Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

BOO/TDss.e/Hidden objects


  • Please log in to reply
26 replies to this topic

#1 Leethal

Leethal

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 07 January 2012 - 07:21 PM

Hello. I'm sorry if I posted this in the wrong forum. Please move it if I'm causing any hindrances.
While scanning with Avira free 2 or 3 days ago,I discovered the Rootkit BOO/TDss.E. I'm pretty sure Avira got rid of it,but(from my LITTLE computer knowledge)I know rootkits are sneaky.
I've scanned with Kaspersky free,MCafee,and Avira free since then.(I only download Avira and Kaspersky for the scans.I delete when done.) The TDss has not been detected again. Problem solved right? Nooo. On my Avira scans I keep getting 5 hidden objects. Here is the latest log. I don't have the TDss.E log. Sorry=/ I stopped the scan because I only wanted to post the hidden objects. Will somone PLEASE tell me what they are? I need to know if it is anything to do with the rootkit.

Start of the scan: Saturday, January 07, 2012 01:08

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting search for hidden objects.
c:\windows\system32\drivers\mskssrv.sys
c:\windows\system32\drivers\mskssrv.sys
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MSKSSRV\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MSKSSRV\security
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\MSKSSRV\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\MSKSSRV\security
[NOTE] The registry entry is invisible.

The scan of running processes will be started
Scan process 'rsmsink.exe' - '30' Module(s) have been scanned
Scan process 'logon.scr' - '17' Module(s) have been scanned
Scan process 'msdtc.exe' - '42' Module(s) have been scanned
Scan process 'dllhost.exe' - '62' Module(s) have been scanned
Scan process 'dllhost.exe' - '47' Module(s) have been scanned
Scan process 'vssvc.exe' - '50' Module(s) have been scanned
Scan process 'avscan.exe' - '71' Module(s) have been scanned
Scan process 'avcenter.exe' - '113' Module(s) have been scanned
Scan process 'avshadow.exe' - '26' Module(s) have been scanned
Scan process 'avguard.exe' - '60' Module(s) have been scanned
Scan process 'avgnt.exe' - '60' Module(s) have been scanned
Scan process 'sched.exe' - '38' Module(s) have been scanned
Scan process 'mcagent.exe' - '114' Module(s) have been scanned
Scan process 'hpqbam08.exe' - '30' Module(s) have been scanned
Scan process 'hpqSTE08.exe' - '59' Module(s) have been scanned
Scan process 'alg.exe' - '35' Module(s) have been scanned
Scan process 'rundll32.exe' - '29' Module(s) have been scanned
Scan process 'mfefire.exe' - '72' Module(s) have been scanned
Scan process 'mcshield.exe' - '69' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'slserv.exe' - '6' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'MOBKbackup.exe' - '51' Module(s) have been scanned
Scan process 'mfevtps.exe' - '27' Module(s) have been scanned
Scan process 'McSvHost.exe' - '151' Module(s) have been scanned
Scan process 'jqs.exe' - '33' Module(s) have been scanned
Scan process 'svchost.exe' - '46' Module(s) have been scanned
Scan process 'SASCORE.EXE' - '17' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'hpqtra08.exe' - '73' Module(s) have been scanned
Scan process 'ctfmon.exe' - '27' Module(s) have been scanned
Scan process 'msmsgs.exe' - '46' Module(s) have been scanned
Scan process 'McPvTray.exe' - '32' Module(s) have been scanned
Scan process 'qttask.exe' - '43' Module(s) have been scanned
Scan process 'HPWuSchd2.exe' - '18' Module(s) have been scanned
Scan process 'VTTimer.exe' - '14' Module(s) have been scanned
Scan process 'spoolsv.exe' - '56' Module(s) have been scanned
Scan process 'Explorer.EXE' - '103' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '175' Module(s) have been scanned
Scan process 'svchost.exe' - '43' Module(s) have been scanned
Scan process 'svchost.exe' - '56' Module(s) have been scanned
Scan process 'lsass.exe' - '65' Module(s) have been scanned
Scan process 'services.exe' - '27' Module(s) have been scanned
Scan process 'winlogon.exe' - '73' Module(s) have been scanned
Scan process 'csrss.exe' - '12' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting to scan executable files (registry).
The registry was scanned ( '3180' files ).


Starting the file scan:

Begin scan in 'C:\'


End of the scan: Saturday, January 07, 2012 09:33
Used time: 8:25:03 Hour(s)

The scan has been canceled!

42376 Scanned directories
2225948 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
2225948 Files not concerned
11236 Archives were scanned
0 Warnings
5 Notes
429868 Objects were scanned with rootkit scan
5 Hidden objects were found


On a side note,before and after I removed the rootkit,I found a few adware and script viruses. Do you think these are related? I would be so grateful if someone could help me out. Thank you if you took the time to read this.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 07 January 2012 - 11:33 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download Farbar Service Scanner and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center
    • Windows Update
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

====================================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 08 January 2012 - 07:06 PM

Thank you for your quick reply,Broni!I highly Appreciate it. Here are all the logs. Mcafee cut back on an hour into the GMER scan and I was unaware.I hope that didnt mess anything up.

Farbar Service Scanner
Ran by Lee (administrator) on 08-01-2012 at 00:23:23
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============
Srservice Service is not running. Checking service configuration:
The start type of Srservice service is OK.
The ImagePath of Srservice service is OK.
The ServiceDll of Srservice: "C:\WINDOWS\system32\srsvc.dll".

sr Service is not running. Checking service configuration:
The start type of sr service is set to Disabled. The default start type is Boot.
The ImagePath of sr: "\SystemRoot\System32\DRIVERS\sr.sys".


System Restore Disabled Policy:
========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR"=DWORD:1


Security Center:
============

Windows Update:
===========
cryptsvc Service is not running. Checking service configuration:
The start type of cryptsvc service is set to Demand. The default start type is Auto.
The ImagePath of cryptsvc service is OK.
The ServiceDll of cryptsvc service is OK.


