Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

RKUnhooker says possible Rootkit activity - machine REALLY slow


  • This topic is locked This topic is locked
47 replies to this topic

#1 Dr. Riddim

Dr. Riddim

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 19 June 2013 - 05:01 AM

My PC has been acting strangely lately - taking an extremely long time to boot, slow as molasses in operation, and generally sluggish.  Right-clicking on an item, for example, takes anywhere from 5 to 50 seconds for the context menu to pop up.  It hasn't always acted like this.  We've been using a thumb drive for file transfers from my wife's work PC, which is on a network which just yesterday discovered it has 2 computers infected with the JS/Kryptik Trojan.

 

Time to look into this a little deeper.  In cruising through the forum it seemed as though diagnostics would be a good place to start, so I ran defogger, DDS, and RKUnhooker.  RKU's report indicated possible rootkit activity, so that's why I'm here.  I have no idea what the identity of the infection might be, but here is the DDS log (the RKU log is available if you need it):

 

**************************************************************************

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.21.2
Run by Owner at 5:18:19 on 2013-06-19
Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.1406.388 [GMT -4:00]
.
AV: Panda Cloud Antivirus *Enabled/Updated* {5AD27692-540A-464E-B625-78275FA38393}
FW: Cloud Antivirus Firewall *Disabled*
FW: COMODO Firewall *Disabled*
.
============== Running Processes ================
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\Documents and Settings\All Users\Application Data\EPSON\EPW!3 SSRP\E_S40RP7.EXE
C:\Program Files\Java\jre7\bin\jqs.exe
C:\Program Files\Microsoft LifeCam\MSCamS32.exe
C:\Program Files\Panda Security\Panda Cloud Antivirus\PSANHost.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\Program Files\Panda Security\Panda Cloud Antivirus\PSUAService.exe
C:\Program Files\TomTom HOME 2\TomTomHOMEService.exe
C:\Program Files\NETGEAR\NETGEAR Storage Central Manager Utility\Z-SANService.exe
c:\Program Files\Zune\ZuneBusEnum.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
C:\Program Files\Acronis\TrueImageHome\TrueImageMonitor.exe
C:\Program Files\Canon\Canon IJ Network Scan Utility\CNMNSUT.exe
C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Panda Security\Panda Cloud Antivirus\PSUAMain.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Documents and Settings\Owner\Application Data\SanDisk\Sansa Updater\SansaDispatch.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\TomTom HOME 2\TomTomHOMERunner.exe
C:\Program Files\Mozilla Thunderbird\thunderbird.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [SansaDispatch] c:\documents and settings\owner\application data\sandisk\sansa updater\SansaDispatch.exe
uRun: [Listary] "c:\program files\listary\Listary.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [TomTomHOME.exe] "c:\program files\tomtom home 2\TomTomHOMERunner.exe"
mRun: [WinPatrol] c:\program files\billp studios\winpatrol\winpatrol.exe -expressboot
mRun: [TrueImageMonitor.exe] c:\program files\acronis\trueimagehome\TrueImageMonitor.exe
mRun: [Recguard] c:\windows\sminst\RECGUARD.EXE
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [LifeCam] "c:\program files\microsoft lifecam\LifeExp.exe"
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [IJNetworkScanUtility] c:\program files\canon\canon ij network scan utility\CNMNSUT.exe
mRun: [COMODO Internet Security] "c:\program files\comodo\comodo internet security\cfp.exe" -h
mRun: [Acronis Scheduler2 Service] "c:\program files\common files\acronis\schedule2\schedhlp.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [PSUAMain] "c:\program files\panda security\panda cloud antivirus\PSUAMain.exe" /LaunchSysTray
mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\ipoint.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\eventr~1.lnk - c:\program files\the print shop 23.1\Remind.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: microsoft.com
Trusted Zone: microsoft.com
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {49312E18-AA92-4CC2-BB97-55DEA7BCADD6} - hxxps://support.dell.com/systemprofiler/SysProExe.CAB
DPF: {4B54A9DE-EF1C-4EBE-A328-7C28EA3B433A} - hxxp://quickscan.bitdefender.com/qsax/qsax.cab
DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} - hxxp://download.bitdefender.com/resources/scanner/sources/en/scan8/oscan8.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1259129157984
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1292832461265
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {9191F686-7F0A-441D-8A98-2FE3AC1BD913} - hxxp://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com//activex/ractrl.cab?lmi=1007
TCP: Interfaces\{90C09548-0357-4869-A98E-5A5FE047F3F2} : NameServer = 65.32.5.111,65.32.5.112
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Notify: !SASWinLogon - <no file>
Notify: AtiExtEvent - <no file>
Notify: crypt32chain - <no file>
Notify: cryptnet - <no file>
Notify: cscdll - <no file>
Notify: dimsntfy - <no file>
Notify: ScCertProp - <no file>
Notify: Schedule - <no file>
Notify: sclgntfy - <no file>
Notify: SensLogn - <no file>
Notify: termsrv - <no file>
Notify: wlballoon - <no file>
AppInit_DLLs=   c:\windows\system32\guard32.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\program files\superantispyware\SASSEH.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\owner\application data\mozilla\firefox\profiles\iq8equxa.default\
FF - prefs.js: browser.search.selectedEngine - Wikipedia (en)
FF - prefs.js: browser.startup.homepage - hxxp://duckduckgo.com
FF - plugin: c:\documents and settings\owner\application data\mozilla\firefox\profiles\iq8equxa.default\extensions\logmeinclient@logmein.com\plugins\npLMI64.dll
FF - plugin: c:\documents and settings\owner\application data\mozilla\firefox\profiles\iq8equxa.default\extensions\logmeinclient@logmein.com\plugins\npRACtrl.dll
FF - plugin: c:\program files\adobe\reader 11.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\canon\easy-photoprint ex\NPEZFFPI.DLL
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\microsoft silverlight\5.1.20125.0\npctrlui.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_7_700_224.dll
.
============= SERVICES / DRIVERS ===============
.
R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [2011-8-2 28552]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdGuard.sys [2010-9-11 497952]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [2010-9-11 32640]
R1 NNSALPC;NNSAlpc;c:\windows\system32\drivers\NNSAlpc.sys [2012-11-26 82728]
R1 NNSHTTP;NNSHttp;c:\windows\system32\drivers\NNSHttp.sys [2012-11-26 119080]
R1 NNSHTTPS;NNSHttps;c:\windows\system32\drivers\NNSHttps.sys [2013-1-9 95584]
R1 NNSIDS;NNSids;c:\windows\system32\drivers\NNSIds.sys [2012-11-26 123944]
R1 NNSPICC;NNSPicc;c:\windows\system32\drivers\NNSpicc.sys [2012-11-26 94632]
R1 NNSPOP3;NNSPop3;c:\windows\system32\drivers\NNSPop3.sys [2012-11-26 105640]
R1 NNSPROT;NNSProt;c:\windows\system32\drivers\NNSProt.sys [2012-11-26 286888]
R1 NNSPRV;NNSPrv;c:\windows\system32\drivers\NNSPrv.sys [2012-11-26 159528]
R1 NNSSMTP;NNSSmtp;c:\windows\system32\drivers\NNSSmtp.sys [2012-11-26 108200]
R1 NNSSTRM;NNSStrm;c:\windows\system32\drivers\NNSStrm.sys [2012-11-28 218024]
R1 NNSTLSC;NNSTlsc;c:\windows\system32\drivers\NNStlsc.sys [2012-11-26 93096]
R1 PSINKNC;PSINKnc;c:\windows\system32\drivers\PSINKNC.sys [2012-11-9 178728]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2012-7-11 116608]
R2 cmdAgent;COMODO Internet Security Helper Service;c:\program files\comodo\comodo internet security\cmdagent.exe [2010-9-11 1990464]
R2 NanoServiceMain;Panda Cloud Antivirus Service;c:\program files\panda security\panda cloud antivirus\PSANHost.exe [2013-1-27 140512]
R2 PSINAflt;PSINAflt;c:\windows\system32\drivers\PSINAflt.sys [2012-11-9 149288]
R2 PSINFile;PSINFile;c:\windows\system32\drivers\PSINFile.sys [2012-11-9 102184]
R2 PSINProc;PSINProc;c:\windows\system32\drivers\PSINProc.sys [2012-11-9 114216]
R2 PSINProt;PSINProt;c:\windows\system32\drivers\PSINProt.sys [2012-11-9 123560]
R2 PSUAService;Panda Product Service;c:\program files\panda security\panda cloud antivirus\PSUAService.exe [2013-1-27 37088]
R2 SFSZ;DataPlow SFS for Zetera Storage Devices;c:\windows\system32\drivers\sfsz.sys [2010-10-10 345984]
R2 TomTomHOMEService;TomTomHOMEService;c:\program files\tomtom home 2\TomTomHOMEService.exe [2013-3-22 93072]
R2 Z-SANService;Z-SAN Service;c:\program files\netgear\netgear storage central manager utility\Z-SANService.exe [2010-10-10 376891]
R3 MSHUSBVideo;NX6000/NX3000/VX2000/VX5000/VX5500/VX7000/Cinema Filter Driver;c:\windows\system32\drivers\nx6000.sys [2011-4-26 30576]
R3 ZetBus;Zetera Virtual Bus;c:\windows\system32\drivers\ZetBus.sys [2010-10-10 15488]
S0 ZetSFD;ZetSFD;c:\windows\system32\drivers\ZetSFD.sys [2010-10-10 12800]
S3 NNSNAHS;Network Activity Hook Server Service;c:\windows\system32\drivers\NNSNAHS.sys [2012-10-22 38824]
S3 vdrive;vdrive;c:\windows\system32\drivers\vdrive.sys --> c:\windows\system32\drivers\vdrive.sys [?]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-5-6 11520]
S3 ZetMPD;ZetMPD;c:\windows\system32\drivers\ZetMPD.sys [2010-10-10 5120]
S4 NNSPIHS;NNSPihs;c:\windows\system32\drivers\NNSpihs.sys [2012-11-26 51496]
.
=============== Created Last 30 ================
.
2013-06-18 19:40:52    46672    ----a-w-    c:\windows\system32\drivers\PSKMAD.sys
.
==================== Find3M  ====================
.
2013-06-11 22:40:14    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-11 22:40:14    692104    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-05-07 22:30:06    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-05-07 22:30:05    43520    ------w-    c:\windows\system32\licmgr10.dll
2013-05-07 22:30:05    1469440    ------w-    c:\windows\system32\inetcpl.cpl
2013-05-07 21:53:29    385024    ------w-    c:\windows\system32\html.iec
2013-05-03 01:26:26    2193536    ----a-w-    c:\windows\system32\ntoskrnl.exe
2013-05-03 00:38:18    2070144    ----a-w-    c:\windows\system32\ntkrnlpa.exe
2013-04-10 01:31:19    1876352    ----a-w-    c:\windows\system32\win32k.sys
2013-04-04 09:35:08    94112    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
.
============= FINISH:  5:25:57.79 ===============
 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 19 June 2013 - 07:00 AM

