Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HELP - Zbot.g win32 internet redirect infestation


  • This topic is locked This topic is locked
50 replies to this topic

#1 thesergeant

thesergeant

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 09 October 2011 - 06:38 AM

My system is an HP desktop Pavillion running Microsoft Windows XP, Media cnetre edition with service pack 3.

It has been badly infected with a zbot.g trojan infection.

I have tried to remove it without success. I have run AVG seemed to detect a lot, but has not made any difference. I have now removed AVG. I have run spywareblaster, detected a lot removed a lot made only minor differences.

I could not get to Google as I got a google not found 404 nginx message. However after spywareblaster I can now get to Google. But when I try to go to some sites I get redirected or a not found message. Such as the Eset site.

Please Please can someone assist me get rid of these viruses.

I will post DDS and GMER logs shortly - PLEASE HELP ITS DRIVING ME MAD NOW.

OK here is my DDS Log

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702
Run by HP_Administrator at 12:18:38 on 2011-10-09
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.959.465 [GMT 1:00]
.
FW: Norton Internet Worm Protection *Disabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\WINDOWS\arservice.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\system32\svchost.exe -k HPService
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\ehome\mcrdsvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe
C:\WINDOWS\explorer.exe
C:\HP\KBD\KBD.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
c:\windows\system\hpsysdrv.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.co.uk/
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=64&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
mURLSearchHooks: H - No File
mWinlogon: Userinit=c:\windows\system32\userinit.exe,,c:\documents and settings\hp_administrator\local settings\application data\lpgmicxi\tvuyscey.exe
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - c:\program files\hp\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\progra~1\yahoo!\common\yiesrvc.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
TB: {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - No File
EB: HP Smart Web Printing: {555d4d79-4bd2-4094-a395-cfc534424a05} - c:\program files\hp\digital imaging\smart web printing\hpswp_bho.dll
uRun: [TvuYscey] c:\documents and settings\hp_administrator\local settings\application data\lpgmicxi\tvuyscey.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [ftutil2] rundll32.exe ftutil2.dll,SetWriteCacheMode
mRun: [AlwaysReady Power Message APP] ARPWRMSG.EXE
mRun: [Recguard] c:\windows\sminst\RECGUARD.EXE
mRun: [HPBootOp] "c:\program files\hewlett-packard\hp boot optimizer\HPBootOp.exe" /run
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [btbb_McciTrayApp] "c:\program files\bt broadband desktop help\btbb\BTHelpNotifier.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=NwA3AC0ANwA5ADEAMAAxADgAMwAzAC0ARgBQADkAMgArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQAxADAAQQArADEALQBYAE8AOQArADEALQBGADkATQAyACsAMQAtAEQARABUACsANgAyADkANQAxAC0ARABEADkAMABGACsAMQAtAFMAVAA5ADAARgBBAFAAUAArADEA"&"prod=90"&"ver=9.0.894
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
IE: {E2D4D26B-0180-43a4-B05F-462D6D54C789} - c:\windows\pchealth\helpctr\vendors\cn=hewlett-packard,l=cupertino,s=ca,c=us\iebutton\support.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\progra~1\yahoo!\common\yiesrvc.dll
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
Trusted Zone: arts.ac.uk\owa
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
TCP: Interfaces\{29A5F3D4-B3C4-445A-83EB-0F23AF93F9C0} : DhcpNameServer = 192.168.1.1 192.168.1.1
TCP: Interfaces\{6538C46C-1BBE-4EBA-BBD1-12A6B68572F0} : DhcpNameServer = 16.92.3.242 16.92.3.243 16.81.3.243 16.118.3.243
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: AtiExtEvent - Ati2evxx.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
.
============= SERVICES / DRIVERS ===============
.
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-12 116608]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]
RUnknown Micorsoft Windows Service;Micorsoft Windows Service; [x]
S3 ham50;Intel HaM Data Fax Voice;c:\windows\system32\drivers\ham50.sys [2007-1-7 364011]
.
=============== Created Last 30 ================
.
2011-10-09 09:01:26 -------- d-----w- c:\documents and settings\hp_administrator\application data\SUPERAntiSpyware.com
2011-10-09 09:00:57 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-10-09 09:00:57 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-10-09 07:56:58 -------- d-----w- c:\documents and settings\hp_administrator\local settings\application data\NPE
2011-10-09 07:56:58 -------- d-----w- c:\documents and settings\all users\application data\Norton
2011-10-09 05:54:33 -------- d-----w- c:\documents and settings\hp_administrator\application data\Malwarebytes
2011-10-09 05:54:28 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2011-10-09 05:54:25 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-10-09 05:54:25 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-10-08 19:22:17 -------- d-sha-r- C:\cmdcons
2011-10-08 18:53:59 21504 ----a-w- c:\windows\system32\hidserv.dll
2011-10-08 18:53:59 21504 ----a-w- c:\windows\system32\dllcache\hidserv.dll
2011-10-08 18:53:55 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2011-10-08 18:53:55 14592 ----a-w- c:\windows\system32\dllcache\kbdhid.sys
2011-10-08 18:53:47 10368 ----a-w- c:\windows\system32\drivers\hidusb.sys
2011-10-08 18:53:47 10368 ----a-w- c:\windows\system32\dllcache\hidusb.sys
2011-10-08 14:57:31 -------- d-----w- c:\documents and settings\hp_administrator\local settings\application data\lpgmicxi
2011-10-04 19:09:18 -------- d-sh--w- c:\documents and settings\hp_administrator\IECompatCache
.
==================== Find3M ====================
.
2011-10-09 10:39:22 187776 ----a-w- c:\windows\system32\drivers\acpi.sys
2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29:31 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-12 10:20:54 83816 ----a-w- c:\windows\system32\dns-sd.exe
2011-07-12 10:20:54 73064 ----a-w- c:\windows\system32\dnssd.dll
2011-07-12 10:20:54 50536 ----a-w- c:\windows\system32\jdns_sd.dll
2011-07-12 10:20:54 178536 ----a-w- c:\windows\system32\dnssdX.dll
.
============= FINISH: 12:19:15.21 ===============

