.job
- c:\documents and settings\Matt\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-07-15 03:36]
.
2011-09-28 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-823518204-1637723038-839522115-1003UA.job
- c:\documents and settings\Matt\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-07-15 03:36]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.7.254
FF - ProfilePath - c:\documents and settings\Matt\Application Data\Mozilla\Firefox\Profiles\pjdm9xsq.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://magness.my3gb.com/ToDo.php
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
- - - - ORPHANS REMOVED - - - -
.
ShellIconOverlayIdentifiers-{472083B0-C522-11CF-8763-00608CC02F24} - (no file)
MSConfigStartUp-BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} - c:\program files\Common Files\Ahead\lib\NMBgMonitor.exe
MSConfigStartUp-bomrgqgs - c:\documents and settings\Matt\Local Settings\Application Data\esddcyjmb\tijmswitssd.exe
MSConfigStartUp-pbylblxl - c:\documents and settings\Matt\Local Settings\Application Data\lspccjkxh\txsjgvctssd.exe
AddRemove-ffdshow_is1 - c:\program files\codec\DefilerPak\unins000.exe
AddRemove-Magic Set Editor 2_is1 - c:\program files\Games\Magic Set Editor 2\unins000.exe
AddRemove-PCGen598 - c:\program files\PCGen\uninstall-PCGen598.exe
AddRemove-PRC Pack - c:\games\PRCPack\uninstall.exe
AddRemove-{3E3274EB-5F1D-4E5C-8953-B4126E015FC7}_is1 - c:\program files\Firaxis Games\Sid Meier's Civalization 4\Beyond the Sword\Mods\FFH Wild Mana Beta\unins000.exe
AddRemove-{CB5CB8BF-D93F-4CCD-9D87-29368010DB2A}_is1 - c:\program files\Firaxis Games\Sid Meier's Civilization 4\Beyond the Sword\Mods\Master of Mana\unins000.exe
AddRemove-{F76A190E-100A-4AA7-BC50-70C92515BA9E}_is1 - c:\program files\Firaxis Games\Sid Meier's Civilization 4\Beyond the Sword\Mods\Master of Mana\unins001.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-28 11:03
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-823518204-1637723038-839522115-1003\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:a2,e8,b3,86,75,4f,b6,a1,86,d5,ab,35,90,3f,eb,8f,cb,0f,72,35,93,8d,18,
49,cb,d0,8e,e9,ef,67,bf,da,26,1a,9c,aa,a7,fc,c3,fe,ef,90,f1,b1,2f,eb,51,04,\
"??"=hex:a4,5d,89,6b,40,41,f2,30,36,d9,fd,d8,24,98,5f,14
.
[HKEY_USERS\S-1-5-21-823518204-1637723038-839522115-1003\Software\SecuROM\License information*]
"datasecu"=hex:59,e1,e9,5f,4d,29,26,0a,2a,8e,2e,3f,9a,b1,1b,25,cf,f7,ee,07,02,
72,1d,07,2e,4b,3d,7a,87,e5,6f,71,5b,c7,46,9e,9b,ee,db,b6,90,9e,1f,6e,52,a1,\
"rkeysecu"=hex:1e,14,01,fb,38,b5,93,26,5c,9c,25,da,3d,40,a1,70
.
[HKEY_LOCAL_MACHINE\software\Swearware\backup\winsock2\Parameters]
@DACL=(02 0000)
@SACL=
"WinSock_Registry_Version"="2.0"
"Current_NameSpace_Catalog"="NameSpace_Catalog5"
"Current_Protocol_Catalog"="Protocol_Catalog9"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1092)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\atiadlxx.dll
.
- - - - - - - > 'explorer.exe'(2500)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Intel\IDU\awServ.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\windows\system32\HPZipm12.exe
c:\program files\Common Files\VMware\VMware Virtual Image Editing\vmount2.exe
c:\windows\system32\vmnat.exe
c:\windows\system32\vmnetdhcp.exe
c:\program files\VMware\VMware Player\vmware-authd.exe
c:\windows\SOUNDMAN.EXE
c:\windows\ALCWZRD.EXE
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2011-09-28 11:11:06 - machine was rebooted
ComboFix-quarantined-files.txt 2011-09-28 16:11
.
Pre-Run: 2,442,412,032 bytes free
Post-Run: 8,403,369,984 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 5FE662DCF7A9906AB1B34B923A8628B6

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 28 September 2011 - 12:55 PM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

SecCenter::
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 01:32 PM

Here is the new ComboFix log. I didn't have any problems running it, and I'm not observing any symptoms in my computer right now.