Hi there,
my name is Marius and I will be assisting you with your Malware related problems.

Before we move on, please read the following points carefully.

  • First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while you are follow my instructions, Stop there and tell me the exact nature of your problem.
  • Do not run any other scans without instruction or Add/ Remove Software unless I tell you to do so. This would change the output of our tools and could be confusing for me.
  • Post all Logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.
  • If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.
  • Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.
  • My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.

 

 

Please post up the RKUnhooker log as well


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#3 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 22 June 2013 - 03:12 AM

Hello, Marius, thank you for replying so quickly.  I wasn't notified that anyone had replied to my post, or I would have replied sooner.

 

As requested, here is the RK Unhooker report:

 

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0xB97EA000 C:\WINDOWS\system32\drivers\ALCXWDM.SYS 2297856 bytes (Realtek Semiconductor Corp., Realtek AC'97 Audio Driver (WDM))
0xBF0B0000 C:\WINDOWS\System32\ati3duag.dll 2297856 bytes (ATI Technologies Inc. , ati3duag.dll)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2070144 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2070144 bytes
0x804D7000 RAW 2070144 bytes
0x804D7000 WMIxWDM 2070144 bytes
0xBF800000 Win32k 1880064 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1880064 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xB9A96000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 1069056 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xBF2E1000 C:\WINDOWS\System32\ativvaxx.dll 610304 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0xB9D3D000 timntr.sys 589824 bytes (Acronis, Acronis Backup Archive Explorer)
0xB9E10000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xB14A3000 C:\WINDOWS\System32\DRIVERS\cmdguard.sys 487424 bytes (COMODO, COMODO Internet Security Sandbox Driver)
0xB9604000 C:\WINDOWS\System32\Drivers\wdf01000.sys 462848 bytes (Microsoft Corporation, Kernel Mode Driver Framework Runtime)
0xB0FB3000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xB9675000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xB139F000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xAE7B0000 C:\WINDOWS\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xAE518000 C:\WINDOWS\system32\drivers\sfsz.sys 348160 bytes (DataPlow, Incorporated, DataPlow SAN File System (SFS))
0xBF376000 C:\WINDOWS\System32\ATMFD.DLL 290816 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xB1122000 C:\WINDOWS\system32\DRIVERS\NNSProt.sys 282624 bytes (Panda Security, S.L., Network Protector)
0xBF012000 C:\WINDOWS\System32\ati2dvag.dll 241664 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xB11F6000 C:\WINDOWS\system32\DRIVERS\NNSStrm.sys 212992 bytes (Panda Security, S.L., Streamer)
0xBF04D000 C:\WINDOWS\System32\ati2cqag.dll 204800 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xBF07F000 C:\WINDOWS\System32\atikvmag.dll 200704 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xB9F79000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xAE920000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB9DCD000 C:\WINDOWS\System32\DRIVERS\NDIS.SYS 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB9ED4000 dac2w2k.sys 180224 bytes (Mylex Corporation, Mylex Disk Array Controller Driver)
0xB12E2000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB12B8000 C:\WINDOWS\system32\DRIVERS\psinknc.sys 172032 bytes (Panda Security, S.L., PSINKNC Kernel Controller for XP32)
0xB1351000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xB9D15000 snapman.sys 163840 bytes (Acronis, Acronis Snapshot API)
0xB1379000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xB1167000 C:\WINDOWS\system32\DRIVERS\NNSPrv.sys 155648 bytes (Panda Security, S.L., Network Provider)
0xB0EC7000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xB97C6000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB9A3B000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB9A5F000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xAEC24000 C:\WINDOWS\system32\DRIVERS\PSINAflt.sys 143360 bytes (Panda Security, S.L., PSINAflt Filter Driver for  XP32)
0xB132F000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xB130D000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806D1000 ACPI_HAL 131840 bytes
0x806D1000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xB9EB4000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xB9A1B000 C:\WINDOWS\system32\DRIVERS\Rtnicxp.sys 131072 bytes (Realtek Semiconductor Corporation                           , Realtek 10/100/1000 NDIS 5.1 Driver                         )
0xB9F49000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xB107A000 C:\WINDOWS\System32\Drivers\usbvideo.sys 122880 bytes (Microsoft Corporation, USB Video Class Driver)
0xB10AE000 C:\WINDOWS\system32\DRIVERS\NNSIds.sys 118784 bytes (Panda Security, S.L., Intrusion Detection System)
0xAEC07000 C:\WINDOWS\system32\DRIVERS\PSINProt.sys 118784 bytes (Panda Security, S.L., PSINProt for XP32)
0xB105E000 C:\WINDOWS\system32\DRIVERS\NNSHttp.sys 114688 bytes (Panda Security, S.L., Http Parser)
0xAEBAC000 C:\WINDOWS\system32\DRIVERS\PSINProc.sys 110592 bytes (Panda Security, S.L., PSINProc Filter Driver for for XP32)
0xB9CFB000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB9F00000 adpu160m.sys 102400 bytes (Microsoft Corporation, Adaptec Ultra160 SCSI miniport)
0xB10E1000 C:\WINDOWS\system32\DRIVERS\NNSPop3.sys 102400 bytes (Panda Security, S.L., Pop3 Parser)
0xB118D000 C:\WINDOWS\system32\DRIVERS\NNSSmtp.sys 102400 bytes (Panda Security, S.L., Smtp Parser)
0xB9F19000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xB0EAF000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xAEA65000 C:\WINDOWS\system32\DRIVERS\nbf.sys 98304 bytes (Microsoft Corporation, NetBEUI Frames Protocol Driver)
0xAEBC7000 C:\WINDOWS\system32\DRIVERS\PSINFile.sys 98304 bytes (Panda Security, S.L., PSINFile Filter Driver for XP32)
0xB9F31000 C:\WINDOWS\system32\DRIVERS\SCSIPORT.SYS 98304 bytes (Microsoft Corporation, SCSI Port Driver)
0xB9E9D000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB96FB000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xAEB95000 C:\WINDOWS\system32\DRIVERS\WudfPf.sys 94208 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0xB9DFA000 inspect.sys 90112 bytes (COMODO, COMODO Internet Security Firewall Driver)
0xB1098000 C:\WINDOWS\system32\DRIVERS\NNSHttps.sys 90112 bytes (Panda Security, S.L., Https Parser)
0xB10CB000 C:\WINDOWS\system32\DRIVERS\NNSPicc.sys 90112 bytes (Panda Security, S.L., Process Info Colorizer Client)
0xB122A000 C:\WINDOWS\system32\DRIVERS\NNSTlsc.sys 90112 bytes (Panda Security, S.L., Transport Layer Session Colorizer)
0xAE683000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xB97B2000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xB9A82000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xB13F8000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xB1023000 C:\WINDOWS\system32\DRIVERS\NNSAlpc.sys 77824 bytes (Panda Security, S.L., Application Layer Protocol Colorizer)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xB9F68000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xAE995000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xBA238000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xBA258000 C:\WINDOWS\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xBA198000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xBA278000 C:\WINDOWS\system32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xB9C8B000 C:\WINDOWS\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xBA268000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xBA248000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xAE728000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xB9782000 C:\WINDOWS\system32\drivers\usbaudio.sys 61440 bytes (Microsoft Corporation, USB Audio Class Driver)
0xB9CDB000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xBA1A8000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xBA108000 aic78u2.sys 57344 bytes (Microsoft Corporation, Adaptec Ultra2 SCSI miniport)
0xBA0D8000 aic78xx.sys 57344 bytes (Microsoft Corporation, Adaptec Ultra SCSI miniport)
0xBA2F8000 C:\WINDOWS\system32\DRIVERS\WDFLDR.SYS 57344 bytes (Microsoft Corporation, Kernel Mode Driver Framework Loader)
0xBA218000 C:\WINDOWS\system32\DRIVERS\AmdPPM.sys 53248 bytes (Advanced Micro Devices, AMD Processor Driver)
0xBA168000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xBA288000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xBA0C8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xBA2B8000 C:\WINDOWS\System32\Drivers\pcouffin.sys 49152 bytes (VSO Software, low level access layer for CD/DVD/BD devices)
0xBA148000 ql12160.sys 49152 bytes (QLogic Corporation, Miniport Driver for QLogic ISP PCI Adapters)
0xBA138000 ql1280.sys 49152 bytes (QLogic Corporation, Miniport Driver for QLogic ISP PCI Adapters)
0xBA2A8000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xBA1B8000 agp440.sys 45056 bytes (Microsoft Corporation, 440 NT AGP Filter)
0xBA1E8000 agpCPQ.sys 45056 bytes (Microsoft Corporation, CompatNT AGP Filter)
0xBA1C8000 alim1541.sys 45056 bytes (Microsoft Corporation, ALi M1541 NT AGP Filter)
0xBA1D8000 amdagp.sys 45056 bytes (Advanced Micro Devices, Inc., AMD Win2000 AGP Filter)
0xB9772000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xBA228000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xBA0B8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xBA298000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xBA178000 viaagp.sys 45056 bytes (Microsoft Corporation, VIA NT AGP Filter)