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) mfetdi2k(10) NetBT(5) NwlnkIpx(8) NwlnkNb(9) PSched(7) Tcpip(3)
0x15000000040000000100000002000000030000000A000000560000000B0000000C0000000D0000000E0000000F00000010000000110000001200000013000000140000000500000006000000070000000800000009000000


**** End of log ****


Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Disabled!
McAfee Total Protection
McAfee Online Backup
```````````````````````````````
Anti-malware/Other Utilities Check:

SUPERAntiSpyware
Eusing Free Registry Cleaner
Java 2 Runtime Environment Standard Edition v1.3.1
Java 2 Runtime Environment Standard Edition v1.3.1_02
Java™ 6 Update 20
Out of date Java installed!
Adobe Flash Player ( 10.0.45.2) Flash Player Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

McAfee Online Backup MOBKbackup.exe
``````````End of Log````````````



MiniToolBox by Farbar
Ran by Lee (administrator) on 08-01-2012 at 00:27:01
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
Hosts file not detected in the default directory
========================= IP Configuration: ================================

VIA Rhine III Fast Ethernet Adapter = Local Area Connection 3 (Connected)
VIA Rhine II Fast Ethernet Adapter = Local Area Connection (Media disconnected)


# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp

# Interface IP Configuration for "Local Area Connection 3"

set address name="Local Area Connection 3" source=dhcp
set dns name="Local Area Connection 3" source=dhcp register=PRIMARY
set wins name="Local Area Connection 3" source=dhcp


popd
# End of interface IP configuration


Windows IP Configuration Host Name . . . . . . . . . . . . : your-pl0bmt21n9 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Unknown IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : NoEthernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Adapter Physical Address. . . . . . . . . : 00-0C-76-5D-D7-B7Ethernet adapter Local Area Connection 3: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VIA Rhine III Fast Ethernet Adapter Physical Address. . . . . . . . . : 34-08-04-98-43-D4 Dhcp Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IP Address. . . . . . . . . . . . : 96.19.202.86 Subnet Mask . . . . . . . . . . . : 255.255.224.0 Default Gateway . . . . . . . . . : 96.19.192.1 DHCP Server . . . . . . . . . . . : 24.116.2.151 DNS Servers . . . . . . . . . . . : 24.116.2.50 24.116.2.34 Lease Obtained. . . . . . . . . . : Sunday, January 08, 2012 12:08:26 AM Lease Expires . . . . . . . . . . : Monday, January 09, 2012 12:01:15 AMServer: dns.cableone.net
Address: 24.116.2.50

Name: google.com
Addresses: 74.125.227.17, 74.125.227.18, 74.125.227.19, 74.125.227.20
74.125.227.16

Pinging google.com [74.125.227.17] with 32 bytes of data:Reply from 74.125.227.17: bytes=32 time=40ms TTL=55Reply from 74.125.227.17: bytes=32 time=39ms TTL=55Ping statistics for 74.125.227.17: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 39ms, Maximum = 40ms, Average = 39msServer: local2.speedtest.cableone.net
Address: 24.116.2.50

Name: yahoo.com
Addresses: 209.191.122.70, 72.30.2.43, 98.137.149.56, 98.139.180.149

Pinging yahoo.com [72.30.2.43] with 32 bytes of data:Reply from 72.30.2.43: bytes=32 time=83ms TTL=49Reply from 72.30.2.43: bytes=32 time=82ms TTL=49Ping statistics for 72.30.2.43: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 82ms, Maximum = 83ms, Average = 82msServer: local.speedtest.cableone.net
Address: 24.116.2.50

Name: bleepingcomputer.com
Address: 208.43.87.2

Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:Reply from 208.43.87.2: Destination host unreachable.Reply from 208.43.87.2: Destination host unreachable.Ping statistics for 208.43.87.2: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0msPinging 127.0.0.1 with 32 bytes of data:Reply from 127.0.0.1: bytes=32 time<1ms TTL=128Reply from 127.0.0.1: bytes=32 time<1ms TTL=128Ping statistics for 127.0.0.1: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 0c 76 5d d7 b7 ...... VIA Rhine II Fast Ethernet Adapter - McAfee Core NDIS Intermediate Filter Miniport
0x3 ...34 08 04 98 43 d4 ...... VIA Rhine III Fast Ethernet Adapter - McAfee Core NDIS Intermediate Filter Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 96.19.192.1 96.19.202.86 20
96.19.192.0 255.255.224.0 96.19.202.86 96.19.202.86 20
96.19.202.86 255.255.255.255 127.0.0.1 127.0.0.1 20
96.255.255.255 255.255.255.255 96.19.202.86 96.19.202.86 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 96.19.202.86 96.19.202.86 20
255.255.255.255 255.255.255.255 96.19.202.86 2 1
255.255.255.255 255.255.255.255 96.19.202.86 96.19.202.86 1
Default Gateway: 96.19.192.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog5 04 C:\Windows\System32\nwprovau.dll [142336] (Microsoft Corporation)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 21 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 22 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (01/07/2012 09:51:00 AM) (Source: VSS) (User: )
Description: Volume Shadow Copy Service error: An internal inconsistency was detected in trying
to contact shadow copy service writers. Please check to see that the Event Service
and Volume Shadow Copy Service are operating properly.

Error: (01/07/2012 00:22:59 AM) (Source: Application Hang) (User: )
Description: Hanging application msimn.exe, version 6.0.2900.5512, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/05/2012 11:56:49 PM) (Source: VSS) (User: )
Description: Volume Shadow Copy Service error: An internal inconsistency was detected in trying
to contact shadow copy service writers. Please check to see that the Event Service
and Volume Shadow Copy Service are operating properly.

Error: (01/05/2012 00:43:42 AM) (Source: McLogEvent) (User: SYSTEM)SYSTEM
Description: A thread in process C:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe took longer than 90000 ms to complete a request.

The process will be terminated.
Thread id : 2396 (0x95c)

Thread address : 0x14740A9E

Thread message :

Build VSCORE.14.4.0.380 / 5400.1158
Object being scanned = \Device\HarddiskVolume1\Documents and Settings\All Users\Application Data\McAfee\MCLOGS\Common\mcagent\log.ini
by C:\Program Files\McAfee.com\Agent\mcagent.exe
4(0)(0)
4(0)(0)
7200(0)(0)
7595(0)(0)
7005(0)(0)
7004(0)(0)
5006(0)(0)
5004(0)(0)

Error: (01/05/2012 00:01:38 AM) (Source: Application Hang) (User: )
Description: Fault bucket 734562961.

Error: (01/05/2012 00:00:34 AM) (Source: Application Hang) (User: )
Description: Hanging application rundll32.exe, version 5.1.2600.5512, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/04/2012 03:58:15 PM) (Source: Application Hang) (User: )
Description: Hanging application mcagent.exe, version 11.0.644.0, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (01/02/2012 11:53:55 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: This operation returned because the timeout period expired.

Error: (12/26/2011 06:31:24 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (12/25/2011 10:41:48 PM) (Source: Application Hang) (User: )
Description: Hanging application mbam.exe, version 1.51.0.1118, hang module hungapp, version 0.0.0.0, hang address 0x00000000.


System errors:
=============
Error: (01/07/2012 09:47:56 AM) (Source: Service Control Manager) (User: )
Description: The HP CUE DeviceDiscovery Service service hung on starting.

Error: (01/07/2012 09:46:26 AM) (Source: Service Control Manager) (User: )
Description: The ASCTRM service failed to start due to the following error:
%%2

Error: (01/06/2012 10:20:22 PM) (Source: Service Control Manager) (User: )
Description: The HP CUE DeviceDiscovery Service service hung on starting.