ComboFix 11-09-28.01 - Matt 09/28/2011 13:05:31.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1499 [GMT -5:00]
Running from: c:\documents and settings\Matt\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Matt\Desktop\CFScript.txt
.
.
((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-28 )))))))))))))))))))))))))))))))
.
.
2011-09-28 15:24 . 2011-07-15 13:29 456320 -c--a-w- c:\windows\system32\dllcache\mrxsmb.sys
2011-09-28 15:24 . 2011-07-15 13:29 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-23 13:16 . 2011-09-23 13:16 -------- d-----w- C:\gmer
2011-09-22 13:23 . 2011-09-22 13:24 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2011-09-21 18:00 . 2011-09-06 20:45 41184 ----a-w- c:\windows\avastSS.scr
2011-09-21 13:33 . 2011-09-21 17:59 -------- d-----w- c:\documents and settings\All Users\Application Data\AVAST Software
2011-09-21 12:51 . 2011-09-21 12:51 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-09-21 12:50 . 2011-09-21 12:50 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2011-09-03 13:34 . 2011-09-03 13:35 -------- d-----w- c:\program files\EasyPHP-5.3.8.0
2011-09-03 10:17 . 2011-09-09 09:12 599040 -c----w- c:\windows\system32\dllcache\crypt32.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-09 09:12 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-07 13:06 . 2011-06-23 13:15 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-07-08 14:02 . 2004-08-04 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-09-07 13:06 . 2011-06-04 12:12 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"F.lux"="c:\documents and settings\Matt\Local Settings\Apps\F.lux\flux.exe" [2009-08-29 966656]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-10-22 7700480]
"nwiz"="nwiz.exe" [2006-10-22 1622016]
"High Definition Audio Property Page Shortcut"="HDAudPropShortcut.exe" [2004-03-17 61952]
"SoundMan"="SOUNDMAN.EXE" [2004-06-17 69632]
"AlcWzrd"="ALCWZRD.EXE" [2004-06-17 2550272]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2006-10-22 86016]
"ipTray.exe"="c:\program files\Intel\IDU\iptray.exe" [2006-12-29 2242328]
"NeroCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2010-03-12 49208]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-13 421160]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AppleSyncNotifier]
2008-09-04 01:12 111936 ----a-w- c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-12-13 23:16 421160 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-11-29 23:38 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VMware hqtray]
2008-05-16 05:47 55856 ----a-w- c:\program files\VMware\VMware Player\hqtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\ftp.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\java.exe"=
"c:\\Program Files\\Java\\jdk1.6.0\\bin\\java.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Cyanide\\GameCenter\\GameCenter.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqnrs08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\Dreamcatcher\\Loki\\Loki.exe"=
"c:\\Program Files\\Dreamcatcher\\Loki\\Autorun\\AutoRun.exe"=
"g:\\Sid Meier's Civilization 4\\Beyond the Sword\\Civ4BeyondSword.exe"=
"c:\\Program Files\\Firaxis Games\\Sid Meier's Civalization 4\\Beyond the Sword\\Civ4BeyondSword.exe"=
"c:\\Program Files\\Firefly Studios\\Stronghold Legends\\StrongholdLegends.exe"=
"e:\\Program Files\\THQ\\Titan Quest Immortal Throne\\Tqit.exe"=
"c:\\cygwin\\usr\\X11R6\\bin\\XWin.exe"=
.
R1 vcdrom;Virtual CD-ROM Device Driver;c:\windows\system32\drivers\VCdRom.sys [3/9/2007 11:26 PM 8576]