0xBA2D8000 C:\WINDOWS\system32\drivers\WmXlCore.sys 45056 bytes (Logitech Inc., Logitech WingMan Translation Driver)
0xBA2E8000 C:\WINDOWS\system32\DRIVERS\zumbus.sys 45056 bytes (Microsoft Corporation, Zune User-Mode Bus Enumerator)
0xBA0A8000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xB9CEB000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xB9792000 C:\WINDOWS\System32\Drivers\nx6000.sys 40960 bytes (Microsoft Corporation, Microsoft® LifeCam NX-6000 driver)
0xAE653000 C:\WINDOWS\System32\DRIVERS\PSKMAD.sys 40960 bytes (Panda Security, S.L., Panda Kernel Memory Access Driver (x86))
0xBA128000 ql1080.sys 40960 bytes (QLogic Corporation, Miniport Driver for QLogic ISP PCI Adapters)
0xBA0F8000 ql1240.sys 40960 bytes (Microsoft Corporation, QLogic ISP PCI Adapters)
0xAE8A0000 C:\WINDOWS\system32\DRIVERS\secdrv.sys 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0xBA188000 sisagp.sys 40960 bytes (Silicon Integrated Systems Corporation, SiS NT AGP Filter)
0xBA2C8000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xBA158000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xB9732000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xB9CAB000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xB9C7B000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xAD6C0000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xB9722000 C:\WINDOWS\system32\DRIVERS\point32.sys 36864 bytes (Microsoft Corporation, Point32k.sys)
0xBA0E8000 ql10wnt.sys 36864 bytes (Microsoft Corporation, Miniport Driver for QLogic ISP PCI Adapters)
0xBA118000 ultra.sys 36864 bytes (Promise Technology, Inc., Promise Ultra66 Miniport Driver)
0xB9C9B000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xBA420000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xBA360000 symc8xx.sys 32768 bytes (LSI Logic, Symbios 8XX SCSI Miniport Driver)
0xBA370000 sym_u3.sys 32768 bytes (LSI Logic, Symbios Ultra3 SCSI Miniport Driver)
0xBA3E8000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xBA430000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xBA348000 asc.sys 28672 bytes (Advanced System Products, Inc., AdvanSys SCSI Controller Driver)
0xBA458000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xBA3F8000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xBA398000 hpn.sys 28672 bytes (Microsoft Corporation, NetRAID-4M Miniport Driver)
0xB145B000 C:\DOCUME~1\Owner\LOCALS~1\Temp\mbr.sys 28672 bytes
0xBA328000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xBA390000 perc2.sys 28672 bytes (Microsoft Corporation, PERC 2 Miniport Driver)
0xBA4A8000 C:\WINDOWS\System32\Drivers\sunkfilt.sys 28672 bytes (Alcor Micro Corp., SunkFilt)
0xBA368000 sym_hi.sys 28672 bytes (LSI Logic, Symbios Hi-Perf SCSI Miniport Driver)
0xBA3D8000 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xBA378000 ABP480N5.SYS 24576 bytes (Microsoft Corporation, AdvanSys SCSI Controller Driver)
0xBA380000 asc3350p.sys 24576 bytes (Microsoft Corporation, AdvanSys SCSI Card Driver)
0xBA440000 C:\WINDOWS\System32\DRIVERS\cmdhlp.sys 24576 bytes (COMODO, COMODO Internet Security Helper Driver)
0xBA490000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xBA498000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xBA338000 pavboot.sys 24576 bytes (Panda Security, S.L., Panda Boot Driver)
0xBA460000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xBA400000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xBA388000 dpti2o.sys 20480 bytes (Microsoft Corporation, DPT SmartRAID miniport)
0xBA358000 i2omp.sys 20480 bytes (Microsoft Corporation, I2O Miniport Driver)
0xBA350000 mraid35x.sys 20480 bytes (American Megatrends Inc., MegaRAID RAID Controller Driver for Windows Whistler 32)
0xBA410000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xBA330000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xBA478000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xBA488000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xBA340000 sparrow.sys 20480 bytes (Adaptec, Inc., Adaptec AIC-6x60 series SCSI miniport)
0xBA3A0000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xBA428000 C:\WINDOWS\system32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0xBA418000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xBA4C0000 aha154x.sys 16384 bytes (Microsoft Corporation, Adaptec AHA-154x series SCSI miniport)
0xBA4D0000 asc3550.sys 16384 bytes (Advanced System Products, Inc., AdvanSys Ultra-Wide PCI SCSI Driver)
0xB11C6000 C:\WINDOWS\System32\drivers\aspi32.sys 16384 bytes (Adaptec, ASPI for WIN32 Kernel Driver)
0xBA4D8000 cbidf2k.sys 16384 bytes (Microsoft Corporation, CardBus/PCMCIA IDE Miniport Driver)
0xBA4BC000 cpqarray.sys 16384 bytes (Microsoft Corporation, Compaq Drive Array Controllers SCSI Miniport Driver)
0xBA4C8000 dac960nt.sys 16384 bytes (Microsoft Corporation, Mylex Disk Array Controller Driver)
0xBA4D4000 ini910u.sys 16384 bytes (Microsoft Corporation, INITIO ini910u SCSI miniport)
0xB0EF7000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB9BDF000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xAEADD000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xB9BFF000 C:\WINDOWS\system32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xBA4C4000 symc810.sys 16384 bytes (Symbios Logic Inc., Symbios Logic Inc. SCSI Miniport Driver)
0xB9BCB000 C:\WINDOWS\system32\DRIVERS\ZetBus.sys 16384 bytes (Zetera Corporation, Z-SAN Bus Driver)
0xBA4CC000 amsint.sys 12288 bytes (Microsoft Corporation, AMD SCSI/NET Controller)
0xBA4B8000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xB1102000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xB11AA000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xB9C17000 C:\WINDOWS\System32\Drivers\i2omgmt.SYS 12288 bytes (Microsoft Corporation, I2O Utility Filter)
0xB1274000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xB9BF3000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xB9BF7000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xB9BD7000 C:\WINDOWS\system32\drivers\WmBEnum.sys 12288 bytes (Logitech Inc., Logitech WingMan Virtual Bus Enumerator Driver )
0xBA5AC000 aliide.sys 8192 bytes (Acer Laboratories Inc., ALi mini IDE Driver)
0xBA5D2000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xBA5B6000 cd20xrnt.sys 8192 bytes (Microsoft Corporation, IBM Portable CD-ROM Drive Miniport)
0xBA5AE000 cmdide.sys 8192 bytes (CMD Technology, Inc., CMD PCI IDE Bus Driver)
0xBA5E8000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xBA5CE000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xBA5B4000 intelide.sys 8192 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0xBA5A8000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xBA5D6000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xBA5B8000 perc2hib.sys 8192 bytes (Microsoft Corporation, PERC 2 Hibernate Driver)
0xBA5DA000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xBA5C2000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xBA5B0000 toside.sys 8192 bytes (Microsoft Corporation, Toshiba PCI IDE Controller)
0xBA5C8000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xBA5B2000 viaide.sys 8192 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0xBA5AA000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xBA76C000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xBA71B000 C:\WINDOWS\System32\Drivers\BANTExt.sys 4096 bytes
0xBA699000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xBA7C0000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xBA670000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================
0x89D88938 LDT (IN GDT of Core 1) Modification, Base+0x010, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E69D LDT (IN GDT of Core 1) Modification, Base+0x258, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x8A18E52C LDT (IN GDT of Core 1) Modification, Base+0x270, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E10F LDT (IN GDT of Core 1) Modification, Base+0x348, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x015BACF6 LDT (IN GDT of Core 1) Modification, Base+0x4B0, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0xC8EF8101 LDT (IN GDT of Core 1) Modification, Base+0x8A0, DPL_SYSTEM, Rpl : 1, Type: CallGate32, Core [1]
0xCAF5E6AD LDT (IN GDT of Core 1) Modification, Base+0x8D0, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x89080000 LDT (IN GDT of Core 1) Modification, Base+0x1A0, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E26B LDT (IN GDT of Core 1) Modification, Base+0x2C0, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x8A18E16D LDT (IN GDT of Core 1) Modification, Base+0x390, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x015B98CD LDT (IN GDT of Core 1) Modification, Base+0x950, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x00DC891E LDT (IN GDT of Core 1) Modification, Base+0xC40, DPL_SYSTEM, Rpl : 2, Type: CallGate32, Core [1]
0x89680000 LDT (IN GDT of Core 1) Modification, Base+0xC48, DPL_SYSTEM, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E10F LDT (IN GDT of Core 1) Modification, Base+0x498, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x00D088CA LDT (IN GDT of Core 1) Modification, Base+0xE10, DPL_SYSTEM, Rpl : 2, Type: CallGate32, Core [1]