Error: (01/06/2012 10:18:26 PM) (Source: Service Control Manager) (User: )
Description: The ASCTRM service failed to start due to the following error:
%%2

Error: (01/06/2012 05:12:01 PM) (Source: Service Control Manager) (User: )
Description: The HP CUE DeviceDiscovery Service service hung on starting.

Error: (01/06/2012 05:10:38 PM) (Source: Service Control Manager) (User: )
Description: The ASCTRM service failed to start due to the following error:
%%2

Error: (01/05/2012 11:54:50 PM) (Source: DCOM) (User: SYSTEM)
Description: The server {E0EC0F2B-773D-4DD7-BE6C-7D85D6AA6269} did not register with DCOM within the required timeout.

Error: (01/05/2012 11:53:49 PM) (Source: Service Control Manager) (User: )
Description: The HP CUE DeviceDiscovery Service service hung on starting.

Error: (01/05/2012 11:52:19 PM) (Source: Service Control Manager) (User: )
Description: The ASCTRM service failed to start due to the following error:
%%2

Error: (01/05/2012 06:32:34 PM) (Source: Service Control Manager) (User: )
Description: The HP CUE DeviceDiscovery Service service hung on starting.


Microsoft Office Sessions:
=========================
Error: (01/07/2012 09:51:00 AM) (Source: VSS)(User: )
Description:

Error: (01/07/2012 00:22:59 AM) (Source: Application Hang)(User: )
Description: msimn.exe6.0.2900.5512hungapp0.0.0.000000000

Error: (01/05/2012 11:56:49 PM) (Source: VSS)(User: )
Description:

Error: (01/05/2012 00:43:42 AM) (Source: McLogEvent)(User: SYSTEM)SYSTEM
Description: C:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe900002396 (0x95c)0x14740A9E
Build VSCORE.14.4.0.380 / 5400.1158
Object being scanned = \Device\HarddiskVolume1\Documents and Settings\All Users\Application Data\McAfee\MCLOGS\Common\mcagent\log.ini
by C:\Program Files\McAfee.com\Agent\mcagent.exe
4(0)(0)
4(0)(0)
7200(0)(0)
7595(0)(0)
7005(0)(0)
7004(0)(0)
5006(0)(0)
5004(0)(0)

Error: (01/05/2012 00:01:38 AM) (Source: Application Hang)(User: )
Description: 734562961

Error: (01/05/2012 00:00:34 AM) (Source: Application Hang)(User: )
Description: rundll32.exe5.1.2600.5512hungapp0.0.0.000000000

Error: (01/04/2012 03:58:15 PM) (Source: Application Hang)(User: )
Description: mcagent.exe11.0.644.0hungapp0.0.0.000000000

Error: (01/02/2012 11:53:55 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThis operation returned because the timeout period expired.

Error: (12/26/2011 06:31:24 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (12/25/2011 10:41:48 PM) (Source: Application Hang)(User: )
Description: mbam.exe1.51.0.1118hungapp0.0.0.000000000


=========================== Installed Programs ============================

32 Bit HP CIO Components Installer (Version: 1.0.0)
56Kbps Internal Modem
Adobe Acrobat 5.0 (Version: 5.0)
Adobe Flash Player 10 ActiveX (Version: 10.3.183.7)
Adobe Flash Player 10 Plugin (Version: 10.0.45.2)
AOL Instant Messenger (SM)
BlackBerry Desktop Software 4.3 (Version: 4.3.0.17)
BufferChm (Version: 100.0.170.000)
Compatibility Pack for the 2007 Office system (Version: 12.0.6514.5001)
Copy (Version: 100.0.170.000)
CustomerResearchQFolder (Version: 1.00.0000)
Destination Component (Version: 100.0.0.0)
DeviceDiscovery (Version: 100.0.190.000)
DeviceManagementQFolder (Version: 1.00.0000)
DJ_AIO_03_F2200_ProductContext (Version: 100.0.215.000)
DJ_AIO_03_F2200_Software (Version: 100.0.206.000)
DJ_AIO_03_F2200_Software_Min (Version: 100.0.239.000)
eSupportQFolder (Version: 1.00.0000)
Eusing Free Registry Cleaner
F2200 (Version: 100.0.206.000)
F2200_Help (Version: 100.0.206.000)
File Type Assistant
GPBaseService (Version: 100.0.187.000)
GPBaseService2 (Version: 130.0.371.000)
HP Customer Participation Program 10.0 (Version: 10.0)
HP Deskjet F2200 All-In-One Driver Software 10.0 Rel .3 (Version: 10.0)
HP Imaging Device Functions 10.0 (Version: 10.0)
HP Photosmart Essential 2.5 (Version: 1.02.0000)
HP Photosmart Essential 2.5 (Version: 2.5)
HP Smart Web Printing 4.60 (Version: 4.60)
HP Solution Center 13.0 (Version: 13.0)
HP Update (Version: 4.000.007.003)
HPProductAssistant (Version: 130.0.371.000)
HPSSupply (Version: 100.0.170.000)
ICQ
Java 2 Runtime Environment Standard Edition v1.3.1
Java 2 Runtime Environment Standard Edition v1.3.1_02
Java Auto Updater (Version: 2.0.2.1)
Java™ 6 Update 20 (Version: 6.0.200)
Learn2 Player (Uninstall Only)
MarketResearch (Version: 100.0.170.000)
McAfee Online Backup
McAfee Online Backup (Version: 1.16.4.0)
McAfee Total Protection (Version: 11.0.649)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Money 2004 (Version: 12.0.50)
Microsoft Money 2004 System Pack (Version: 12.0.80)
Microsoft Office 2010 Service Pack 1 (SP1)
Microsoft Office Access MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Access Setup Metadata MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Excel MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Home and Student 2010 (Version: 14.0.6029.1000)
Microsoft Office OneNote MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Outlook MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office PowerPoint MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office PowerPoint Viewer 2007 (English) (Version: 12.0.6425.1000)
Microsoft Office Proof (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Proof (French) 2010 (Version: 14.0.6029.1000)
Microsoft Office Proof (Spanish) 2010 (Version: 14.0.6029.1000)
Microsoft Office Proofing (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Publisher MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Shared MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft Office Single Image 2010 (Version: 14.0.6029.1000)
Microsoft Office Word MUI (English) 2010 (Version: 14.0.6029.1000)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (Version: 10.0.40219)
Microsoft Works 7.0 (Version: 07.02.0620)
MSVCSetup (Version: 1.00.0000)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 6 Service Pack 2 (KB973686) (Version: 6.20.2003.0)
Nero 6 Enterprise Edition
PowerDVD
PSSWCORE (Version: 2.02.0000)
QuickTime
RealPlayer Basic
Realtek AC'97 Audio
Roxio Media Manager (Version: 9.4.007)
RunAlyzer (Version: 1.6.1.24)
S3 S3Display
S3 S3Gamma2
S3 S3Info2
S3 S3Overlay
Scan (Version: 10.1.0.0)
Shop for HP Supplies (Version: 10.0)
Skype™ 5.3 (Version: 5.3.111)
SmartWebPrinting (Version: 140.0.186.000)
SolutionCenter (Version: 130.0.373.000)
Status (Version: 100.0.175.000)
SUPERAntiSpyware (Version: 4.55.1000)
Toolbox (Version: 100.0.170.000)
TrayApp (Version: 100.0.170.000)
UniChrome Graphics Driver and Utilities
UnloadSupport (Version: 10.0.0)
USB MassStorage CardReader
VideoToolkit01 (Version: 100.0.128.000)
WebFldrs XP (Version: 9.50.6513)
WebReg (Version: 100.0.170.000)
Winamp (remove only)
Windows Backup Utility (Version: 5.1)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Media Format 11 runtime
Windows Media Player 11
Windows Movie Maker 2.0 (Version: 2.0.0000)
Windows XP Service Pack 3 (Version: 20080414.031525)
XML Paper Specification Shared Components Pack 1.0

