1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Inactive Suspected rootkit

Discussion in 'Malware and Virus Removal Archive' started by sfalla, 2011/01/17.

  1. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    [Inactive] Suspected rootkit

    My wife's laptop has been having problems with browsing and I suspected the worst so started running some tests. An Avira scan found some trojan / virus and removed them. But there was still some problems. I tried a few downloadable apps to detect/clean a suspected rootkit then realised I was over my head, so I started to tun the standard tests on this forum. The biggy for me was the GMER scan stating rootkit-like behaviour on the scan results, and the possible TDL3 rootkit infection in the DDS log. Could someone tell me am I infected with a rootkit, and how to fix it.

    Symptoms I am seeing now is google chrome cannot load any pages at all it just hangs, IE 7 sometimes works, but sometimes never appears but the iexplore process can be seen in Task Manager, and just recently (did I do something) windows sometimes starts without starting up the explorer process. I can start it manually from Task Manager but don't think my wife would want to do that. All and any help appreciated.

    Standard logs provided below

    Malwarebytes Log
    Malwarebytes' Anti-Malware 1.50.1.1100
    www.malwarebytes.org

    Database version: 5542

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 7.0.5730.11

    2011-01-18 04:31:37
    mbam-log-2011-01-18 (04-31-37).txt

    Scan type: Quick scan
    Objects scanned: 151196
    Time elapsed: 3 minute(s), 20 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)


    GMER Log
    GMER 1.0.15.15530 - http://www.gmer.net
    Rootkit scan 2011-01-18 04:28:03
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 HTS541010G9SA00 rev.MBZOC60D
    Running: il0eqd70.exe; Driver: C:\DOCUME~1\Malin\LOCALS~1\Temp\fxtdapob.sys


    ---- System - GMER 1.0.15 ----

    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwClose [0xA325C110]
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwCreateFile [0xA325B920]
    SSDT A401915E ZwCreateKey
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwCreateProcess [0xA325AF20]
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwCreateProcessEx [0xA325AD90]
    SSDT A4019154 ZwCreateThread
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwDeleteFile [0xA325C190]
    SSDT A4019163 ZwDeleteKey
    SSDT A401916D ZwDeleteValueKey
    SSDT \SystemRoot\system32\drivers\khips.sys (Sunbelt Kerio Host Intrusion Prevention Driver/Sunbelt Software) ZwLoadDriver [0xA30AA9A0]
    SSDT A4019172 ZwLoadKey
    SSDT \SystemRoot\system32\drivers\khips.sys (Sunbelt Kerio Host Intrusion Prevention Driver/Sunbelt Software) ZwMapViewOfSection [0xA30AAB30]
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwOpenFile [0xA325BBF0]
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwOpenKey [0xA3258140]
    SSDT A4019140 ZwOpenProcess
    SSDT A4019145 ZwOpenThread
    SSDT A401917C ZwReplaceKey
    SSDT A4019177 ZwRestoreKey
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwResumeThread [0xA325B510]
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwSetInformationFile [0xA325BF00]
    SSDT A4019168 ZwSetValueKey
    SSDT \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software) ZwWriteFile [0xA325BE50]

    ---- Kernel code sections - GMER 1.0.15 ----

    PAGENDSM NDIS.sys!NdisMIndicateStatus F75B49EF 6 Bytes JMP A324FED0 \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    init C:\WINDOWS\system32\drivers\tifm21.sys entry point in "init" section [0xF5E14EBF]

    ---- User code sections - GMER 1.0.15 ----

    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Rootkit Busters\gmer\il0eqd70.exe[368] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000701A8
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00070090
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00070694
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000702C0
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00070234
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00070004
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0007011C
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000704F0
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0007057C
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000703D8
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0007034C
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00070464
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00070608
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000707AC
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00070720
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00070F54
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00070FE0
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00070D24
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00070DB0
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00070E3C
    .text C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe[380] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00070EC8
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[624] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[624] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[624] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[624] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\spoolsv.exe[684] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\spoolsv.exe[684] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\spoolsv.exe[684] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\spoolsv.exe[684] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\spoolsv.exe[684] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\spoolsv.exe[684] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\spoolsv.exe[684] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Avira\AntiVir Desktop\sched.exe[728] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[776] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[776] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[776] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[776] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[776] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\svchost.exe[776] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\svchost.exe[776] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\WINDOWS\system32\Ati2evxx.exe[856] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe[864] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[920] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
     
  2. 2011/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Welcome aboard :)

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running tools or applying updates other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    Please, post the rest of GMER log and all other required logs.
     