0x55383636 LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x56CCC2E4 LDT (IN GDT of Core 1) Modification, Base+0xAF8, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x9DF7CC4C LDT (IN GDT of Core 1) Modification, Base+0xB00, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0xA828F821 LDT (IN GDT of Core 1) Modification, Base+0xBD0, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x8A18E4EC LDT (IN GDT of Core 1) Modification, Base+0xE50, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E541 LDT (IN GDT of Core 1) Modification, Base+0xF20, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01CEDFB3 LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0xE18, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0xE20, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0xE28, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CD0AC8 LDT (IN GDT of Core 1) Modification, Base+0xE88, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x01CD0AC8 LDT (IN GDT of Core 1) Modification, Base+0xEF0, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x01CDC622 LDT (IN GDT of Core 1) Modification, Base+0x470, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0x860, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF4596 LDT (IN GDT of Core 1) Modification, Base+0x870, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459B LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0xE18, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0xE20, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0xE28, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0x860, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CF459E LDT (IN GDT of Core 1) Modification, Base+0x870, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01CEDFB8 LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E1B4 LDT (IN GDT of Core 1) Modification, Base+0x6A0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x8A18E4B7 LDT (IN GDT of Core 1) Modification, Base+0xC90, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x8A18E17E LDT (IN GDT of Core 1) Modification, Base+0xD78, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x00D8001C LDT (IN GDT of Core 1) Modification, Base+0xE40, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x058, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x060, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x068, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0x070, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x0C0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x0C8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x0D0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x0D8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x130, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x138, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x140, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x148, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x1F0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x1F8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0248171A LDT (IN GDT of Core 1) Modification, Base+0x200, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0x208, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x288, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x290, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x0148171A LDT (IN GDT of Core 1) Modification, Base+0x298, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0x2A0, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x019740FD LDT (IN GDT of Core 1) Modification, Base+0x470, DPL_USER, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x858, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x860, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01CED8FC LDT (IN GDT of Core 1) Modification, Base+0x870, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8C0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8C8, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8D0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8D8, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x968, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x970, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x978, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01CED8FC LDT (IN GDT of Core 1) Modification, Base+0x980, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x024812A1 LDT (IN GDT of Core 1) Modification, Base+0xA00, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0xA08, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0xA10, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01CED8FC LDT (IN GDT of Core 1) Modification, Base+0xA18, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x01A075D3 LDT (IN GDT of Core 1) Modification, Base+0x070, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x01973FB4 LDT (IN GDT of Core 1) Modification, Base+0x470, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x858, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x860, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01CED8FC LDT (IN GDT of Core 1) Modification, Base+0x870, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8C0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8C8, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8D0, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x8D8, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x930, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x938, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x940, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014812A1 LDT (IN GDT of Core 1) Modification, Base+0x948, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x0148115D LDT (IN GDT of Core 1) Modification, Base+0xA08, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01481181 LDT (IN GDT of Core 1) Modification, Base+0xA10, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x0148115D LDT (IN GDT of Core 1) Modification, Base+0xA80, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x01481181 LDT (IN GDT of Core 1) Modification, Base+0xA88, DPL_INVALID, Rpl : 1, Type: CallGate32, Core [1]
0x014814B0 LDT (IN GDT of Core 1) Modification, Base+0xC58, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xC60, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B0 LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xCC8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xCD0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xCD8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B0 LDT (IN GDT of Core 1) Modification, Base+0xD38, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xD40, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xD48, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xD50, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01A08F5E LDT (IN GDT of Core 1) Modification, Base+0x070, DPL_USER, Rpl : 2, Type: CallGate32, Core [1]
0x01974C17 LDT (IN GDT of Core 1) Modification, Base+0x470, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xC58, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xC60, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xC68, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xCC8, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xCD0, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xCD8, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xD30, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xD38, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xD40, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C0 LDT (IN GDT of Core 1) Modification, Base+0xD48, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xDF0, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xDF8, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x034817C3 LDT (IN GDT of Core 1) Modification, Base+0xE00, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0xE08, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xE88, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xE90, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x014817C3 LDT (IN GDT of Core 1) Modification, Base+0xE98, DPL_INVALID, Rpl : 3, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0xEA0, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x01A03637 LDT (IN GDT of Core 1) Modification, Base+0x070, DPL_USER, Rpl : 3, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x858, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x860, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x868, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0x870, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x8C0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x8C8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x8D0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x8D8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x930, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x938, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x940, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x948, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x9E8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x9F0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0x9F8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x02CED910 LDT (IN GDT of Core 1) Modification, Base+0xA00, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xA80, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xA88, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xA90, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0xA98, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xC58, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xC60, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xC68, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x01CED910 LDT (IN GDT of Core 1) Modification, Base+0xC70, DPL_USER, Rpl : 0, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xCC0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xCC8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xCD0, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xCD8, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xD30, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xD38, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xD40, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814CA LDT (IN GDT of Core 1) Modification, Base+0xD48, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B0 LDT (IN GDT of Core 1) Modification, Base+0xE08, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xE10, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
0x014814B0 LDT (IN GDT of Core 1) Modification, Base+0xE90, DPL_INVALID, Rpl : 0, Type: CallGate32, Core [1]
0x014814B2 LDT (IN GDT of Core 1) Modification, Base+0xE98, DPL_INVALID, Rpl : 2, Type: CallGate32, Core [1]
 