========================= Memory info: ===================================

Percentage of memory in use: 74%
Total physical RAM: 447.48 MB
Available physical RAM: 113.42 MB
Total Pagefile: 1056.19 MB
Available Pagefile: 526.97 MB
Total Virtual: 2047.88 MB
Available Virtual: 1971.12 MB

========================= Partitions: =====================================

2 Drive c: () (Fixed) (Total:74.53 GB) (Free:57.31 GB) NTFS

========================= Users: ========================================

User accounts for \\YOUR-PL0BMT21N9

Administrator Guest HelpAssistant
Lee SUPPORT_388945a0


**** End of log ****

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-01-08 17:39:31
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD800EB-00DJF0 rev.77.07W77
Running: 1o56iiz8.exe; Driver: C:\DOCUME~1\Lee\LOCALS~1\Temp\uwlyypob.sys


---- System - GMER 1.0.15 ----

Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwCreateKey [0xF75C54C0]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwDeleteKey [0xF75C54D4]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwDeleteValueKey [0xF75C5500]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwMapViewOfSection [0xF75C5556]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenKey [0xF75C54AC]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenProcess [0xF75C5484]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwOpenThread [0xF75C5498]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwRenameKey [0xF75C54EA]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetSecurityObject [0xF75C552C]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwSetValueKey [0xF75C5516]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwTerminateProcess [0xF75C5580]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0xF75C556C]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) ZwYieldExecution [0xF75C5540]
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtMapViewOfSection
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenProcess
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtOpenThread
Code mfehidk.sys (McAfee Link Driver/McAfee, Inc.) NtSetSecurityObject