R2 vpnagent;Cisco AnyConnect VPN Agent;c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe [6/17/2009 3:17 PM 434864]
R3 GigNIC;NDIS5.1 Miniport Driver for Belkin Gigabit Desktop Card;c:\windows\system32\drivers\GigNIC.sys [7/23/2005 1:24 PM 169856]
S1 MpKsl2f85a016;MpKsl2f85a016;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C4C36A20-1F0F-4325-A579-0FB9A3ACBE24}\MpKsl2f85a016.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C4C36A20-1F0F-4325-A579-0FB9A3ACBE24}\MpKsl2f85a016.sys [?]
S1 MpKsl706177f1;MpKsl706177f1;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsl706177f1.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsl706177f1.sys [?]
S1 MpKsl94eb2373;MpKsl94eb2373;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9064812F-924F-458E-9471-B72363364E74}\MpKsl94eb2373.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9064812F-924F-458E-9471-B72363364E74}\MpKsl94eb2373.sys [?]
S1 MpKsla4e9d178;MpKsla4e9d178;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsla4e9d178.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKsla4e9d178.sys [?]
S1 MpKslc3e1a8bb;MpKslc3e1a8bb;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKslc3e1a8bb.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{846944B7-422F-4D0C-9E4B-F211D73D7164}\MpKslc3e1a8bb.sys [?]
S3 BlackBox;BlackBox SR2; [x]
S3 cmvad;C-Media Wi-Sonic Wireless Audio Interface;c:\windows\system32\drivers\cmudaxv.sys --> c:\windows\system32\drivers\cmudaxv.sys [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]
.
2011-09-26 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-823518204-1637723038-839522115-1003Core.job
- c:\documents and settings\Matt\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-07-15 03:36]
.
2011-09-28 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-823518204-1637723038-839522115-1003UA.job
- c:\documents and settings\Matt\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-07-15 03:36]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.7.254
FF - ProfilePath - c:\documents and settings\Matt\Application Data\Mozilla\Firefox\Profiles\pjdm9xsq.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://magness.my3gb.com/ToDo.php
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-28 13:15
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-823518204-1637723038-839522115-1003\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:a2,e8,b3,86,75,4f,b6,a1,86,d5,ab,35,90,3f,eb,8f,cb,0f,72,35,93,8d,18,
49,cb,d0,8e,e9,ef,67,bf,da,26,1a,9c,aa,a7,fc,c3,fe,ef,90,f1,b1,2f,eb,51,04,\
"??"=hex:a4,5d,89,6b,40,41,f2,30,36,d9,fd,d8,24,98,5f,14
.
[HKEY_USERS\S-1-5-21-823518204-1637723038-839522115-1003\Software\SecuROM\License information*]
"datasecu"=hex:59,e1,e9,5f,4d,29,26,0a,2a,8e,2e,3f,9a,b1,1b,25,cf,f7,ee,07,02,
72,1d,07,2e,4b,3d,7a,87,e5,6f,71,5b,c7,46,9e,9b,ee,db,b6,90,9e,1f,6e,52,a1,\
"rkeysecu"=hex:1e,14,01,fb,38,b5,93,26,5c,9c,25,da,3d,40,a1,70
.
[HKEY_LOCAL_MACHINE\software\Swearware\backup\winsock2\Parameters]
@DACL=(02 0000)
@SACL=
"WinSock_Registry_Version"="2.0"
"Current_NameSpace_Catalog"="NameSpace_Catalog5"
"Current_Protocol_Catalog"="Protocol_Catalog9"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1092)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\atiadlxx.dll
.
- - - - - - - > 'explorer.exe'(2480)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2011-09-28 13:19:05
ComboFix-quarantined-files.txt 2011-09-28 18:19
ComboFix2.txt 2011-09-28 16:11
.
Pre-Run: 8,413,831,168 bytes free
Post-Run: 8,432,869,376 bytes free
.
- - End Of File - - 29FEEE6506E78310D05632DEB6ED9220