The GMER log

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-10-09 13:37:02
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-7 Hitachi_HDS721616PLA380 rev.P22OA70A
Running: gmer.exe; Driver: C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\agncqaoc.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\bhvgsyal.sys ZwCreateKey [0xF77F96AC]
SSDT \??\C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\bhvgsyal.sys ZwOpenKey [0xF77F9562]
SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xF1FAE640]

---- Kernel code sections - GMER 1.0.15 ----

? Combo-Fix.sys The system cannot find the file specified. !
? C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\catchme.sys The system cannot find the file specified. !
? C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\bhvgsyal.sys The system cannot find the file specified. !
? C:\WINDOWS\system32\Drivers\PROCEXP113.SYS The system cannot find the file specified. !
? C:\WINDOWS\system32\drivers\mbamswissarmy.sys The system cannot find the file specified. !
? C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[168] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[192] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[192] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[192] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[192] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\arservice.exe[240] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\arservice.exe[240] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\arservice.exe[240] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\arservice.exe[240] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text c:\windows\system\hpsysdrv.exe[260] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text c:\windows\system\hpsysdrv.exe[260] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text c:\windows\system\hpsysdrv.exe[260] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text c:\windows\system\hpsysdrv.exe[260] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\WINDOWS\RTHDCPL.EXE[280] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\RTHDCPL.EXE[280] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\RTHDCPL.EXE[280] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\RTHDCPL.EXE[280] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\Common Files\Motive\McciCMService.exe[396] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\Common Files\Motive\McciCMService.exe[396] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\Common Files\Motive\McciCMService.exe[396] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\Common Files\Motive\McciCMService.exe[396] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\ehome\ehtray.exe[428] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\ehome\ehtray.exe[428] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\ehome\ehtray.exe[428] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\ehome\ehtray.exe[428] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\WINDOWS\ehome\ehtray.exe[428] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe[540] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[560] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[560] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[560] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\HP\HP Software Update\HPWuSchd2.exe[560] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[568] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
? C:\WINDOWS\system32\services.exe[660] time/date stamp mismatch; unknown module: NTDSAPI.dllunknown module: NCObjAPI.DLLunknown module: SCESRV.dllunknown module: umpnpmgr.dll
.text C:\WINDOWS\system32\services.exe[660] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\services.exe[660] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\services.exe[660] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\services.exe[660] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\services.exe[660] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\lsass.exe[672] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\lsass.exe[672] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[796] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
.text C:\WINDOWS\system32\Ati2evxx.exe[828] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\Ati2evxx.exe[828] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\Ati2evxx.exe[828] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\Ati2evxx.exe[828] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
? C:\WINDOWS\system32\svchost.exe[840] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[840] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[840] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[840] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[840] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[840] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
? C:\WINDOWS\system32\svchost.exe[900] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[900] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[900] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[900] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[900] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[900] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[924] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[924] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[924] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[924] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
? C:\WINDOWS\System32\svchost.exe[964] time/date stamp mismatch;
.text C:\WINDOWS\System32\svchost.exe[964] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\System32\svchost.exe[964] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\System32\svchost.exe[964] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\System32\svchost.exe[964] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\System32\svchost.exe[964] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\WINDOWS\System32\svchost.exe[964] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
? C:\WINDOWS\system32\svchost.exe[1012] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[1012] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[1012] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[1012] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[1012] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[1012] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
? C:\WINDOWS\system32\svchost.exe[1044] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[1044] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[1044] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[1044] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[1044] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[1044] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[1172] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[1172] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[1172] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[1172] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\Java\jre6\bin\jqs.exe[1284] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\Ati2evxx.exe[1380] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\Ati2evxx.exe[1380] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\Ati2evxx.exe[1380] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\Ati2evxx.exe[1380] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\ctfmon.exe[1412] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2006637E
.text C:\WINDOWS\system32\ctfmon.exe[1412] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2005A164
.text C:\WINDOWS\system32\ctfmon.exe[1412] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200661FA
.text C:\WINDOWS\system32\ctfmon.exe[1412] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20060BA0
.text C:\WINDOWS\system32\spoolsv.exe[1468] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\spoolsv.exe[1468] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\spoolsv.exe[1468] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\spoolsv.exe[1468] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\spoolsv.exe[1468] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
? C:\WINDOWS\explorer.exe[1608] time/date stamp mismatch; unknown module: WINMM.dllunknown module: SETUPAPI.dllunknown module: WINSTA.dllunknown module: OLEACC.dllunknown module: BROWSEUI.dllunknown module: OLEAUT32.dllunknown module: SHDOCVW.dllunknown module: UxTheme.dll
.text C:\WINDOWS\explorer.exe[1608] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\explorer.exe[1608] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\explorer.exe[1608] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\explorer.exe[1608] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\WINDOWS\explorer.exe[1608] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\Bonjour\mDNSResponder.exe[1728] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\wscntfy.exe[1756] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\WINDOWS\system32\wscntfy.exe[1756] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\WINDOWS\system32\wscntfy.exe[1756] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\WINDOWS\system32\wscntfy.exe[1756] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\WINDOWS\eHome\ehRecvr.exe[1764] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\eHome\ehRecvr.exe[1764] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\eHome\ehRecvr.exe[1764] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\eHome\ehRecvr.exe[1764] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\eHome\ehSched.exe[1792] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\eHome\ehSched.exe[1792] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\eHome\ehSched.exe[1792] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\eHome\ehSched.exe[1792] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
? C:\WINDOWS\system32\svchost.exe[1868] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[1868] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[1868] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[1868] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[1868] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
? C:\WINDOWS\system32\svchost.exe[1916] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[1916] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[1916] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[1916] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[1916] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[1916] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\WINDOWS\system32\svchost.exe[1916] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
? C:\WINDOWS\system32\svchost.exe[1960] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[1960] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[1960] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[1960] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[1960] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200A32FB
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 200A2F86