---- Kernel code sections - GMER 1.0.15 ----

init C:\WINDOWS\system32\drivers\ALCXSENS.SYS entry point in "init" section [0xF71DA870]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\Explorer.EXE[320] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 04420000
.text C:\WINDOWS\Explorer.EXE[320] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 04420011
.text C:\WINDOWS\Explorer.EXE[320] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 04420FDB
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 0506000A
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 05060073
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 05060062
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 05060F8A
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 05060047
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 05060025
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 05060F3E
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 05060F59
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 050600C6
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 050600B5
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 050600E1
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 05060036
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 05060FEF
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 05060084
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 05060FB9
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 05060FD4
.text C:\WINDOWS\Explorer.EXE[320] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 05060F2D
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 05050033
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 05050F87
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 05050022
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 05050011
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 05050044
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 05050000
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 05050FAC
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [25, 8D]
.text C:\WINDOWS\Explorer.EXE[320] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 05050FBD
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 04EA0047
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!system 77C293C7 5 Bytes JMP 04EA002C
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 04EA0FC6
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!_open 77C2F566 5 Bytes JMP 04EA0FEF
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 04EA001B
.text C:\WINDOWS\Explorer.EXE[320] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 04EA0000
.text C:\WINDOWS\Explorer.EXE[320] WININET.dll!InternetOpenA 3D95D6A8 5 Bytes JMP 04D60FEF
.text C:\WINDOWS\Explorer.EXE[320] WININET.dll!InternetOpenW 3D95DB21 5 Bytes JMP 04D60000
.text C:\WINDOWS\Explorer.EXE[320] WININET.dll!InternetOpenUrlA 3D95F3BC 5 Bytes JMP 04D60FCA
.text C:\WINDOWS\Explorer.EXE[320] WININET.dll!InternetOpenUrlW 3D9A6DFF 5 Bytes JMP 04D6001B
.text C:\WINDOWS\Explorer.EXE[320] WS2_32.dll!socket 71AB4211 5 Bytes JMP 04E30FEF
.text C:\WINDOWS\System32\svchost.exe[576] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00690000
.text C:\WINDOWS\System32\svchost.exe[576] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00690022
.text C:\WINDOWS\System32\svchost.exe[576] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00690011
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 006D000A
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 006D0F61
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 006D0056
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 006D0F7C
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 006D0F8D
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 006D0FB9
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 006D0096
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 006D0F44
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 006D0F0E
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 006D00B1
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 006D0EFD
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 006D0FA8
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 006D0FE5
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 006D0071
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 006D0FD4
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 006D001B
.text C:\WINDOWS\System32\svchost.exe[576] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 006D0F29
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 006C0FD1
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 006C0073
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 006C0022
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 006C0011
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 006C0058
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 006C0000
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 006C0047
.text C:\WINDOWS\System32\svchost.exe[576] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 006C0FC0
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 006B0F7F
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!system 77C293C7 5 Bytes JMP 006B0F90
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 006B000A
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!_open 77C2F566 5 Bytes JMP 006B0FE3
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 006B0FAB
.text C:\WINDOWS\System32\svchost.exe[576] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 006B0FC6
.text C:\WINDOWS\System32\svchost.exe[576] WS2_32.dll!socket 71AB4211 5 Bytes JMP 006A0000
.text C:\WINDOWS\System32\svchost.exe[648] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00690FEF
.text C:\WINDOWS\System32\svchost.exe[648] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 0069002F
.text C:\WINDOWS\System32\svchost.exe[648] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0069000A
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 006D0FEF
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 006D0F81
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 006D0076
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 006D0065
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 006D0FA8
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 006D0FC3
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 006D00B8
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 006D0F66
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 006D0F41
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 006D00DA
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 006D00F5
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 006D004A
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 006D0FDE
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 006D0091
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 006D0025
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 006D0014
.text C:\WINDOWS\System32\svchost.exe[648] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 006D00C9
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 006C0FCA
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 006C0F94
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 006C0025
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 006C0FEF
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 006C0051
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 006C000A
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 006C0040
.text C:\WINDOWS\System32\svchost.exe[648] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 006C0FB9
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 006B0058
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!system 77C293C7 5 Bytes JMP 006B003D
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 006B001B
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!_open 77C2F566 5 Bytes JMP 006B0000
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 006B002C
.text C:\WINDOWS\System32\svchost.exe[648] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 006B0FE3
.text C:\WINDOWS\System32\svchost.exe[648] WS2_32.dll!socket 71AB4211 5 Bytes JMP 006A0000
.text C:\WINDOWS\System32\svchost.exe[1088] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00B20FE5
.text C:\WINDOWS\System32\svchost.exe[1088] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00B20FC3
.text C:\WINDOWS\System32\svchost.exe[1088] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B20FD4
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00B90FE5
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00B900C9
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00B900A4
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00B90093
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00B90076
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00B9004A
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00B900DA
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00B90F92
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00B90F63
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00B90106
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00B90F52
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00B9005B
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00B9000A
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00B90FB9
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00B90FD4
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00B90025
.text C:\WINDOWS\System32\svchost.exe[1088] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00B900F5
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00B8002F
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00B8005B
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00B8000A
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00B80FD4
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00B8004A
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00B80FE5
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00B80FB2
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [D8, 88]
.text C:\WINDOWS\System32\svchost.exe[1088] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00B80FC3
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00B70F9A
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!system 77C293C7 5 Bytes JMP 00B70FAB
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00B70FC6
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00B70000
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00B70025
.text C:\WINDOWS\System32\svchost.exe[1088] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00B70FE3
.text C:\WINDOWS\system32\services.exe[1396] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00FD0FEF
.text C:\WINDOWS\system32\services.exe[1396] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00FD0014
.text C:\WINDOWS\system32\services.exe[1396] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00FD0FD4
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 012B0FEF
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 012B0F63
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 012B0062
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 012B0051
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 012B0F94
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 012B0FAF
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 012B0F1A
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 012B0F2B
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 012B008E
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 012B0073
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 012B00A9
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 012B0040
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 012B0FDE
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 012B0F52
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 012B0025
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 012B0014
.text C:\WINDOWS\system32\services.exe[1396] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 012B0EFF
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 012A001E
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 012A0F8D
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 012A0FCD
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 012A0FDE
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 012A004A
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 012A0FEF
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 012A002F
.text C:\WINDOWS\system32\services.exe[1396] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 012A0FB2
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00FF0FC1
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!system 77C293C7 5 Bytes JMP 00FF0FD2
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00FF001D
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00FF0000
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00FF0038
.text C:\WINDOWS\system32\services.exe[1396] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00FF0FE3
.text C:\WINDOWS\system32\services.exe[1396] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00FE0FE5
.text C:\WINDOWS\system32\lsass.exe[1408] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00CC0FE5
.text C:\WINDOWS\system32\lsass.exe[1408] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00CC0FB9
.text C:\WINDOWS\system32\lsass.exe[1408] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00CC0FCA
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00ED000A
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00ED00AE
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00ED009D
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00ED0080
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00ED0FC3
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00ED0054
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00ED0F83
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00ED00D5
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00ED0F57
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00ED00E6
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00ED010B
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00ED0065
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00ED0025
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00ED0F9E
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00ED0FDE
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00ED0FEF
.text C:\WINDOWS\system32\lsass.exe[1408] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00ED0F72
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00CF0FB6
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00CF0F8A
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00CF0011
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00CF0000
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00CF003D
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00CF0FE5
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 00CF0022
.text C:\WINDOWS\system32\lsass.exe[1408] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00CF0F9B
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00CE0F93
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!system 77C293C7 5 Bytes JMP 00CE0FA4
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00CE0FC6
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00CE0FE3
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00CE0FB5
.text C:\WINDOWS\system32\lsass.exe[1408] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00CE0000
.text C:\WINDOWS\system32\lsass.exe[1408] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00CD0FEF
.text C:\WINDOWS\system32\svchost.exe[1552] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00B60FE5
.text C:\WINDOWS\system32\svchost.exe[1552] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00B60000
.text C:\WINDOWS\system32\svchost.exe[1552] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B60FD4
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00BA0000
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00BA0F92
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00BA0FAD
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00BA0FBE
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00BA0087
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00BA0047
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00BA00BD
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00BA0F77
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00BA0F24
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00BA0F3F
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00BA00E2
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00BA006C
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00BA001B
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00BA00A2
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00BA0036
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00BA0FE5
.text C:\WINDOWS\system32\svchost.exe[1552] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00BA0F50
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00B90FC3
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00B9005B
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00B90FD4
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00B90FE5
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00B90F9E
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00B90000
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 00B90040
.text C:\WINDOWS\system32\svchost.exe[1552] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00B90025
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00B80036
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!system 77C293C7 5 Bytes JMP 00B8001B
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00B80000
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00B80FEF
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00B80FAB
.text C:\WINDOWS\system32\svchost.exe[1552] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00B80FD2
.text C:\WINDOWS\system32\svchost.exe[1552] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00B70000
.text C:\WINDOWS\system32\svchost.exe[1640] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00DF0000
.text C:\WINDOWS\system32\svchost.exe[1640] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00DF0FE5
.text C:\WINDOWS\system32\svchost.exe[1640] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00DF001B
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00E30FEF
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00E30053
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00E30F5E
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00E30036
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00E30F79
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00E30F9E
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00E30F28
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00E3007A
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00E30EFC
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00E30F17
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00E300B0
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00E3001B
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00E30FD4
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreatePipe 7C81D83F 1 Byte [E9]
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00E30F43
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00E3000A
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00E30FC3
.text C:\WINDOWS\system32\svchost.exe[1640] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00E30095
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00E20FC3
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00E2005B
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00E20FD4
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00E20FE5
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00E20F9E
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00E20000
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 00E20040
.text C:\WINDOWS\system32\svchost.exe[1640] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00E2002F
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00E10FA1
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!system 77C293C7 5 Bytes JMP 00E1002C
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00E10FC6
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00E10000
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00E1001B
.text C:\WINDOWS\system32\svchost.exe[1640] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00E10FE3
.text C:\WINDOWS\system32\svchost.exe[1640] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00E00000
.text C:\WINDOWS\System32\svchost.exe[1676] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 033A000A
.text C:\WINDOWS\System32\svchost.exe[1676] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 033A0FE5
.text C:\WINDOWS\System32\svchost.exe[1676] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 033A001B
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 038B0000
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 038B0F99
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 038B008E
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 038B0FB6
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 038B0073
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 038B0FDB
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 038B0F66
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 038B0F77
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 038B0F4B
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 038B00E4
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 038B00FF
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 038B0058
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 038B0011
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 038B0F88
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 038B003D
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 038B002C
.text C:\WINDOWS\System32\svchost.exe[1676] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 038B00C9
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 037A0022
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 037A0F80
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 037A0011
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 037A0FDB
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 037A003D
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 037A0000
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 037A0F9B
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [9A, 8B]
.text C:\WINDOWS\System32\svchost.exe[1676] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 037A0FB6
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 033D0FB0
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!system 77C293C7 5 Bytes JMP 033D0FC1
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 033D0FD2
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!_open 77C2F566 5 Bytes JMP 033D0FE3
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 033D0031
.text C:\WINDOWS\System32\svchost.exe[1676] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 033D0000
.text C:\WINDOWS\System32\svchost.exe[1676] WS2_32.dll!socket 71AB4211 5 Bytes JMP 033C0FEF
.text C:\WINDOWS\System32\svchost.exe[1676] WININET.dll!InternetOpenA 3D95D6A8 5 Bytes JMP 033B0FEF
.text C:\WINDOWS\System32\svchost.exe[1676] WININET.dll!InternetOpenW 3D95DB21 5 Bytes JMP 033B0FD4
.text C:\WINDOWS\System32\svchost.exe[1676] WININET.dll!InternetOpenUrlA 3D95F3BC 5 Bytes JMP 033B0FC3
.text C:\WINDOWS\System32\svchost.exe[1676] WININET.dll!InternetOpenUrlW 3D9A6DFF 5 Bytes JMP 033B0FA8
.text C:\WINDOWS\System32\svchost.exe[1732] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 0075000A
.text C:\WINDOWS\System32\svchost.exe[1732] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 0075002F
.text C:\WINDOWS\System32\svchost.exe[1732] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00750FEF
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00790000
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00790F8F
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00790084
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!LoadLibraryExW 7C801AF5 3 Bytes JMP 00790073
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!LoadLibraryExW + 4 7C801AF9 1 Byte [83]
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00790062
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00790FD1
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 007900BA
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00790F7E
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 007900E6
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00790F57
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00790F32
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00790FC0
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 0079001B
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 007900A9
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 0079003D
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 0079002C
.text C:\WINDOWS\System32\svchost.exe[1732] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 007900D5
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00780FCA
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00780F6F
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 0078001B
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 0078000A
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00780036
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00780FEF
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00780F9E
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [98, 88]
.text C:\WINDOWS\System32\svchost.exe[1732] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00780FB9
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00770FAD
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!system 77C293C7 5 Bytes JMP 00770038
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00770FE3
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00770000
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00770FC8
.text C:\WINDOWS\System32\svchost.exe[1732] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00770011
.text C:\WINDOWS\System32\svchost.exe[1732] WS2_32.dll!socket 71AB4211 5 Bytes JMP 00760000
.text C:\WINDOWS\System32\svchost.exe[1768] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00900000
.text C:\WINDOWS\System32\svchost.exe[1768] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 0090002C
.text C:\WINDOWS\System32\svchost.exe[1768] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0090001B
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00BB0000
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00BB00AC
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00BB0FB7
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00BB0091
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00BB0080
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00BB0051
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00BB0F7A
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00BB0F8B
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00BB0F3D
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00BB0F4E
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00BB0F22
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00BB0FD4
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00BB001B
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00BB0F9C
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00BB0040
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00BB0FEF
.text C:\WINDOWS\System32\svchost.exe[1768] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00BB0F69
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00BA0FDB
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00BA0F8D
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00BA0036
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00BA0025
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00BA0F9E
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00BA0000
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00BA0FAF
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [DA, 88]
.text C:\WINDOWS\System32\svchost.exe[1768] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00BA0FCA
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00930049
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!system 77C293C7 5 Bytes JMP 0093002E
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00930FD9
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00930000
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00930FC8
.text C:\WINDOWS\System32\svchost.exe[1768] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00930011
.text C:\WINDOWS\System32\svchost.exe[1768] WININET.dll!InternetOpenA 3D95D6A8 5 Bytes JMP 00910FE5
.text C:\WINDOWS\System32\svchost.exe[1768] WININET.dll!InternetOpenW 3D95DB21 5 Bytes JMP 00910000
.text C:\WINDOWS\System32\svchost.exe[1768] WININET.dll!InternetOpenUrlA 3D95F3BC 5 Bytes JMP 00910FD4
.text C:\WINDOWS\System32\svchost.exe[1768] WININET.dll!InternetOpenUrlW 3D9A6DFF 5 Bytes JMP 00910FAF
.text C:\WINDOWS\System32\svchost.exe[1768] WS2_32.dll!socket 71AB4211 5 Bytes JMP 0092000A
.text C:\WINDOWS\System32\svchost.exe[1828] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00990FEF
.text C:\WINDOWS\System32\svchost.exe[1828] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 0099000A
.text C:\WINDOWS\System32\svchost.exe[1828] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00990FD4
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 009D0000
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 009D0FA5
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 009D009A
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 009D0073
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 009D0062
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 009D0036
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 009D00E3
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 009D00C6
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 009D0F65
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 009D0F76
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 009D0F54
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 009D0047
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 009D0FEF
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 009D00B5
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 009D0025
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 009D0FD4
.text C:\WINDOWS\System32\svchost.exe[1828] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 009D00F4
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 009C0036
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 009C0F9E
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 009C0025
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 009C0FEF
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 009C0FB9
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 009C000A
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegCreateKeyW 77DFBA55 5 Bytes JMP 009C005B
.text C:\WINDOWS\System32\svchost.exe[1828] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 009C0FD4
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 009B0FA6
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!system 77C293C7 5 Bytes JMP 009B0FC1
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 009B0FD2
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!_open 77C2F566 5 Bytes JMP 009B0FEF
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 009B0027
.text C:\WINDOWS\System32\svchost.exe[1828] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 009B0000
.text C:\WINDOWS\System32\svchost.exe[1828] WS2_32.dll!socket 71AB4211 5 Bytes JMP 009A0000
.text C:\WINDOWS\system32\svchost.exe[1928] ntdll.dll!NtCreateFile 7C90D0AE 5 Bytes JMP 00AD0000
.text C:\WINDOWS\system32\svchost.exe[1928] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00AD0011
.text C:\WINDOWS\system32\svchost.exe[1928] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00AD0FDB
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateFileA 7C801A28 5 Bytes JMP 00B00FEF
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 00B00F7E
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00B00073
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!LoadLibraryExW 7C801AF5 5 Bytes JMP 00B00062
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!LoadLibraryExA 7C801D53 5 Bytes JMP 00B00FA5
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00B00FCA
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!GetStartupInfoW 7C801E54 5 Bytes JMP 00B0008E
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!GetStartupInfoA 7C801EF2 5 Bytes JMP 00B00F48
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 00B000D5
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00B000BA
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!GetProcAddress 7C80AE40 5 Bytes JMP 00B000E6
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00B00051
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateFileW 7C810800 5 Bytes JMP 00B00000
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreatePipe 7C81D83F 5 Bytes JMP 00B00F63
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateNamedPipeW 7C82F0DD 5 Bytes JMP 00B00036
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!CreateNamedPipeA 7C860CDC 5 Bytes JMP 00B0001B
.text C:\WINDOWS\system32\svchost.exe[1928] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00B000A9
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegOpenKeyExW 77DD6AAF 5 Bytes JMP 00AF002C
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegCreateKeyExW 77DD776C 5 Bytes JMP 00AF0F94
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegOpenKeyExA 77DD7852 5 Bytes JMP 00AF0011
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegOpenKeyW 77DD7946 5 Bytes JMP 00AF0FDB
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegCreateKeyExA 77DDE9F4 5 Bytes JMP 00AF0FA5
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegOpenKeyA 77DDEFC8 5 Bytes JMP 00AF0000
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegCreateKeyW 77DFBA55 2 Bytes JMP 00AF0FB6
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegCreateKeyW + 3 77DFBA58 2 Bytes [CF, 88]
.text C:\WINDOWS\system32\svchost.exe[1928] ADVAPI32.dll!RegCreateKeyA 77DFBCF3 5 Bytes JMP 00AF003D
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!_wsystem 77C2931E 5 Bytes JMP 00AE0FB9
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!system 77C293C7 5 Bytes JMP 00AE004E
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!_creat 77C2D40F 5 Bytes JMP 00AE0FDE
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!_open 77C2F566 5 Bytes JMP 00AE000C
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!_wcreat 77C2FC9B 5 Bytes JMP 00AE0033
.text C:\WINDOWS\system32\svchost.exe[1928] msvcrt.dll!_wopen 77C30055 5 Bytes JMP 00AE0FEF