  3. to hide this advert.

  4. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[944] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[952] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Java\jre6\bin\jqs.exe[1060] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001601A8
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00160090
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00160694
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateProcessW 7C802336 5 Bytes JMP 001602C0
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00160234
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00160004
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0016011C
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001604F0
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateThread 7C8106D7 5 Bytes JMP 0016057C
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001603D8
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0016034C
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!WinExec 7C86250D 5 Bytes JMP 00160464
    .text C:\WINDOWS\system32\csrss.exe[1068] KERNEL32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00160608
    .text C:\WINDOWS\system32\csrss.exe[1068] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001607AC
    .text C:\WINDOWS\system32\csrss.exe[1068] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00160720
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[1076] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000701A8
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00070090
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00070694
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000702C0
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00070234
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00070004
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0007011C
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000704F0
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0007057C
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000703D8
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0007034C
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00070464
    .text C:\WINDOWS\system32\winlogon.exe[1100] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00070608
    .text C:\WINDOWS\system32\winlogon.exe[1100] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000707AC
    .text C:\WINDOWS\system32\winlogon.exe[1100] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00070720
    .text C:\WINDOWS\system32\winlogon.exe[1100] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000708C4
    .text C:\WINDOWS\system32\winlogon.exe[1100] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00070838
    .text C:\WINDOWS\system32\winlogon.exe[1100] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00070950
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00070F54
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00070FE0
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00070D24
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00070DB0
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00070E3C
    .text C:\WINDOWS\system32\winlogon.exe[1100] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00070EC8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000301A8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00030090
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00030694
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000302C0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00030234
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00030004
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0003011C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000304F0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0003057C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000303D8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0003034C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00030464
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00030608
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000307AC
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00030720
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000308C4
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00030838
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00030950
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00030F54
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00030FE0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00030D24
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00030DB0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00030E3C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe[1124] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00030EC8
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\services.exe[1148] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\services.exe[1148] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\services.exe[1148] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\services.exe[1148] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\lsass.exe[1168] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\lsass.exe[1168] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\lsass.exe[1168] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\lsass.exe[1168] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\lsass.exe[1168] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\lsass.exe[1168] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\lsass.exe[1168] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\WINDOWS\system32\Ati2evxx.exe[1372] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[1392] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[1392] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[1392] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[1392] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[1392] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\svchost.exe[1392] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\svchost.exe[1392] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
     
  5. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe[1428] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[1484] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[1484] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[1484] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[1484] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[1484] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\svchost.exe[1484] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\svchost.exe[1484] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\System32\svchost.exe[1528] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00D8000A
    .text C:\WINDOWS\System32\svchost.exe[1528] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D9000A
    .text C:\WINDOWS\System32\svchost.exe[1528] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00D7000C
    .text C:\WINDOWS\System32\svchost.exe[1528] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\System32\svchost.exe[1528] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\System32\svchost.exe[1528] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 00DD000A
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[1600] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\LogMeIn\x86\LogMeIn.exe[1612] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\LogMeIn\x86\RaMaint.exe[1632] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[1788] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[1836] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Google\Update\GoogleUpdate.exe[1896] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[2004] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[2004] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[2004] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[2004] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[2004] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\svchost.exe[2004] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\svchost.exe[2004] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[2036] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\WINDOWS\Explorer.EXE[2128] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00DA000A
    .text C:\WINDOWS\Explorer.EXE[2128] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00DB000A
    .text C:\WINDOWS\Explorer.EXE[2128] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00C8000C
    .text C:\WINDOWS\Explorer.EXE[2128] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\Explorer.EXE[2128] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
     