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 200A2FDC
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200A33B6
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 200A281D
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200A33E3
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200A27E8
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 200A3410
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200A31E0
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 200A3139
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 200A284F
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 200A3437
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200A27A2
.text C:\WINDOWS\system32\svchost.exe[1960] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 200A275C
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[1960] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[2384] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[2384] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[2384] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[2384] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\WINDOWS\system32\dllhost.exe[2528] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\WINDOWS\system32\dllhost.exe[2528] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\WINDOWS\system32\dllhost.exe[2528] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\WINDOWS\system32\dllhost.exe[2528] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
? C:\WINDOWS\System32\svchost.exe[2548] time/date stamp mismatch;
.text C:\WINDOWS\System32\svchost.exe[2548] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\System32\svchost.exe[2548] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\System32\svchost.exe[2548] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\System32\svchost.exe[2548] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\System32\svchost.exe[2548] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
? C:\WINDOWS\System32\svchost.exe[2604] time/date stamp mismatch;
.text C:\WINDOWS\System32\svchost.exe[2604] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\System32\svchost.exe[2604] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\System32\svchost.exe[2604] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\System32\svchost.exe[2604] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\System32\svchost.exe[2604] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
? C:\WINDOWS\system32\svchost.exe[2716] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[2716] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[2716] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[2716] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[2716] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\system32\svchost.exe[2716] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\HP\KBD\KBD.EXE[2776] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\HP\KBD\KBD.EXE[2776] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\HP\KBD\KBD.EXE[2776] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\HP\KBD\KBD.EXE[2776] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200232FB
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 20022F86
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 20022FDC
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200233B6
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 2002281D
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200233E3
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200227E8
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 20023410
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200231E0
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 20023139
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 2002284F
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 20023437
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200227A2
.text C:\HP\KBD\KBD.EXE[2776] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 2002275C
? C:\WINDOWS\system32\svchost.exe[2796] time/date stamp mismatch;
.text C:\WINDOWS\system32\svchost.exe[2796] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\system32\svchost.exe[2796] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\system32\svchost.exe[2796] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\system32\svchost.exe[2796] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 200A637E
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2009A164
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200A61FA
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 200A0BA0
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 200A197B
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 200A1CA5
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 200A1FBE
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!send 71AB4C27 5 Bytes JMP 200A192D
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 200A1E02
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!recv 71AB676F 5 Bytes JMP 200A1C36
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 200A1D1A
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 200A1EDD
.text C:\WINDOWS\ehome\mcrdsvc.exe[2904] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 200A1D8B
.text C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[2952] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[2952] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[2952] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[2952] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\Program Files\iPod\bin\iPodService.exe[3108] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\iPod\bin\iPodService.exe[3108] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\iPod\bin\iPodService.exe[3108] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\iPod\bin\iPodService.exe[3108] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetReadFile 3D94654B 5 Bytes JMP 200232FB
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetCloseHandle 3D949088 5 Bytes JMP 20022F86
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 20022FDC
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 200233B6
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpSendRequestW 3D94FABE 5 Bytes JMP 2002281D
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200233E3
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpSendRequestA 3D95EE91 5 Bytes JMP 200227E8
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 20023410
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetReadFileExW 3D963229 5 Bytes JMP 200231E0
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetReadFileExA 3D963261 5 Bytes JMP 20023139
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetWriteFile 3D9A6086 5 Bytes JMP 2002284F
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 20023437
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200227A2
.text C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[3112] WININET.dll!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 2002275C
.text C:\WINDOWS\eHome\ehmsas.exe[3352] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\WINDOWS\eHome\ehmsas.exe[3352] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\WINDOWS\eHome\ehmsas.exe[3352] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\WINDOWS\eHome\ehmsas.exe[3352] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\WINDOWS\System32\alg.exe[3380] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\WINDOWS\System32\alg.exe[3380] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\WINDOWS\System32\alg.exe[3380] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\WINDOWS\System32\alg.exe[3380] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 2002197B
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 20021CA5
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 20021FBE
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!send 71AB4C27 5 Bytes JMP 2002192D
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 20021E02
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!recv 71AB676F 5 Bytes JMP 20021C36
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 20021D1A
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 20021EDD
.text C:\WINDOWS\System32\alg.exe[3380] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 20021D8B
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] USER32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!sendto 71AB2F51 5 Bytes JMP 2002197B
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!recvfrom 71AB2FF7 5 Bytes JMP 20021CA5
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 20021FBE
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!send 71AB4C27 5 Bytes JMP 2002192D
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 20021E02
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!recv 71AB676F 5 Bytes JMP 20021C36
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 20021D1A
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!WSARecvFrom 71ABF66A 5 Bytes JMP 20021EDD
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WS2_32.dll!WSASendTo 71AC0AAD 5 Bytes JMP 20021D8B
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetReadFile 3D94654B 5 Bytes JMP 200232FB
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetCloseHandle 3D949088 5 Bytes JMP 20022F86
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetQueryDataAvailable 3D94BF83 5 Bytes JMP 20022FDC
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpOpenRequestA 3D94D508 5 Bytes JMP 200233B6
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpSendRequestW 3D94FABE 5 Bytes JMP 2002281D
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 200233E3
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpSendRequestA 3D95EE91 5 Bytes JMP 200227E8
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetOpenUrlA 3D95F3AC 5 Bytes JMP 20023410
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetReadFileExW 3D963229 5 Bytes JMP 200231E0
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetReadFileExA 3D963261 5 Bytes JMP 20023139
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetWriteFile 3D9A6086 5 Bytes JMP 2002284F
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!InternetOpenUrlW 3D9A6D6F 5 Bytes JMP 20023437
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpSendRequestExA 3D9BA65A 5 Bytes JMP 200227A2
.text C:\Program Files\iTunes\iTunesHelper.exe[3552] WININET.DLL!HttpSendRequestExW 3D9BA6B3 5 Bytes JMP 2002275C
.text C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\Temporary Directory 1 for gmer.zip\gmer.exe[3652] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 2002637E
.text C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\Temporary Directory 1 for gmer.zip\gmer.exe[3652] ntdll.dll!NtResumeThread 7C90DB3E 5 Bytes JMP 2001A164
.text C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\Temporary Directory 1 for gmer.zip\gmer.exe[3652] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 200261FA
.text C:\DOCUME~1\HP_ADM~1\LOCALS~1\Temp\Temporary Directory 1 for gmer.zip\gmer.exe[3652] user32.dll!TranslateMessage 7E418BF6 5 Bytes JMP 20020BA0