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 28 September 2011 - 04:27 PM

Please do the following:

Step One
Please download Junction.zip and save it to your desktop.
Unzip it and extract junction.exe to your C:\ drive.

Step Two
Now copy (Ctrl +C) and paste (Ctrl +V) the text inside the code box below into Notepad.

@ECHO OFF
cd c:\
junction -s c:\>log.txt
start log.txt
del %0
Save it to your desktop as File name: junc.bat
Save as type: All Files

Step Three
Double click junc.bat to run it. A log will be presented. Copy and paste or attach the content of the log in your next reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 04:52 PM

Here's the log:


Junction v1.06 - Windows junction creator and reparse point viewer
Copyright © 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com


Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.


...

...

...

...

...

...

...

...

...

...

...

...

...

...

..
Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\0b051a517844a71bbb51593bb83747b2_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\12f4a8c7f53a6e215dfba09568128086_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\137bc05f965880ae87e2b900cbed3f08_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\172fe2c48003266d699b015aa93b81c5_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\205c581c2ae2fb5b0570833a1dadd29f_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2325caf1ee9c8083e35332bb3a7015c3_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\27c4ecfdd1e61a771840f3d5bb83bd26_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2fb2107953c77dac21c9346ff64f4dc7_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\31bc2f3e0cbadfea93b2c4701a356b74_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\36a7fda903a6e01dff337d7259147a0e_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\396d9508e1015c7729d0ae14bf5ab54b_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\44ce5c878ca846087f8ec649dd5b1a6d_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4c95ff0508ba9bf548935f02333891d5_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4dcd91466b883fd4dd5b7033766abdc6_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5c1e0586c9987e9138ae93cd660a3129_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5db8ef883e0ffcf07cf7c7630d8caf40_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5de95e5375276d4500174dd60354e3d2_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\68cf92e8e8f3d2982bccc8d5bebc1927_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7406b0f84cac9794ab01a075b194d161_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\767bc2a4856f2e199dc608c0a21978a0_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7d6ac1bd6df950cea161fc5a707e4fdb_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\82f2409d1a80e290a3e34f20de7eeabd_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\92467d93b96172a573c73cd42ef402b9_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\932585f5b222dfa04894b50d609ced06_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\9bb2090d2804ec0df3c3469b6d42c9ea_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\a29ee350f2560842aa56712f5545c17c_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ac7303f1a6cf175051d374f224732be8_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b433a91cf594b8b2e37d7b4f130e2939_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b52511d6a7bc6190d8498455e0a0d22d_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b61a0e35ec151fdae297642e04da485c_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b90d4a72cda5754c741285e30f1a59cb_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ccd2ef521abb37bed6086a1b66a39d8a_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\cce5b6e4e7f589041576886fd294b389_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ee06b8f6d3402af4cb8d9790afb634af_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ef8658b6d508714f81e70203cf9c9a3e_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.



Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\f19b6a58b8fc94a4a56a97987eb90cef_a5db68df-51a2-4579-b926-cbbf344abf33: Access is denied.


.

...

...

...

...

...

...

.
Failed to open \\?\c:\\Documents and Settings\Matt\Desktop\gmer.exe: Access is denied.


..

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

.
Failed to open \\?\c:\\gmer\gmer.exe: Access is denied.


..

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

.
Failed to open \\?\c:\\Qoobox\BackEnv: Access is denied.


..

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

.No reparse points found.

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 28 September 2011 - 07:28 PM

For x86 bit systems please download GrantPerms.zip and save it to your desktop.

Unzip the file and depending on the system run GrantPerms.exe or GrantPerms64.exe
Copy and paste the following in the edit box:

c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\0b051a517844a71bbb51593bb83747b2_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\12f4a8c7f53a6e215dfba09568128086_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\137bc05f965880ae87e2b900cbed3f08_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\172fe2c48003266d699b015aa93b81c5_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\205c581c2ae2fb5b0570833a1dadd29f_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2325caf1ee9c8083e35332bb3a7015c3_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\27c4ecfdd1e61a771840f3d5bb83bd26_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2fb2107953c77dac21c9346ff64f4dc7_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\31bc2f3e0cbadfea93b2c4701a356b74_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\36a7fda903a6e01dff337d7259147a0e_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\396d9508e1015c7729d0ae14bf5ab54b_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\44ce5c878ca846087f8ec649dd5b1a6d_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4c95ff0508ba9bf548935f02333891d5_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4dcd91466b883fd4dd5b7033766abdc6_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5c1e0586c9987e9138ae93cd660a3129_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5db8ef883e0ffcf07cf7c7630d8caf40_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5de95e5375276d4500174dd60354e3d2_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\68cf92e8e8f3d2982bccc8d5bebc1927_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7406b0f84cac9794ab01a075b194d161_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\767bc2a4856f2e199dc608c0a21978a0_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7d6ac1bd6df950cea161fc5a707e4fdb_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\82f2409d1a80e290a3e34f20de7eeabd_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\92467d93b96172a573c73cd42ef402b9_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\932585f5b222dfa04894b50d609ced06_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\9bb2090d2804ec0df3c3469b6d42c9ea_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\a29ee350f2560842aa56712f5545c17c_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ac7303f1a6cf175051d374f224732be8_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b433a91cf594b8b2e37d7b4f130e2939_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b52511d6a7bc6190d8498455e0a0d22d_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b61a0e35ec151fdae297642e04da485c_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b90d4a72cda5754c741285e30f1a59cb_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ccd2ef521abb37bed6086a1b66a39d8a_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\cce5b6e4e7f589041576886fd294b389_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ee06b8f6d3402af4cb8d9790afb634af_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ef8658b6d508714f81e70203cf9c9a3e_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\f19b6a58b8fc94a4a56a97987eb90cef_a5db68df-51a2-4579-b926-cbbf344abf33
c:\Documents and Settings\Matt\Desktop\gmer.exe
c:\Qoobox\BackEnv
c:\gmer\gmer.exe

Click Unlock. When it is done click "OK".
Click List Permissions and post the result (Perms.txt) that pops up. A copy of Perms.txt will be saved in the same directory the tool is run.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 09:05 PM

Okay, here's the next log:
Thanks for the help! I probably won't be back until tomorrow morning to get my next instructions.

GrantPerms by Farbar
Ran by Matt at 2011-09-28 21:03:42

===============================================
\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\0b051a517844a71bbb51593bb83747b2_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\12f4a8c7f53a6e215dfba09568128086_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\137bc05f965880ae87e2b900cbed3f08_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\172fe2c48003266d699b015aa93b81c5_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\205c581c2ae2fb5b0570833a1dadd29f_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2325caf1ee9c8083e35332bb3a7015c3_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\27c4ecfdd1e61a771840f3d5bb83bd26_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\2fb2107953c77dac21c9346ff64f4dc7_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\31bc2f3e0cbadfea93b2c4701a356b74_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\36a7fda903a6e01dff337d7259147a0e_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\396d9508e1015c7729d0ae14bf5ab54b_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\44ce5c878ca846087f8ec649dd5b1a6d_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4c95ff0508ba9bf548935f02333891d5_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\4dcd91466b883fd4dd5b7033766abdc6_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5c1e0586c9987e9138ae93cd660a3129_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5db8ef883e0ffcf07cf7c7630d8caf40_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\5de95e5375276d4500174dd60354e3d2_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\68cf92e8e8f3d2982bccc8d5bebc1927_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7406b0f84cac9794ab01a075b194d161_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\767bc2a4856f2e199dc608c0a21978a0_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\7d6ac1bd6df950cea161fc5a707e4fdb_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\82f2409d1a80e290a3e34f20de7eeabd_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\92467d93b96172a573c73cd42ef402b9_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\932585f5b222dfa04894b50d609ced06_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\9bb2090d2804ec0df3c3469b6d42c9ea_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\a29ee350f2560842aa56712f5545c17c_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ac7303f1a6cf175051d374f224732be8_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b433a91cf594b8b2e37d7b4f130e2939_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b52511d6a7bc6190d8498455e0a0d22d_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b61a0e35ec151fdae297642e04da485c_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\b90d4a72cda5754c741285e30f1a59cb_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ccd2ef521abb37bed6086a1b66a39d8a_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\cce5b6e4e7f589041576886fd294b389_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ee06b8f6d3402af4cb8d9790afb634af_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\ef8658b6d508714f81e70203cf9c9a3e_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys\f19b6a58b8fc94a4a56a97987eb90cef_a5db68df-51a2-4579-b926-cbbf344abf33