Edited by Dr. Riddim, 22 June 2013 - 03:37 AM.


#4 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 22 June 2013 - 06:59 AM

Download ComboFix from one of these locations:

Link 1
Link 2


* IMPORTANT- Save ComboFix.exe to your Desktop

====================================================


Disable your AntiVirus and AntiSpyware applications as they will interfere with our tools and the removal. If you are unsure how to do this, please refer to our sticky topic How to disable your security applications


====================================================


Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


RC_update.png


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


cfRC_screen_2.png


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply for further review.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#5 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 23 June 2013 - 02:21 AM

Hello Marius,

 

I did as you requested, disabling my Panda Cloud antivirus and my Comodo firewall, but while ComboFix was running a Panda window popped up in response to something ComboFix was doing.  I gave it permission and there were no further interruptions.

 

Here is the log:

 

*******************************************************************************

 

ComboFix 13-06-22.01 - Owner 06/23/2013   3:01.2.1 - x86
Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.1406.891 [GMT -4:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
AV: Panda Cloud Antivirus *Disabled/Updated* {5AD27692-540A-464E-B625-78275FA38393}
FW: Cloud Antivirus Firewall *Disabled* {1337562C-110A-4AF8-B12B-750C0B30E802}
FW: COMODO Firewall *Disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
C:\install.exe
.
.
(((((((((((((((((((((((((   Files Created from 2013-05-23 to 2013-06-23  )))))))))))))))))))))))))))))))
.
.
2013-05-29 21:16 . 2013-05-29 21:16    128104    ----a-w-    c:\windows\system32\drivers\PSINProt.sys
2013-05-29 09:55 . 2013-05-29 09:55    93928    ----a-w-    c:\windows\system32\drivers\NNStlsc.sys
2013-05-29 09:55 . 2013-05-29 09:55    230376    ----a-w-    c:\windows\system32\drivers\NNSStrm.sys
2013-05-29 09:55 . 2013-05-29 09:55    108904    ----a-w-    c:\windows\system32\drivers\NNSSmtp.sys
2013-05-29 09:55 . 2013-05-29 09:55    287336    ----a-w-    c:\windows\system32\drivers\NNSProt.sys
2013-05-29 09:55 . 2013-05-29 09:55    161384    ----a-w-    c:\windows\system32\drivers\NNSPrv.sys
2013-05-29 09:55 . 2013-05-29 09:55    106344    ----a-w-    c:\windows\system32\drivers\NNSPop3.sys
2013-05-29 09:55 . 2013-05-29 09:55    95464    ----a-w-    c:\windows\system32\drivers\NNSpicc.sys
2013-05-29 09:55 . 2013-05-29 09:55    52328    ----a-w-    c:\windows\system32\drivers\NNSpihs.sys
2013-05-29 09:55 . 2013-05-29 09:55    124648    ----a-w-    c:\windows\system32\drivers\NNSIds.sys
2013-05-29 09:55 . 2013-05-29 09:55    84200    ----a-w-    c:\windows\system32\drivers\NNSAlpc.sys
2013-05-29 09:55 . 2013-05-29 09:55    126184    ----a-w-    c:\windows\system32\drivers\NNSHttp.sys
2013-05-29 09:55 . 2013-05-29 09:55    107752    ----a-w-    c:\windows\system32\drivers\NNSHttps.sys
2013-05-28 15:26 . 2013-05-28 15:26    97768    ----a-w-    c:\windows\system32\drivers\PSINReg.sys
2013-05-28 15:26 . 2013-05-28 15:26    179688    ----a-w-    c:\windows\system32\drivers\PSINKNC.sys
2013-05-28 15:26 . 2013-05-28 15:26    114920    ----a-w-    c:\windows\system32\drivers\PSINProc.sys
2013-05-28 15:26 . 2013-05-28 15:26    145128    ----a-w-    c:\windows\system32\drivers\PSINAflt.sys
2013-05-28 15:26 . 2013-05-28 15:26    103400    ----a-w-    c:\windows\system32\drivers\PSINFile.sys
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-11 22:40 . 2012-03-30 18:14    692104    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-06-11 22:40 . 2011-05-24 17:50    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-05-07 22:30 . 2004-08-26 16:12    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-05-07 22:30 . 2004-08-26 16:11    43520    ------w-    c:\windows\system32\licmgr10.dll
2013-05-07 22:30 . 2004-08-26 16:11    1469440    ------w-    c:\windows\system32\inetcpl.cpl
2013-05-07 21:53 . 2004-08-26 16:11    385024    ------w-    c:\windows\system32\html.iec
2013-05-03 01:26 . 2004-08-26 16:12    2193536    ----a-w-    c:\windows\system32\ntoskrnl.exe
2013-05-03 00:38 . 2004-08-04 05:59    2070144    ----a-w-    c:\windows\system32\ntkrnlpa.exe
2013-04-10 01:31 . 2004-08-26 16:12    1876352    ----a-w-    c:\windows\system32\win32k.sys
2013-04-04 09:35 . 2013-04-19 17:12    94112    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SansaDispatch"="c:\documents and settings\Owner\Application Data\SanDisk\Sansa Updater\SansaDispatch.exe" [2011-05-30 79872]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2013-05-15 4760816]
"TomTomHOME.exe"="c:\program files\TomTom HOME 2\TomTomHOMERunner.exe" [2013-03-22 248208]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WinPatrol"="c:\program files\BillP Studios\WinPatrol\winpatrol.exe" [2011-05-15 325512]
"TrueImageMonitor.exe"="c:\program files\Acronis\TrueImageHome\TrueImageMonitor.exe" [2010-06-07 2605424]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2002-09-13 212992]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]
"LifeCam"="c:\program files\Microsoft LifeCam\LifeExp.exe" [2010-12-13 135536]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"IJNetworkScanUtility"="c:\program files\Canon\Canon IJ Network Scan Utility\CNMNSUT.exe" [2010-08-23 206240]
"COMODO Internet Security"="c:\program files\COMODO\COMODO Internet Security\cfp.exe" [2012-11-07 6756048]
"Acronis Scheduler2 Service"="c:\program files\Common Files\Acronis\Schedule2\schedhlp.exe" [2010-06-07 362488]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-03-12 253816]
"IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2011-08-01 1821576]
"PSUAMain"="c:\program files\Panda Security\Panda Cloud Antivirus\PSUAMain.exe" [2013-05-28 32736]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Event Reminder.lnk - c:\program files\The Print Shop 23.1\Remind.exe [2010-6-21 344064]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLinkedConnections"= 1 (0x1)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\guard32.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NanoServiceMain]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSUAService]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Documents and Settings\\Owner\\Desktop\\PcHelpWare\\PcHelpWare_viewer.exe"=