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs bb-run.sys (Promise Disk Accelerator/Promise Technology, Inc.)

Device \Driver\Micorsoft Windows Service \Device\631D2408D44C4f47AC647AB96987D4D5 bhvgsyal.sys

AttachedDevice \FileSystem\Fastfat \Fat bb-run.sys (Promise Disk Accelerator/Promise Technology, Inc.)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\HP Officejet 4500 G510g-m@ChangeID 962671

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe 114106 bytes executable
File C:\Documents and Settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe 114106 bytes executable

---- EOF - GMER 1.0.15 ----

Done a scan with Hijack this - Log ........

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 13:54:39, on 09/10/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\WINDOWS\arservice.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\ehome\mcrdsvc.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe
C:\WINDOWS\explorer.exe
C:\HP\KBD\KBD.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
c:\windows\system\hpsysdrv.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Documents and Settings\HP_Administrator\Desktop\New Folder\HijackThis(1).exe
C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=64&bd=PAVILION&pf=desktop
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,,C:\Documents and Settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [ftutil2] rundll32.exe ftutil2.dll,SetWriteCacheMode
O4 - HKLM\..\Run: [AlwaysReady Power Message APP] ARPWRMSG.EXE
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [HPBootOp] "C:\Program Files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" /run
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [btbb_McciTrayApp] "C:\Program Files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\RunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=NwA3AC0ANwA5ADEAMAAxADgAMwAzAC0ARgBQADkAMgArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQAxADAAQQArADEALQBYAE8AOQArADEALQBGADkATQAyACsAMQAtAEQARABUACsANgAyADkANQAxAC0ARABEADkAMABGACsAMQAtAFMAVAA5ADAARgBBAFAAUAArADEA"&"prod=90"&"ver=9.0.894
O4 - HKCU\..\Run: [TvuYscey] C:\Documents and Settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - .DEFAULT User Startup: Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
O4 - .DEFAULT User Startup: PinMcLnk.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
O9 - Extra button: BT Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\PROGRA~1\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Show or hide HP Smart Web Printing - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O9 - Extra button: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: SAS Core Service (!SASCORE) - SUPERAntiSpyware.com - C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: McciCMService - Alcatel-Lucent - C:\Program Files\Common Files\Motive\McciCMService.exe
O24 - Desktop Component 0: (no name) - http://uktv.co.uk/images/standarditem/m/573275_m.jpg