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\WINDOWS\system32\mfevtps.exe[200] @ C:\WINDOWS\system32\CRYPT32.dll [ADVAPI32.dll!RegQueryValueExW] [0040A4B0] C:\WINDOWS\system32\mfevtps.exe (McAfee Process Validation Service/McAfee, Inc.)
IAT C:\WINDOWS\system32\mfevtps.exe[200] @ C:\WINDOWS\system32\CRYPT32.dll [KERNEL32.dll!LoadLibraryA] [0040A510] C:\WINDOWS\system32\mfevtps.exe (McAfee Process Validation Service/McAfee, Inc.)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Ntfs \Ntfs MOBK.sys (Mozy Change Monitor Filter Driver/Mozy, Inc.)
AttachedDevice \Driver\Tcpip \Device\Ip mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp mfetdi2k.sys (Anti-Virus Mini-Firewall Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat mfehidk.sys (McAfee Link Driver/McAfee, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat MOBK.sys (Mozy Change Monitor Filter Driver/Mozy, Inc.)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB55913$\2534257307 0 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\bckfg.tmp 840 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\cfg.ini 192 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\kwrd.dll 208896 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\L 0 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\L\kuevnoyw 138496 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\U 0 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\U\00000002.@ 209920 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\U\80000000.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB55913$\2534257307\U\80000032.@ 71168 bytes
File C:\WINDOWS\$NtUninstallKB55913$\559873338 0 bytes