  6. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001401A8
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00140090
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00140694
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001402C0
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00140234
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00140004
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0014011C
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001404F0
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0014057C
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001403D8
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0014034C
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00140464
    .text C:\Program Files\internet explorer\iexplore.exe[2548] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00140608
    .text C:\Program Files\internet explorer\iexplore.exe[2548] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001407AC
    .text C:\Program Files\internet explorer\iexplore.exe[2548] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00140720
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00140F54
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00140FE0
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00140D24
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00140DB0
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00140E3C
    .text C:\Program Files\internet explorer\iexplore.exe[2548] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00140EC8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe[2600] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[2812] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001307AC
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00130720
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00130F54
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00130FE0
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00130D24
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00130DB0
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00130E3C
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00130EC8
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WS2_32.dll!socket 71AB4211 5 Bytes JMP 001308C4
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00130838
    .text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[2872] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00130950
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\ctfmon.exe[2952] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\ctfmon.exe[2952] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\ctfmon.exe[2952] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\ctfmon.exe[2952] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\svchost.exe[3408] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\svchost.exe[3408] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\svchost.exe[3408] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\svchost.exe[3408] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\WINDOWS\system32\svchost.exe[3408] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\svchost.exe[3408] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\svchost.exe[3408] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\system32\wbem\wmiprvse.exe[3656] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001401A8
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00140090
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00140694
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001402C0
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00140234
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00140004
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0014011C
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001404F0
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0014057C
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001403D8
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0014034C
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00140464
    .text C:\Program Files\internet explorer\iexplore.exe[3860] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00140608
    .text C:\Program Files\internet explorer\iexplore.exe[3860] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 001407AC
    .text C:\Program Files\internet explorer\iexplore.exe[3860] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00140720
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00140F54
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00140FE0
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00140D24
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00140DB0
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00140E3C
    .text C:\Program Files\internet explorer\iexplore.exe[3860] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00140EC8
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
    .text C:\WINDOWS\System32\alg.exe[3956] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
    .text C:\WINDOWS\System32\alg.exe[3956] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 000807AC
    .text C:\WINDOWS\System32\alg.exe[3956] USER32.dll!SetWindowsHookExA 7E431211 5 Bytes JMP 00080720
    .text C:\WINDOWS\System32\alg.exe[3956] WS2_32.dll!socket 71AB4211 5 Bytes JMP 000808C4
    .text C:\WINDOWS\System32\alg.exe[3956] WS2_32.dll!bind 71AB4480 5 Bytes JMP 00080838
    .text C:\WINDOWS\System32\alg.exe[3956] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 00080950
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetConnectA 3D94B0B2 5 Bytes JMP 00080F54
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetConnectW 3D94C2A0 5 Bytes JMP 00080FE0
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetOpenA 3D953081 5 Bytes JMP 00080D24
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetOpenW 3D9536B1 5 Bytes JMP 00080DB0
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetOpenUrlA 3D956F5A 5 Bytes JMP 00080E3C
    .text C:\WINDOWS\System32\alg.exe[3956] WININET.dll!InternetOpenUrlW 3D998471 5 Bytes JMP 00080EC8