--
End of file - 10056 bytes

Merged 4 posts. ~ OB

Edited by Orange Blossom, 10 October 2011 - 01:45 AM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,703 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:25 PM

Posted 14 October 2011 - 06:40 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/422608 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 14 October 2011 - 02:45 PM

Hi,

PLEASE HELP :-(

I have supplied the required information above.

Many thanks

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:25 PM

Posted 15 October 2011 - 02:47 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 06:59 AM

Gringo,

Many thanks for helping.

Problems: When system boots into windows after about 30 seconds the screen goes black for a couple of seconds before returning to the desktop - like some unknown program has initiated. I am using a SD card to load programs onto get at logs etc - this is infected each time. Google is redirected I cant access antivirus sites etc. I noticed that when AVG was on the system the email scanner was initiated every couple of seconds - suggesting a large number of emails were being sent out!!

Before realising I needed to ask for help I have run a number of scans: Combofix, AVG (now removed as I couldn't update), antispyware, Malwarebytes, I did do the disable virtual CD thing ........... As you guess none of that resolved the problems!

Have run Combofix as requested. It has gone through all its stages, rebooted the system after deleting lots of files.

Combofix log .............

ComboFix 11-10-15.03 - HP_Administrator 15/10/2011 12:39:07.4.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.959.426 [GMT 1:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe
FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\HP_Administrator\Local Settings\Application Data\agsovwdp.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\hmyuntul.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\jfprasyo.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
c:\documents and settings\HP_Administrator\Local Settings\Application Data\ntihccym.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\uwxqtbmu.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\vnfembtu.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\wkuwkitl.log
c:\documents and settings\HP_Administrator\Local Settings\Temporary Internet Files\mcc25.tmp
c:\documents and settings\LocalService\Local Settings\Application Data\agsovwdp.log
c:\documents and settings\LocalService\Local Settings\Application Data\hmyuntul.log
c:\documents and settings\LocalService\Local Settings\Application Data\jfprasyo.log
c:\documents and settings\LocalService\Local Settings\Application Data\ntihccym.log
c:\documents and settings\LocalService\Local Settings\Application Data\uwxqtbmu.log
c:\documents and settings\LocalService\Local Settings\Application Data\vnfembtu.log
c:\documents and settings\LocalService\Local Settings\Application Data\wkuwkitl.log
c:\program files\Internet Explorer\IEXPLOREmgr.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MICORSOFT_WINDOWS_SERVICE
-------\Service_Micorsoft Windows Service
.
.
((((((((((((((((((((((((( Files Created from 2011-09-15 to 2011-10-15 )))))))))))))))))))))))))))))))
.
.
2011-10-09 16:07 . 2011-10-09 16:07 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-10-09 09:01 . 2011-10-09 09:01 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\SUPERAntiSpyware.com
2011-10-09 09:00 . 2011-10-09 09:01 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-10-09 09:00 . 2011-10-09 09:00 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-10-09 07:56 . 2011-10-09 11:14 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\NPE
2011-10-09 07:56 . 2011-10-09 07:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-10-09 05:54 . 2011-08-31 16:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\dllcache\hidserv.dll
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\dllcache\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\drivers\hidusb.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\dllcache\hidusb.sys
2011-10-08 14:57 . 2011-10-15 11:48 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi
2011-10-04 19:09 . 2011-10-04 19:09 -------- d-sh--w- c:\documents and settings\HP_Administrator\IECompatCache
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-09 10:39 . 2004-08-09 21:00 187776 ----a-w- c:\windows\system32\drivers\acpi.sys
2011-09-09 09:12 . 2004-08-09 21:00 599040 ----a-w- c:\windows\system32\crypt32.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-09-14 4611456]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"ftutil2"="ftutil2.dll" [2004-06-07 106496]
"AlwaysReady Power Message APP"="ARPWRMSG.EXE" [2005-08-02 77312]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-22 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 369017]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-21 16261632]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-09-08 180269]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2009-09-14 1584640]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 541207]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA&inst=NwA3AC0ANwA5ADEAMAAxADgAMwAzAC0ARgBQADkAMgArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQAxADAAQQArADEALQBYAE8AOQArADEALQBGADkATQAyACsAMQAtAEQARABUACsANgAyADkANQAxAC0ARABEADkAMABGACsAMQAtAFMAVAA5ADAARgBBAFAAUAArADEA&prod=90&ver=9.0.894" [?]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-5-21 275768]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-18 65588]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,,c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
SafeBoot registry key needs repairs. This machine cannot enter Safe Mode.
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\File system]
@="Driver Group"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\vgasave.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}]
@="DiskDrive"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96A-E325-11CE-BFC1-08002BE10318}]
@="Hdc"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96B-E325-11CE-BFC1-08002BE10318}]
@="Keyboard"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96F-E325-11CE-BFC1-08002BE10318}]
@="Mouse"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E97D-E325-11CE-BFC1-08002BE10318}]
@="System"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{71A27CDD-812A-11D0-BEC7-08002BE2092F}]
@="Volume"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [22/07/2011 17:27 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/07/2011 22:55 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [12/08/2011 00:38 116608]
S3 ham50;Intel HaM Data Fax Voice;c:\windows\system32\drivers\ham50.sys [07/01/2007 19:32 364011]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MICORSOFT_WINDOWS_SERVICE
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 16:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=64&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
Trusted Zone: arts.ac.uk\owa
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-TvuYscey - c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
HKU-Default-Run-TvuYscey - c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-15 12:49
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe 114106 bytes executable
.
scan completed successfully
hidden files: 1
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(616)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(3292)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\windows\arservice.exe
c:\windows\RTHDCPL.EXE
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
c:\windows\eHome\ehmsas.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
c:\program files\HP\Digital Imaging\bin\hpqbam08.exe
c:\program files\HP\Digital Imaging\bin\hpqgpc01.exe
.
**************************************************************************
.
Completion time: 2011-10-15 12:54:34 - machine was rebooted
ComboFix-quarantined-files.txt 2011-10-15 11:54
ComboFix2.txt 2011-10-09 11:00
.
Pre-Run: 139,148,804,096 bytes free
Post-Run: 139,081,162,752 bytes free
.
- - End Of File - - 04DD8ECB34C290E2A304C3B118C16B56