"c:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
"c:\\Program Files\\UltraVNC\\winvnc.exe"=
"c:\\Program Files\\UltraVNC\\vncviewer.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeEnC2.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeTray.exe"=
"c:\\Program Files\\NETGEAR\\NETGEAR Storage Central Manager Utility\\SCM.exe"=
"c:\\Program Files\\Acronis\\TrueImageHome\\TrueImageLauncher.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Mozilla Firefox\\plugin-container.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"20001:UDP"= 20001:UDP:MicroSAN
"5901:TCP"= 5901:TCP:vnc5901
"5500:TCP"= 5500:TCP:vnc5500
.
R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [8/2/2011 7:12 PM 28552]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdGuard.sys [9/11/2010 12:40 AM 497952]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [9/11/2010 12:40 AM 32640]
R1 NNSALPC;NNSAlpc;c:\windows\system32\drivers\NNSAlpc.sys [5/29/2013 5:55 AM 84200]
R1 NNSHTTP;NNSHttp;c:\windows\system32\drivers\NNSHttp.sys [5/29/2013 5:55 AM 126184]
R1 NNSHTTPS;NNSHttps;c:\windows\system32\drivers\NNSHttps.sys [5/29/2013 5:55 AM 107752]
R1 NNSIDS;NNSids;c:\windows\system32\drivers\NNSIds.sys [5/29/2013 5:55 AM 124648]
R1 NNSPICC;NNSPicc;c:\windows\system32\drivers\NNSpicc.sys [5/29/2013 5:55 AM 95464]
R1 NNSPOP3;NNSPop3;c:\windows\system32\drivers\NNSPop3.sys [5/29/2013 5:55 AM 106344]
R1 NNSPROT;NNSProt;c:\windows\system32\drivers\NNSProt.sys [5/29/2013 5:55 AM 287336]
R1 NNSPRV;NNSPrv;c:\windows\system32\drivers\NNSPrv.sys [5/29/2013 5:55 AM 161384]
R1 NNSSMTP;NNSSmtp;c:\windows\system32\drivers\NNSSmtp.sys [5/29/2013 5:55 AM 108904]
R1 NNSSTRM;NNSStrm;c:\windows\system32\drivers\NNSStrm.sys [5/29/2013 5:55 AM 230376]
R1 NNSTLSC;NNSTlsc;c:\windows\system32\drivers\NNStlsc.sys [5/29/2013 5:55 AM 93928]
R1 PSINKNC;PSINKNC;c:\windows\system32\drivers\PSINKNC.sys [5/28/2013 11:26 AM 179688]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 12:27 PM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 5:55 PM 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 2:54 PM 116608]
R2 NanoServiceMain;Panda Cloud Antivirus Service;c:\program files\Panda Security\Panda Cloud Antivirus\PSANHost.exe [5/28/2013 11:20 AM 140768]
R2 PSINAflt;PSINAflt;c:\windows\system32\drivers\PSINAflt.sys [5/28/2013 11:26 AM 145128]
R2 PSINFile;PSINFile;c:\windows\system32\drivers\PSINFile.sys [5/28/2013 11:26 AM 103400]
R2 PSINProc;PSINProc;c:\windows\system32\drivers\PSINProc.sys [5/28/2013 11:26 AM 114920]
R2 PSINProt;PSINProt;c:\windows\system32\drivers\PSINProt.sys [5/29/2013 5:16 PM 128104]
R2 PSUAService;Panda Product Service;c:\program files\Panda Security\Panda Cloud Antivirus\PSUAService.exe [5/28/2013 11:42 AM 37344]
R2 SFSZ;DataPlow SFS for Zetera Storage Devices;c:\windows\system32\drivers\sfsz.sys [10/10/2010 2:18 PM 345984]
R2 TomTomHOMEService;TomTomHOMEService;c:\program files\TomTom HOME 2\TomTomHOMEService.exe [3/22/2013 6:07 AM 93072]
R2 Z-SANService;Z-SAN Service;c:\program files\NETGEAR\NETGEAR Storage Central Manager Utility\Z-SANService.exe [10/10/2010 2:18 PM 376891]
R3 MSHUSBVideo;NX6000/NX3000/VX2000/VX5000/VX5500/VX7000/Cinema Filter Driver;c:\windows\system32\drivers\nx6000.sys [4/26/2011 1:24 AM 30576]
R3 pcouffin;VSO Software pcouffin;c:\windows\system32\drivers\pcouffin.sys [11/30/2010 6:24 PM 47360]
R3 ZetBus;Zetera Virtual Bus;c:\windows\system32\drivers\ZetBus.sys [10/10/2010 2:18 PM 15488]
S0 ZetSFD;ZetSFD;c:\windows\system32\drivers\ZetSFD.sys [10/10/2010 2:18 PM 12800]
S3 PSINReg;PSINReg;c:\windows\system32\drivers\PSINReg.sys [5/28/2013 11:26 AM 97768]
S3 vdrive;vdrive;c:\windows\system32\DRIVERS\vdrive.sys --> c:\windows\system32\DRIVERS\vdrive.sys [?]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [5/6/2008 4:06 PM 11520]
S3 ZetMPD;ZetMPD;c:\windows\system32\drivers\ZetMPD.sys [10/10/2010 2:18 PM 5120]
S4 NNSPIHS;NNSPihs;c:\windows\system32\drivers\NNSpihs.sys [5/29/2013 5:55 AM 52328]
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-23 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-30 22:40]
.
2005-04-22 c:\windows\Tasks\ISP signup reminder 1.job
- c:\windows\system32\OOBE\oobebaln.exe [2004-08-26 00:12]
.
2005-04-22 c:\windows\Tasks\ISP signup reminder 2.job
- c:\windows\system32\OOBE\oobebaln.exe [2004-08-26 00:12]
.
2005-04-22 c:\windows\Tasks\ISP signup reminder 3.job
- c:\windows\system32\OOBE\oobebaln.exe [2004-08-26 00:12]
.
2013-05-04 c:\windows\Tasks\Microsoft_Hardware_Launch_IPoint_exe.job
- c:\program files\Microsoft IntelliPoint\ipoint.exe [2011-08-01 19:56]
.
2012-03-03 c:\windows\Tasks\Microsoft_Hardware_Launch_LifeExp_exe.job
- c:\program files\Microsoft LifeCam\LifeExp.exe [2010-12-13 19:37]
.
2011-05-30 c:\windows\Tasks\Microsoft_Hardware_Launch_vVX1000_exe.job
- c:\windows\vVX1000.exe [2011-04-25 19:27]
.
2012-02-02 c:\windows\Tasks\wavepadSevenDays.job
- c:\program files\NCH Software\WavePad\wavepad.exe [2012-02-02 11:03]
.
2012-02-05 c:\windows\Tasks\wavepadShakeIcon.job
- c:\program files\NCH Software\WavePad\wavepad.exe [2012-02-02 11:03]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
Trusted Zone: gotomypc.com\www
Trusted Zone: microsoft.com
TCP: Interfaces\{90C09548-0357-4869-A98E-5A5FE047F3F2}: NameServer = 65.32.5.111,65.32.5.112
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\iq8equxa.default\
FF - prefs.js: browser.search.selectedEngine - Wikipedia (en)
FF - prefs.js: browser.startup.homepage - hxxp://duckduckgo.com
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-Listary - c:\program files\Listary\Listary.exe
AddRemove-{007811BF-E310-4285-BFC6-55DB29B3EDDE} - c:\docume~1\ALLUSE~1\APPLIC~1\INSTAL~1\{00781~1\Setup.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-06-23 03:09
Windows 5.1.2600 Service Pack 3 NTFS
.
detected NTDLL code modification:
ZwClose
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  SansaDispatch = c:\documents and settings\Owner\Application Data\SanDisk\Sansa Updater\SansaDispatch.exe?????????????????????????????????????????????????????????????????????????????????????????
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{3610eda5-77ef-11d2-8dc5-00c04fa31a66}]
@DACL=(02 0000)
@="Microsoft Disk Quota"