---- EOF - GMER 1.0.15 ----

MBAM came up with 0 detected threats,so I didn't include it to save space.

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 08 January 2012 - 07:23 PM

We have several issues there, but before we start fixing them I'd like to see one more log.

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
Click the "Scan" button to start scan.
On completion of the scan click "Save log", save it to your desktop and post in your next reply.

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 09 January 2012 - 12:44 AM

Oh Lord,that isn't good.
I appreciate you reading through all that,you're the man.

aswMBR version 0.9.9.1297 Copyright© 2011 AVAST Software
Run date: 2012-01-08 22:47:03
-----------------------------
22:47:03.531 OS Version: Windows 5.1.2600 Service Pack 3
22:47:03.531 Number of processors: 1 586 0xA00
22:47:03.531 ComputerName: YOUR-PL0BMT21N9 UserName: Lee
22:47:20.609 Initialize success
22:50:49.609 AVAST engine defs: 12010801
22:52:02.312 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
22:52:02.312 Disk 0 Vendor: WDC_WD800EB-00DJF0 77.07W77 Size: 76319MB BusType: 3
22:52:02.437 Disk 0 MBR read successfully
22:52:02.453 Disk 0 MBR scan
22:52:04.218 Disk 0 Windows XP default MBR code
22:52:04.281 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 76316 MB offset 63
22:52:05.828 Disk 0 scanning sectors +156296385
22:52:08.343 Disk 0 scanning C:\WINDOWS\system32\drivers
22:54:01.687 Service scanning
22:54:08.015 Modules scanning
22:55:34.421 Disk 0 trace - called modules:
22:55:34.484 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys viaide.sys PCIIDEX.SYS
22:55:34.484 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8577c370]
22:55:34.562 3 CLASSPNP.SYS[f76ebfd7] -> nt!IofCallDriver -> \Device\0000006f[0x8572bf18]
22:55:34.562 5 ACPI.sys[f7662620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x857dcd98]
22:55:36.109 AVAST engine scan C:\WINDOWS
22:57:18.875 AVAST engine scan C:\WINDOWS\system32
23:07:52.984 AVAST engine scan C:\WINDOWS\system32\drivers
23:09:25.500 AVAST engine scan C:\Documents and Settings\Lee
23:38:51.906 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Lee\My Documents\MBR.dat"
23:38:52.578 The log file has been saved successfully to "C:\Documents and Settings\Lee\My Documents\aswMBR.txt"


It just stopped,so I assumed it was done at this point.

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 09 January 2012 - 01:02 AM

That looks good.

Go Start>Run, type in:
services.msc
Click OK.

Services window will open.

Find following services:
SR service
Cryptograhic Service

Right click on each one, click "Properties" and under "Startup type" select "Automatic" from drop-down menu.

Restart computer.
Post new FSS log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 09 January 2012 - 05:34 PM

Farbar Service Scanner
Ran by Lee (administrator) on 09-01-2012 at 16:31:09
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============

Windows Update:
===========
BITS Service is not running. Checking service configuration:
The start type of BITS service is set to Demand. The default start type is Auto.
The ImagePath of BITS service is OK.
The ServiceDll of BITS: "C:\WINDOWS\system32\qmgr.dll".