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:25 PM

Posted 15 October 2011 - 01:13 PM

Hello

I think you have a bad file infect-er on the computer but would like to be sure I need you to run this online scan

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 01:25 PM

Hi Gringo,

I think the virus will not allow me to get to this site. Every time I try I get a page saying Internet Explorer can not display this page. I can get to the UK site, but as soon as I try to get to the US site or the online scanner same thing.

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:25 PM

Posted 15 October 2011 - 02:57 PM

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

File::
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 04:50 PM

Gringo,

I have run the script as requested.

Combofix has run and auto rebooted the system.

ON booting up I have seen a BT Total Broadband message re: critical updates for XP message pop up - this is for the BT Broadband desktop application - the system is on BT Broadband. I have not clicked on it.

I have used SD card to transfer the log - this has again been infected (I scan and remove each time I use it between the systems)

There is still a strange few seconds every now and again where the screen goes black and then returns to the desktop.

Combofix log

ComboFix 11-10-15.04 - HP_Administrator 15/10/2011 22:28:23.5.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.959.349 [GMT 1:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\HP_Administrator\Desktop\CFScript.txt
FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
.
FILE ::
"c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\HP_Administrator\Local Settings\Application Data\agsovwdp.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\hmyuntul.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\jfprasyo.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
c:\documents and settings\HP_Administrator\Local Settings\Application Data\ntihccym.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\uwxqtbmu.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\vnfembtu.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\wkuwkitl.log
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MICORSOFT_WINDOWS_SERVICE
-------\Service_Micorsoft Windows Service
.
.
((((((((((((((((((((((((( Files Created from 2011-09-15 to 2011-10-15 )))))))))))))))))))))))))))))))
.
.
2011-10-09 16:07 . 2011-10-09 16:07 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-10-09 09:01 . 2011-10-09 09:01 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\SUPERAntiSpyware.com
2011-10-09 09:00 . 2011-10-09 09:01 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-10-09 09:00 . 2011-10-09 09:00 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-10-09 07:56 . 2011-10-09 11:14 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\NPE
2011-10-09 07:56 . 2011-10-09 07:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-10-09 05:54 . 2011-08-31 16:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\dllcache\hidserv.dll
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\dllcache\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\drivers\hidusb.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\dllcache\hidusb.sys
2011-10-08 14:57 . 2011-10-15 21:37 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi
2011-10-04 19:09 . 2011-10-04 19:09 -------- d-sh--w- c:\documents and settings\HP_Administrator\IECompatCache
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-09 10:39 . 2004-08-09 21:00 187776 ----a-w- c:\windows\system32\drivers\acpi.sys
2011-09-09 09:12 . 2004-08-09 21:00 599040 ----a-w- c:\windows\system32\crypt32.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-10-15_11.48.50 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-10-15 21:37 . 2011-10-15 21:37 16384 c:\windows\Temp\Perflib_Perfdata_1d8.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-09-14 4611456]
"TvuYscey"="c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe" [BU]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"ftutil2"="ftutil2.dll" [2004-06-07 106496]
"AlwaysReady Power Message APP"="ARPWRMSG.EXE" [2005-08-02 77312]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-22 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 369017]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-21 16261632]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-09-08 180269]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2009-09-14 1584640]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 541207]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA&inst=NwA3AC0ANwA5ADEAMAAxADgAMwAzAC0ARgBQADkAMgArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQAxADAAQQArADEALQBYAE8AOQArADEALQBGADkATQAyACsAMQAtAEQARABUACsANgAyADkANQAxAC0ARABEADkAMABGACsAMQAtAFMAVAA5ADAARgBBAFAAUAArADEA&prod=90&ver=9.0.894" [?]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-5-21 275768]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-18 65588]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,,c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