"NoMachinePolicy"=dword:00000000
"NoUserPolicy"=dword:00000001
"NoSlowLink"=dword:00000001
"NoBackgroundPolicy"=dword:00000001
"NoGPOListChanges"=dword:00000001
"PerUserLocalSettings"=dword:00000000
"RequiresSuccessfulRegistry"=dword:00000001
"EnableAsynchronousProcessing"=dword:00000000
"DllName"=expand:"dskquota.dll"
"ProcessGroupPolicy"="ProcessGroupPolicy"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{4CFB60C1-FAA6-47f1-89AA-0B18730C9FD3}]
@DACL=(02 0000)
@="Internet Explorer Zonemapping"
"DllName"="c:\\WINDOWS\\system32\\iedkcs32.dll"
"ProcessGroupPolicy"="ProcessGroupPolicyForZoneMap"
"NoGPOListChanges"=dword:00000001
"RequiresSucessfulRegistry"=dword:00000001
"DisplayName"="@c:\\WINDOWS\\system32\\iedkcs32.dll.mui,-3051"
"RequiresSuccessfulRegistry"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{827D319E-6EAC-11D2-A4EA-00C04F79F83A}]
@DACL=(02 0000)
"ProcessGroupPolicy"="SceProcessSecurityPolicyGPO"
"GenerateGroupPolicy"="SceGenerateGroupPolicy"
"ExtensionRsopPlanningDebugLevel"=dword:00000001
"ProcessGroupPolicyEx"="SceProcessSecurityPolicyGPOEx"
"ExtensionDebugLevel"=dword:00000001
"DllName"=expand:"scecli.dll"
@="Security"
"NoUserPolicy"=dword:00000001
"NoGPOListChanges"=dword:00000001
"EnableAsynchronousProcessing"=dword:00000001
"MaxNoGPOListChangesInterval"=dword:000003c0
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{A2E30F80-D7DE-11d2-BBDE-00C04F86AE3B}]
@DACL=(02 0000)
"ProcessGroupPolicyEx"="ProcessGroupPolicyEx"
"GenerateGroupPolicy"="GenerateGroupPolicy"
"ProcessGroupPolicy"="ProcessGroupPolicy"
"DllName"="c:\\WINDOWS\\system32\\iedkcs32.dll"
@="Internet Explorer Branding"
"NoSlowLink"=dword:00000001
"NoBackgroundPolicy"=dword:00000000
"NoGPOListChanges"=dword:00000001
"NoMachinePolicy"=dword:00000001
"DisplayName"="@c:\\WINDOWS\\system32\\iedkcs32.dll.mui,-3014"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}]
@DACL=(02 0000)
"ProcessGroupPolicy"="SceProcessEFSRecoveryGPO"
"DllName"=expand:"scecli.dll"
@="EFS recovery"
"NoUserPolicy"=dword:00000001
"NoGPOListChanges"=dword:00000001
"RequiresSuccessfulRegistry"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{B587E2B1-4D59-4e7e-AED9-22B9DF11D053}]
@DACL=(02 0000)
@="802.3 Group Policy"
"DisplayName"=expand:"@dot3gpclnt.dll,-100"
"ProcessGroupPolicyEx"="ProcessLANPolicyEx"
"GenerateGroupPolicy"="GenerateLANPolicy"
"DllName"=expand:"dot3gpclnt.dll"
"NoUserPolicy"=dword:00000001
"NoGPOListChanges"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{C631DF4C-088F-4156-B058-4375F0853CD8}]
@DACL=(02 0000)
@="Microsoft Offline Files"
"DllName"=expand:"%SystemRoot%\\System32\\cscui.dll"
"EnableAsynchronousProcessing"=dword:00000000
"NoBackgroundPolicy"=dword:00000000
"NoGPOListChanges"=dword:00000000
"NoMachinePolicy"=dword:00000000
"NoSlowLink"=dword:00000000
"NoUserPolicy"=dword:00000001
"PerUserLocalSettings"=dword:00000000
"ProcessGroupPolicy"="ProcessGroupPolicy"
"RequiresSuccessfulRegistry"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{c6dc5466-785a-11d2-84d0-00c04fb169f7}]
@DACL=(02 0000)
@="Software Installation"
"DllName"=expand:"appmgmts.dll"
"ProcessGroupPolicyEx"="ProcessGroupPolicyObjectsEx"
"GenerateGroupPolicy"="GenerateGroupPolicy"
"NoBackgroundPolicy"=dword:00000000
"RequiresSucessfulRegistry"=dword:00000000
"NoSlowLink"=dword:00000001
"PerUserLocalSettings"=dword:00000001
"EventSources"=multi:"(Application Management,Application)\00(MsiInstaller,Application)\00\00"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\!SASWinLogon]
@DACL=(02 0000)
"DllName"="c:\\Program Files\\SUPERAntiSpyware\\SASWINLO.DLL"
"Logon"="SABWINLOLogon"
"Logoff"="SABWINLOLogoff"
"Startup"="SABWINLOStartup"
"Shutdown"="SABWINLOShutdown"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AtiExtEvent]
@DACL=(02 0000)
@SACL=
"DLLName"="Ati2evxx.dll"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000001
"Lock"="AtiLockEvent"
"Logoff"="AtiLogoffEvent"
"Logon"="AtiLogonEvent"
"Disconnect"="AtiDisConnectEvent"
"Reconnect"="AtiReConnectEvent"
"Safe"=dword:00000000
"Shutdown"="AtiShutdownEvent"
"StartScreenSaver"="AtiStartScreenSaverEvent"
"StartShell"="AtiStartShellEvent"
"Startup"="AtiStartupEvent"
"StopScreenSaver"="AtiStopScreenSaverEvent"
"Unlock"="AtiUnLockEvent"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
@DACL=(02 0000)
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=expand:"crypt32.dll"
"Logoff"="ChainWlxLogoffEvent"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
@DACL=(02 0000)
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=expand:"cryptnet.dll"
"Logoff"="CryptnetWlxLogoffEvent"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
@DACL=(02 0000)
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\dimsntfy]
@DACL=(02 0000)
"Asynchronous"=dword:00000001
"DllName"=expand:"%SystemRoot%\\System32\\dimsntfy.dll"
"Startup"="WlDimsStartup"
"Shutdown"="WlDimsShutdown"
"Logon"="WlDimsLogon"
"Logoff"="WlDimsLogoff"
"StartShell"="WlDimsStartShell"
"Lock"="WlDimsLock"
"Unlock"="WlDimsUnlock"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
@DACL=(02 0000)
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
@DACL=(02 0000)
"Asynchronous"=dword:00000000
"DllName"=expand:"wlnotify.dll"
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
@DACL=(02 0000)
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=expand:"sclgntfy.dll"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
@DACL=(02 0000)
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
@DACL=(02 0000)
"Asynchronous"=dword:00000000
"DllName"=expand:"wlnotify.dll"
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
@DACL=(02 0000)
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]
@DACL=(02 0000)
"HelpAssistant"=dword:00000000
"TsInternetUser"=dword:00000000
"SQLAgentCmdExec"=dword:00000000
"NetShowServices"=dword:00000000
"IWAM_"=dword:00010000
"IUSR_"=dword:00010000
"VUSR_"=dword:00010000
"ASPNET"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1652)
c:\windows\system32\guard32.dll
.
- - - - - - - > 'lsass.exe'(1708)
c:\windows\system32\guard32.dll
.
- - - - - - - > 'csrss.exe'(1616)
c:\windows\system32\cmdcsr.dll
.
Completion time: 2013-06-23  03:12:10
ComboFix-quarantined-files.txt  2013-06-23 07:12
.
Pre-Run: 263,949,123,584 bytes free
Post-Run: 267,894,009,856 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - 014173BB457E8EE040A4E9D07EAF3983
B20939CD98B7710036274839082AE757
 