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Documents and Settings\Matt\Desktop\gmer.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Qoobox\BackEnv

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (CI)(OI)
NT AUTHORITY\SYSTEM FULL ALLOW (CI)(OI)
BUILTIN\Users READ/EXECUTE ALLOW (CI)(OI)
BUILTIN\Administrators FULL ALLOW (I)
BUILTIN\Administrators FULL ALLOW (CI)(OI)(IO)(I)
NT AUTHORITY\SYSTEM FULL ALLOW (I)
NT AUTHORITY\SYSTEM FULL ALLOW (CI)(OI)(IO)(I)
CREATOR OWNER FULL ALLOW (CI)(OI)(IO)(I)
BUILTIN\Users READ/EXECUTE ALLOW (I)
BUILTIN\Users READ/EXECUTE ALLOW (CI)(OI)(IO)(I)
BUILTIN\Users ADD SUBDIRECTORY ALLOW (CI)(I)
BUILTIN\Users ADD FILE ALLOW (CI)(I)
Everyone READ/EXECUTE ALLOW (CI)(OI)(I)


\\?\c:\gmer\gmer.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)

#13 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 28 September 2011 - 09:11 PM

One further note - GrantPerms wouldn't close. I had to use the task manager to kill it; nothing happened when I clicked the x. I don't know if that's expected or not.

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:45 PM

Posted 29 September 2011 - 08:46 AM

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realise. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.

FBI Cyber Education Letter
File sharing infects 500,000 computers
USAToday
infoworld


These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 8.1.3
J2SE Runtime Environment 5.0 Update 11
J2SE Runtime Environment 5.0 Update 6
Java™ SE Development Kit 6
Java™ SE Runtime Environment 6


and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

If you have problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Magness

Magness
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 29 September 2011 - 10:12 AM

I'm pretty sure I'm not using any P2P programs. But there are a bunch of programs on the computer left over from its previous owner, and I don't know what a lot of them do. Let me know if there are particular programs I should uninstall to be safe.

I didn't run into any problems with the uninstalling or updating.

Here is the MBAM log:
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7827

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/29/2011 9:59:29 AM
mbam-log-2011-09-29 (09-59-29).txt

Scan type: Quick scan
Objects scanned: 197958
Time elapsed: 3 minute(s), 10 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

And here is the HiJackThis log:
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 10:05:11 AM, on 9/29/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll (file missing)
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [ipTray.exe] "C:\Program Files\Intel\IDU\iptray.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [F.lux] "C:\Documents and Settings\Matt\Local Settings\Apps\F.lux\flux.exe" /noshow
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1122077426734
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1164405775250
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Admin Works Agent X8 (AWService) - OSA Technologies Inc., An Avocent Company - C:\Program Files\Intel\IDU\awServ.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: VMware Authorization Service (VMAuthdService) - VMware, Inc. - C:\Program Files\VMware\VMware Player\vmware-authd.exe
O23 - Service: VMware DHCP Service (VMnetDHCP) - VMware, Inc. - C:\WINDOWS\system32\vmnetdhcp.exe
O23 - Service: VMware Virtual Mount Manager Extended (vmount2) - VMware, Inc. - C:\Program Files\Common Files\VMware\VMware Virtual Image Editing\vmount2.exe
O23 - Service: VMware NAT Service - VMware, Inc. - C:\WINDOWS\system32\vmnat.exe
O23 - Service: Cisco AnyConnect VPN Agent (vpnagent) - Cisco Systems, Inc. - C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe

--
End of file - 6544 bytes

I notice this log still has references to Avast, which should be completely uninstalled. Do I need to do anything about that?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users