SafeBoot registry key needs repairs. This machine cannot enter Safe Mode.
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\File system]
@="Driver Group"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\vgasave.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}]
@="DiskDrive"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96A-E325-11CE-BFC1-08002BE10318}]
@="Hdc"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96B-E325-11CE-BFC1-08002BE10318}]
@="Keyboard"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96F-E325-11CE-BFC1-08002BE10318}]
@="Mouse"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E97D-E325-11CE-BFC1-08002BE10318}]
@="System"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{71A27CDD-812A-11D0-BEC7-08002BE2092F}]
@="Volume"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [22/07/2011 17:27 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/07/2011 22:55 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [12/08/2011 00:38 116608]
S3 ham50;Intel HaM Data Fax Voice;c:\windows\system32\drivers\ham50.sys [07/01/2007 19:32 364011]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MICORSOFT_WINDOWS_SERVICE
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 16:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=64&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
Trusted Zone: arts.ac.uk\owa
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-15 22:38
Windows 5.1.2600 Service Pack 3 NTFS
.
detected NTDLL code modification:
ZwQueryDirectoryFile
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe 114106 bytes executable
.
scan completed successfully
hidden files: 1
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(616)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(1120)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\RTHDCPL.EXE
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\windows\arservice.exe
c:\program files\BT Broadband Desktop Help\btbb\BTHelpBrowser.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
c:\windows\eHome\ehmsas.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
c:\program files\HP\Digital Imaging\bin\hpqbam08.exe
c:\program files\HP\Digital Imaging\bin\hpqgpc01.exe
.
**************************************************************************
.
Completion time: 2011-10-15 22:43:16 - machine was rebooted
ComboFix-quarantined-files.txt 2011-10-15 21:43
ComboFix2.txt 2011-10-15 11:54
ComboFix3.txt 2011-10-09 11:00
.
Pre-Run: 138,142,339,072 bytes free
Post-Run: 138,121,408,512 bytes free
.
- - End Of File - - D64C311C34156929713FA590B42BA5FA

#10 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 04:52 PM

Gringo,

I have tried to get to Eset again - I still get the same Explorer can display message.

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:25 PM

Posted 15 October 2011 - 04:53 PM

Please go to http://virscan.org/
  • Navigate the following file path into the "Suspicious files to scan" box on the top of the page:

    c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe

  • Click on the Upload button
  • If a pop-up appears saying the file has been scanned already, please select the ReScan button.
  • Once the Scan is completed, click on the "Copy to Clipboard" button. This will copy the link of the report into the Clipboard.
  • Paste the contents of the Clipboard in your next reply.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 06:11 PM

Gringo,

I can get to Virscan - however I can not type anything in the search bar for virscan. I can not use explorer to get to the particular file - even if I choose folder options to include hidden files there is nothing showing in the startup folder. I can not copy and paste snything into the search bar for virscan.

I can not get virscan to do anything - I can see the page but not input anything

#13 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 15 October 2011 - 06:14 PM

Gringo,

I can use Google, I can type into it and I can copy and paste out of it - However as soon as I go to virscan I can not do either - Very Sneaky !!

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:25 PM

Posted 15 October 2011 - 09:02 PM

Greetings

I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

KILLALL::
File::
c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe
Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TvuYscey"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\Userinit.exe,"



Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

Edited by gringo_pr, 15 October 2011 - 09:03 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 thesergeant

thesergeant
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 16 October 2011 - 01:38 AM

Hi Gringo,

I have run the script. When it began the first few stages what looks like a Microsoft error box came up PEV.exe encountered a problem and needs to close, I get the choice to send or not send an error report. I did not clicked on it.

The SD card I used to transfer was infected again. I still can not get to Eset.