    ---- Kernel IAT/EAT - GMER 1.0.15 ----

    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisCloseAdapter] [A324FCE0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisOpenAdapter] [A324FD00] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisRegisterProtocol] [A324FD90] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisDeregisterProtocol] [A324FDC0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisRegisterProtocol] [A324FD90] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisOpenAdapter] [A324FD00] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisCloseAdapter] [A324FCE0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisClCloseCall] [A3250680] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisClMakeCall] [A3250580] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisCoDeleteVc] [A32504C0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisCoCreateVc] [A3250360] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisCloseAdapter] [A324FCE0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisOpenAdapter] [A324FD00] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisClOpenAddressFamily] [A3250BB0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisClCloseAddressFamily] [A3250E70] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisCoSendPackets] [A3250210] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisDeregisterProtocol] [A324FDC0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisRegisterProtocol] [A324FD90] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisRegisterProtocol] [A324FD90] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisDeregisterProtocol] [A324FDC0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisCloseAdapter] [A324FCE0] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisOpenAdapter] [A324FD00] \SystemRoot\system32\drivers\fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\Tcpip \Device\Ip fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    AttachedDevice \Driver\Tcpip \Device\Ip ntoskrnl.exe (NT Kernel & System/Microsoft Corporation)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Tcpip \Device\Tcp fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    AttachedDevice \Driver\Tcpip \Device\Tcp ntoskrnl.exe (NT Kernel & System/Microsoft Corporation)
    AttachedDevice \Driver\Ftdisk \Device\HarddiskVolume1 snapman.sys (Acronis Snapshot API/Acronis)
    AttachedDevice \Driver\Ftdisk \Device\HarddiskVolume2 snapman.sys (Acronis Snapshot API/Acronis)

    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8728539B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8728539B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8728539B

    AttachedDevice \Driver\Tcpip \Device\Udp fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    AttachedDevice \Driver\Tcpip \Device\Udp ntoskrnl.exe (NT Kernel & System/Microsoft Corporation)
    AttachedDevice \Driver\Tcpip \Device\RawIp fwdrv.sys (Sunbelt Kerio Firewall FWDRV/Sunbelt Software)
    AttachedDevice \Driver\Tcpip \Device\RawIp ntoskrnl.exe (NT Kernel & System/Microsoft Corporation)

    Device \FileSystem\Cdfs \Cdfs DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)
    Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskHTS541010G9SA00_________________________MBZOC60D#5&35291d97&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found

    ---- Disk sectors - GMER 1.0.15 ----

    Disk \Device\Harddisk0\DR0 sector 32: rootkit-like behavior;
    Disk \Device\Harddisk0\DR0 sector 60: rootkit-like behavior;
    Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior;
    Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior;

    ---- EOF - GMER 1.0.15 ----
     
  7. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    Last one

    MBRCheck Log
    MBRCheck, version 1.2.3
    (c) 2010, AD

    Command-line:
    Windows Version: Windows XP Home Edition
    Windows Information: Service Pack 3 (build 2600)
    Logical Drives Mask: 0x0000000c