#6 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 23 June 2013 - 04:54 PM

Please download Malwarebytes Anti-Rootkit from here Malwarebytes : Malwarebytes Anti-Rootkit and save it to your desktop.

Be sure to print out and follow the instructions provided on that same page.

Caution: This is a beta version so please be sure to read the disclaimer and back up any important data before using.
  • Double click the mbar.zip file to open it, then 'Extract all files'.
  • Double click the mbar folder to open it, then double click mbar.exe to start the tool.
Check for Updates, then Scan your system for malware

If malware is found, do NOT press the Cleanup button yet. Click EXIT.

I'd like to see the log first so I can see what it sees. You'll find the log in that mbar folder as MBAR-log-<date and time>***.txt . Please attach that to your next reply.
Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#7 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 24 June 2013 - 01:36 AM

I had a difficult time getting MBAR to run to completion.  It kept locking up on me.  I disabled all the programs in the System Tray and it finally completed after the 4th try - with no malware found.

 

I don't know if it's worth mentioning, but when I launched MBAR for the first time a message popped up telling me that Registry value "AppInit_Dlls" was found, which might have been the result of RootKit activity.  After MBAR stopped the second time, I answered the pop-up with "Yes" to remove the value and re-start the tool.



#8 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 24 June 2013 - 12:08 PM


Scan with aswMBR

Please download aswMBR.exe to your desktop.
  • Double-click the aswMBR.exe to run it
  • When prompted with The application can use the Avast! Free Antivirus for scanning >> select No
  • Now click on the Scan button to start scan
  • On completion of the scan click Save Log, save it to your desktop and post the contents in your next reply
Note: There will also be a file on your desktop named MBR.dat(or similir) do not delete this for now it is a actual backup of the MBR(master boot record).
Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#9 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 24 June 2013 - 05:33 PM

Here's the aswMBR log:

 

aswMBR version 0.9.9.1771 Copyright© 2011 AVAST Software
Run date: 2013-06-24 18:27:42
-----------------------------
18:27:42.187    OS Version: Windows 5.1.2600 Service Pack 3
18:27:42.187    Number of processors: 1 586 0x1F00
18:27:42.234    ComputerName: EMACHINE-H  UserName: Owner
18:27:45.046    Initialize success
18:27:59.671    Disk 0  \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-10
18:27:59.671    Disk 0 Vendor: WDC_WD5000AAKS-00WWPA0 01.03B01 Size: 476938MB BusType: 3
18:27:59.687    Disk 1 (boot) \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP3T0L0-1b
18:27:59.687    Disk 1 Vendor: WDC_WD5000AAKS-00UU3A0 01.03B01 Size: 476940MB BusType: 3
18:27:59.906    Disk 1 MBR read successfully
18:27:59.906    Disk 1 MBR scan
18:27:59.921    Disk 1 unknown MBR code
18:27:59.968    Disk 1 Partition 1 80 (A) 07    HPFS/NTFS NTFS       472834 MB offset 8401995
18:27:59.968    Disk 1 Partition 2 00     0B        FAT32 RECOVERY     4102 MB offset 63
18:27:59.984    Disk 1 scanning sectors +976768065
18:28:00.046    Disk 1 scanning C:\WINDOWS\system32\drivers
18:28:08.734    Service scanning
18:28:23.468    Modules scanning
18:28:34.250    Disk 1 trace - called modules:
18:28:34.781    ntkrnlpa.exe CLASSPNP.SYS disk.sys vsflt53.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
18:28:34.781    1 nt!IofCallDriver -> \Device\Harddisk1\DR1[0x8a45f030]
18:28:34.781    3 CLASSPNP.SYS[ba168fd7] -> nt!IofCallDriver -> [0x8a4123c8]
18:28:34.796    5 vsflt53.sys[b9f60c2b] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP3T0L0-1b[0x8a41bd98]
18:28:34.796    Scan finished successfully
18:31:09.187    Disk 1 MBR has been saved successfully to "C:\Documents and Settings\Owner\Desktop\MBR.dat"
18:31:09.203    The log file has been saved successfully to "C:\Documents and Settings\Owner\Desktop\aswMBR.txt"

 



#10 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 25 June 2013 - 09:52 AM

Please check the file in the code box via Virustotal

  • Click browse
  • copy the following into the search box

    C:\Documents and Settings\Owner\Desktop\MBR.dat
    
  • and click open.
  • click Send File.
please be patinet until the file is uploade completely. If you get the message

File already submitted: The file sent has already been analysed by VirusTotal in the past. This is same basic info regarding the sample itself and its last analysis:
click on Reanalyse. Wait until Current status: Finished appears. Now, copy the link from within your browser´s adress bar and poste it here.

Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#11 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 26 June 2013 - 01:45 AM

When I clicked on "Browse" it opened up Windows' file chooser, so I just pointed it to the desktop and clicked on MBR.dat.  I clicked on "Open" and then on "Scan it!", since there was no "Send" button visible.

 

It came up with 0/47 and here's the resulting URL:

 

https://www.virustotal.com/en/file/169b78a8da62490917640350fef6fb65931783a2f564848a146ddb727f4dbc4d/analysis/1372228425/



#12 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 26 June 2013 - 11:44 AM

Please go to here to run the online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings and ensure these options are ticked:
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click Scan
  • Wait for the scan to finish
  • If any threats were found, click the 'List of found threats' , then click Export to text file....
  • Save it to your desktop, then please copy and paste that log as a reply to this topic.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#13 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 28 June 2013 - 01:11 AM

Sorry for the delay, but I had to wait until I didn't need the PC for anything else before I could run the ESET scan, as it takes over 3 hours.  It completed successfully with no threats found.


Edited by Dr. Riddim, 28 June 2013 - 01:13 AM.


#14 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:59 AM

Posted 28 June 2013 - 03:34 PM

Then we can do the cleanup - if you are facing any issues, report that immediately.

Scan with adwCleaner


Please download AdwCleaner to your desktop.


  • Run adwcleaner.exe.
  • Hit delete.
  • When the run is finished, it will open up a text file.
  • Please post its contents within your next reply.
  • You´ll find the log file at C:\AdwCleaner[S1].txt also.


SecurityCheck

Please download SecurityCheck: LINK1 LINK2

  • Save it to your desktop, start it and follow the instructions in the window.
  • After the scan finished the (checkup.txt) will open. Copy its content to your thread.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#15 Dr. Riddim

Dr. Riddim
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:10:59 PM

Posted 29 June 2013 - 12:58 AM

Here is the log file for AdwCleaner:

 

# AdwCleaner v2.303 - Logfile created 06/29/2013 at 01:38:13
# Updated 08/06/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Owner - EMACHINE-H
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Owner\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\YahooPartnerToolbar

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

-\\ Mozilla Firefox v22.0 (en-US)

File : C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\iq8equxa.default\prefs.js

Deleted : user_pref("betterfacebook.1848787489/prefs", "{\"installed_on_5\":1314551075039,\"last_message_check[...]
Deleted : user_pref("betterfacebook.1848787489/typeahead", "for (;;);{\"__ar\":1,\"payload\":{\"entries\":[{\"[...]
Deleted : user_pref("greasemonkey.scriptvals.hxxp://userscripts.org/users/86416/Better Facebook.1848787489/pre[...]
Deleted : user_pref("greasemonkey.scriptvals.hxxp://userscripts.org/users/86416/Better Facebook.1848787489/typ[...]

*************************

AdwCleaner[S1].txt - [2538 octets] - [11/05/2013 05:26:44]
AdwCleaner[S2].txt - [1258 octets] - [29/06/2013 01:38:13]

########## EOF - C:\AdwCleaner[S2].txt - [1318 octets] ##########
 

 

 

Here's the log file for Security Check.  I disabled Comodo Firewall for the duration of the run of this program.  My keyboard stopped working during the first run of Security Check and necessitated closing the program, changing the USB port, and running it 2 more times before pressing a key would allow the program to continue.

 

My Java hasn't been updated because the updater fails with the warning that the files weren't downloaded.  I wanted to wait and see what, if any, infections turned up before manually completing the update.

 

 

 Results of screen317's Security Check version 0.99.68  
 Windows XP Service Pack 3 x86   
 Internet Explorer 8 Out of date!
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
 ESET Online Scanner v3   
 COMODO Internet Security    
 Panda Cloud Antivirus    
`````````Anti-malware/Other Utilities Check:`````````
 SUPERAntiSpyware     
 Malwarebytes Anti-Malware version 1.70.0.1100  
 Out of date Malwarebytes Anti-Malware installed!
 Java 7 Update 21  
 Java version out of Date!
 Adobe Flash Player     11.7.700.224  
 Adobe Reader XI  
 Mozilla Firefox (22.0)
 Mozilla Thunderbird (17.0.7)
````````Process Check: objlist.exe by Laurent````````  
 WinPatrol winpatrol.exe
 Comodo Firewall cmdagent.exe
 Comodo Firewall cfp.exe
 Panda Security Panda Cloud Antivirus PSANHost.exe  
 Panda Security Panda Cloud Antivirus PSUAService.exe  
 Panda Security Panda Cloud Antivirus PSUAMain.exe  
 BillP Studios WinPatrol winpatrol.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:: 12% Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````
 


Edited by Dr. Riddim, 29 June 2013 - 01:03 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users