Combofixlog

ComboFix 11-10-15.04 - HP_Administrator 16/10/2011 7:17.6.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.959.352 [GMT 1:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe
Command switches used :: H:\CFScript.txt
FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
.
FILE ::
"c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe"
"c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\HP_Administrator\Local Settings\Application Data\agsovwdp.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\hmyuntul.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\jfprasyo.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe
c:\documents and settings\HP_Administrator\Local Settings\Application Data\ntihccym.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\vnfembtu.log
c:\documents and settings\HP_Administrator\Local Settings\Application Data\wkuwkitl.log
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MICORSOFT_WINDOWS_SERVICE
.
.
((((((((((((((((((((((((( Files Created from 2011-09-16 to 2011-10-16 )))))))))))))))))))))))))))))))
.
.
2011-10-09 16:07 . 2011-10-09 16:07 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-10-09 09:01 . 2011-10-09 09:01 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\SUPERAntiSpyware.com
2011-10-09 09:00 . 2011-10-09 09:01 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-10-09 09:00 . 2011-10-09 09:00 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-10-09 07:56 . 2011-10-09 11:14 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\NPE
2011-10-09 07:56 . 2011-10-09 07:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-10-09 05:54 . 2011-10-09 05:54 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-10-09 05:54 . 2011-08-31 16:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
2011-10-08 18:53 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\dllcache\hidserv.dll
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:39 14592 ----a-w- c:\windows\system32\dllcache\kbdhid.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\drivers\hidusb.sys
2011-10-08 18:53 . 2008-04-13 18:45 10368 ----a-w- c:\windows\system32\dllcache\hidusb.sys
2011-10-08 14:57 . 2011-10-16 06:26 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi
2011-10-04 19:09 . 2011-10-04 19:09 -------- d-sh--w- c:\documents and settings\HP_Administrator\IECompatCache
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-09 10:39 . 2004-08-09 21:00 187776 ----a-w- c:\windows\system32\drivers\acpi.sys
2011-09-09 09:12 . 2004-08-09 21:00 599040 ----a-w- c:\windows\system32\crypt32.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-10-15_11.48.50 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-10-16 06:26 . 2011-10-16 06:26 16384 c:\windows\Temp\Perflib_Perfdata_cc.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-09-14 4611456]
"TvuYscey"="c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe" [BU]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"ftutil2"="ftutil2.dll" [2004-06-07 106496]
"AlwaysReady Power Message APP"="ARPWRMSG.EXE" [2005-08-02 77312]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-22 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 369017]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-21 16261632]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-09-08 180269]
"btbb_McciTrayApp"="c:\program files\BT Broadband Desktop Help\btbb\BTHelpNotifier.exe" [2009-09-14 1584640]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 541207]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA&inst=NwA3AC0ANwA5ADEAMAAxADgAMwAzAC0ARgBQADkAMgArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQAxADAAQQArADEALQBYAE8AOQArADEALQBGADkATQAyACsAMQAtAEQARABUACsANgAyADkANQAxAC0ARABEADkAMABGACsAMQAtAFMAVAA5ADAARgBBAFAAUAArADEA&prod=90&ver=9.0.894" [?]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-5-21 275768]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-18 65588]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,,c:\documents and settings\HP_Administrator\Local Settings\Application Data\lpgmicxi\tvuyscey.exe"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ------w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
SafeBoot registry key needs repairs. This machine cannot enter Safe Mode.
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\File system]
@="Driver Group"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\vgasave.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}]
@="DiskDrive"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96A-E325-11CE-BFC1-08002BE10318}]
@="Hdc"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96B-E325-11CE-BFC1-08002BE10318}]
@="Keyboard"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E96F-E325-11CE-BFC1-08002BE10318}]
@="Mouse"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E97D-E325-11CE-BFC1-08002BE10318}]
@="System"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{71A27CDD-812A-11D0-BEC7-08002BE2092F}]
@="Volume"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [22/07/2011 17:27 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [12/07/2011 22:55 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [12/08/2011 00:38 116608]
R4 Micorsoft Windows Service;Micorsoft Windows Service;\??\c:\docume~1\HP_ADM~1\LOCALS~1\Temp\bhvgsyal.sys --> c:\docume~1\HP_ADM~1\LOCALS~1\Temp\bhvgsyal.sys [?]
S3 ham50;Intel HaM Data Fax Voice;c:\windows\system32\drivers\ham50.sys [07/01/2007 19:32 364011]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MICORSOFT_WINDOWS_SERVICE
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 16:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
uDefault_Search_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=64&bd=PAVILION&pf=desktop
mSearch Bar = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/sb/*http://uk.docs.yahoo.com/info/bt_side.html
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://uk.red.clientapps.yahoo.com/customize/btyahoo/defaults/su/*http://uk.search.yahoo.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
Trusted Zone: arts.ac.uk\owa
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-16 07:26
Windows 5.1.2600 Service Pack 3 NTFS
.
detected NTDLL code modification:
ZwQueryDirectoryFile
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\documents and settings\HP_Administrator\Start Menu\Programs\Startup\tvuyscey.exe 114106 bytes executable
.
scan completed successfully
hidden files: 1
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(616)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(924)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\RTHDCPL.EXE
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\windows\arservice.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
c:\windows\eHome\ehmsas.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
c:\program files\HP\Digital Imaging\bin\hpqbam08.exe
c:\program files\HP\Digital Imaging\bin\hpqgpc01.exe
.
**************************************************************************
.
Completion time: 2011-10-16 07:31:37 - machine was rebooted
ComboFix-quarantined-files.txt 2011-10-16 06:31
ComboFix2.txt 2011-10-15 21:43
ComboFix3.txt 2011-10-15 11:54
ComboFix4.txt 2011-10-09 11:00
.
Pre-Run: 137,135,648,768 bytes free
Post-Run: 137,110,487,040 bytes free
.
- - End Of File - - 25DD3A6FDC6435A1DB7C46FFBE724EEA




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users