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) mfetdi2k(10) NetBT(5) NwlnkIpx(8) NwlnkNb(9) PSched(7) Tcpip(3)
0x15000000040000000100000002000000030000000A000000560000000B0000000C0000000D0000000E0000000F00000010000000110000001200000013000000140000000500000006000000070000000800000009000000


**** End of log ****

My system restore has been off.A friend told me to cut it off because of the rootkit. Was I supposed to click start on anything?

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 09 January 2012 - 05:56 PM

System restore seems to be working.

What are the current issues?

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click on List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    NOTE. If Eset doesn't find any threats it'll NOT produce any log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 10 January 2012 - 12:26 AM

Well I ran Eset and everything came up clean,but my old man wouldn't let me turn Mcafee off,so I don't know if it's completely accurate. He loves Mcafee and got pretty agitated when i turned it off to run GMER the other day.

My computer is performing quite well actually. Outlook Express has been loading a little bit slower,and cpu usage shoots up sometimes,but it's nothing what it used to be(used to shoot up to 100 alot,but I removed some adware). It actually sits at 0 sometimes. It's an old computer,so I don't expect it to be perfect. 03 E Machines. I was just really worried about those hidden objects Avira found after it removed the rootkit.The whole rotkit thing just really scared me. Avg,MBAM,Mcafee,Spybot,and SAS all missed it.

What are the several issues you spoke of earlier?

I appreciate your help,Broni. You're a nice guy.

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 10 January 2012 - 11:02 AM

Good news :)

Yeah we still have to fix couple more things.

Go Start>Run, type in:
services.msc
Click OK.

Find Background Intelligent Transfer Service (BITS).
Right click on it, click "Properties" and under "Startup type" select "Automatic" from drop-down menu.

Restart computer.
Post new FSS log.

Then, we have "hosts" file missing.

Open Notepad.
Paste the following text into it:

# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
#  	102.54.94.97 	rhino.acme.com      	# source server
#   	38.25.63.10 	x.acme.com          	# x client host

127.0.0.1   	localhost

Go File>Save As and...

1. Name the file hosts. (no extension; make sure there is just a "dot" at the end <--- VERY IMPORTANT!)
2. Make sure, "Save as type:" is set to "All Files (*.*)
3. Make sure the file is saved to C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder

Posted Image

=======================================================================

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

64-bit users go HERE
  • Double-click SystemLook.exe to run it.
  • Vista\Win 7 users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    :dir
    C:\WINDOWS\SYSTEM32\DRIVERS\ETC
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

======================================================================

Uninstall Eusing Free Registry Cleaner.
Registry cleaners/optimizers are not recommended for several reasons:

  • Registry cleaners are extremely powerful applications that can damage the registry by using aggressive cleaning routines and cause your computer to become unbootable.

    The Windows registry is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component because it is where Windows "remembers" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable. For a more detailed explanation, read Understanding The Registry.
  • Not all registry cleaners are created equal. There are a number of them available but they do not all work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad entry". One cleaner may find entries on your system that will not cause problems when removed, another may not find the same entries, and still another may want to remove entries required for a program to work.
  • Not all registry cleaners create a backup of the registry before making changes. If the changes prevent the system from booting up, then there is no backup available to restore it in order to regain functionality. A backup of the registry is essential BEFORE making any changes to the registry.
  • Improperly removing registry entries can hamper malware disinfection and make the removal process more difficult if your computer becomes infected. For example, removing malware related registry entries before the infection is properly identified can contribute to system instability and even make the malware undetectable to removal tools.
  • The usefulness of cleaning the registry is highly overrated and can be dangerous. In most cases, using a cleaner to remove obsolete, invalid, and erroneous entries does not affect system performance but it can result in "unpredictable results".
Unless you have a particular problem that requires a registry edit to correct it, I would suggest you leave the registry alone. Using registry cleaning tools unnecessarily or incorrectly could lead to disastrous effects on your operating system such as preventing it from ever starting again. For routine use, the benefits to your computer are negligible while the potential risks are great.


=========================================================================

Update Adobe Flash Player
Download the Latest Adobe Flash for Firefox and IE Without Any Extras: http://www.404techsupport.com/2010/04/27/download-the-latest-adobe-flash-for-firefox-and-ie-without-any-extras/

==========================================================================

1. Update your Java version here: http://www.java.com/en/download/installed.jsp

Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

2. Now, we need to remove old Java version and its remnants...

Download JavaRa to your desktop and unzip it to its own folder
  • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.
  • Do NOT post JavaRa log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 10 January 2012 - 08:35 PM

Well, I updated the flash player,but Java has an error message.

Error
Installer:Wrapper.Create file failed with error 5: Access is denied.

It gets done with the installation,and then that message pops up.
I tried downloading it twice.I didn't go ahead with uninstalling the old java,I wanted to check with you first since downloading the update didn't go smooth.

I uninstalled Eusing.Thanks for the heads up.

What about the hidden Avira objects that I mentioned in the first post? is there any signs of a rootkit still being on my system?

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 10 January 2012 - 11:10 PM

No. I don't see any rootkits there.

As for Java....
Run JavaRa first.
Then go here: http://www.java.com/en/download/manual.jsp and download standalone installer - Windows Offline
See if it'll install.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 11 January 2012 - 01:25 PM

Dude,The first part of your post at 1102 just came up. I totally skipped all that.Will do it and get back to you. Thanks for all the help once again

#14 Leethal

Leethal
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:01:02 AM

Posted 11 January 2012 - 04:40 PM

Here are the logs you requested. Sorry for the delay.

SystemLook 30.07.11 by jpshortstuff
Log created at 15:36 on 11/01/2012 by Lee
Administrator - Elevation successful

========== dir ==========

C:\WINDOWS\SYSTEM32\DRIVERS\ETC - Parameters: "(none)"

---Files---
lmhosts.sam --a---- 3683 bytes [17:36 21/11/2003] [12:00 31/03/2003]
networks --a---- 407 bytes [17:36 21/11/2003] [12:00 31/03/2003]
protocol --a---- 799 bytes [17:36 21/11/2003] [12:00 31/03/2003]
services --a---- 7116 bytes [17:36 21/11/2003] [12:00 31/03/2003]

---Folders---
None found.

-= EOF =-

Farbar Service Scanner
Ran by Lee (administrator) on 11-01-2012 at 15:25:33
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============

Windows Update:
===========

File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) mfetdi2k(10) NetBT(5) NwlnkIpx(8) NwlnkNb(9) PSched(7) Tcpip(3)
0x15000000040000000100000002000000030000000A000000560000000B0000000C0000000D0000000E0000000F00000010000000110000001200000013000000140000000500000006000000070000000800000009000000


**** End of log ****

#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:02 PM

Posted 11 January 2012 - 04:43 PM

FSS log looks good.
See if Windows updates work fine.

Your "hosts" file fix was incorrect.
Please redo.
Post new System Look log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users