    Kernel Drivers (total 158):
    0x804D7000 \WINDOWS\system32\ntoskrnl.exe
    0x806FF000 \WINDOWS\system32\hal.dll
    0x872DC000 \WINDOWS\system32\KDCOM.DLL
    0xF7B6A000 \WINDOWS\system32\BOOTVID.dll
    0xF7707000 ACPI.sys
    0xF7C56000 \WINDOWS\system32\DRIVERS\WMILIB.SYS
    0xF76F6000 pci.sys
    0xF7756000 isapnp.sys
    0xF7766000 ohci1394.sys
    0xF7776000 \WINDOWS\system32\DRIVERS\1394BUS.SYS
    0xF7B6E000 compbatt.sys
    0xF7B72000 \WINDOWS\system32\DRIVERS\BATTC.SYS
    0xF7D1E000 pciide.sys
    0xF79D6000 \WINDOWS\system32\DRIVERS\PCIIDEX.SYS
    0xF76D8000 pcmcia.sys
    0xF7786000 MountMgr.sys
    0xF76B9000 ftdisk.sys
    0xF7B76000 ACPIEC.sys
    0xF7D1F000 \WINDOWS\system32\DRIVERS\OPRGHDLR.SYS
    0xF79DE000 PartMgr.sys
    0xF7796000 VolSnap.sys
    0xF76A1000 x001.sys
    0xF77A6000 disk.sys
    0xF77B6000 \WINDOWS\system32\DRIVERS\CLASSPNP.SYS
    0xF7681000 fltmgr.sys
    0xF766B000 DRVMCDB.SYS
    0xF77C6000 PxHelp20.sys
    0xF7654000 KSecDD.sys
    0xF75C7000 Ntfs.sys
    0xF759A000 NDIS.sys
    0xF753B000 timntr.sys
    0xF7520000 snapman.sys
    0xF7506000 Mup.sys
    0xF7986000 \SystemRoot\system32\DRIVERS\intelppm.sys
    0xF6453000 \SystemRoot\system32\DRIVERS\CmBatt.sys
    0xF5FD5000 \SystemRoot\system32\DRIVERS\ati2mtag.sys
    0xF5FC1000 \SystemRoot\system32\DRIVERS\VIDEOPRT.SYS
    0xF5F99000 \SystemRoot\system32\DRIVERS\HDAudBus.sys
    0xF5E3C000 \SystemRoot\system32\DRIVERS\w39n51.sys
    0xF7ADE000 \SystemRoot\system32\DRIVERS\usbuhci.sys
    0xF5E18000 \SystemRoot\system32\DRIVERS\USBPORT.SYS
    0xF7AE6000 \SystemRoot\system32\DRIVERS\usbehci.sys
    0xF7996000 \SystemRoot\system32\DRIVERS\nic1394.sys
    0xF5DF0000 \SystemRoot\system32\drivers\tifm21.sys
    0xF5DDC000 \SystemRoot\system32\DRIVERS\sdbus.sys
    0xF5DB4000 \SystemRoot\system32\DRIVERS\e100b325.sys
    0xF79A6000 \SystemRoot\system32\DRIVERS\i8042prt.sys
    0xF7AEE000 \SystemRoot\system32\DRIVERS\kbdclass.sys
    0xF5D85000 \SystemRoot\system32\DRIVERS\SynTP.sys
    0xF7C9A000 \SystemRoot\system32\DRIVERS\USBD.SYS
    0xF7AF6000 \SystemRoot\system32\DRIVERS\mouclass.sys
    0xF79B6000 \SystemRoot\system32\DRIVERS\imapi.sys
    0xF7AFE000 \SystemRoot\system32\drivers\iviaspi.sys
    0xF644F000 \SystemRoot\system32\drivers\pfc.sys
    0xF7C9C000 \SystemRoot\System32\Drivers\DLACDBHM.SYS
    0xF79C6000 \SystemRoot\system32\DRIVERS\cdrom.sys
    0xF77E6000 \SystemRoot\system32\DRIVERS\redbook.sys
    0xF5D62000 \SystemRoot\system32\DRIVERS\ks.sys
    0xF7B06000 \SystemRoot\System32\Drivers\GEARAspiWDM.sys
    0xF7D6C000 \SystemRoot\system32\DRIVERS\lmimirr.sys
    0xF77F6000 \SystemRoot\system32\DRIVERS\splitcam.sys
    0xF7806000 \SystemRoot\system32\DRIVERS\STREAM.SYS
    0xF7D6F000 \SystemRoot\system32\DRIVERS\audstub.sys
    0xF78E6000 \SystemRoot\system32\DRIVERS\rasl2tp.sys
    0xF6433000 \SystemRoot\system32\DRIVERS\ndistapi.sys
    0xF5D4B000 \SystemRoot\system32\DRIVERS\ndiswan.sys
    0xF7916000 \SystemRoot\system32\DRIVERS\raspppoe.sys
    0xF78F6000 \SystemRoot\system32\DRIVERS\raspptp.sys
    0xF7B2E000 \SystemRoot\system32\DRIVERS\TDI.SYS
    0xF5D3A000 \SystemRoot\system32\DRIVERS\psched.sys
    0xF7846000 \SystemRoot\system32\DRIVERS\msgpc.sys
    0xF3935000 \SystemRoot\system32\DRIVERS\ptilink.sys
    0xF392D000 \SystemRoot\system32\DRIVERS\raspti.sys
    0xF3487000 \SystemRoot\system32\DRIVERS\termdd.sys
    0xF7CE2000 \SystemRoot\system32\DRIVERS\swenum.sys
    0xECEE8000 \SystemRoot\system32\DRIVERS\update.sys
    0xF74A1000 \SystemRoot\system32\DRIVERS\mssmbios.sys
    0xF7CE4000 \SystemRoot\system32\DRIVERS\NBSMI.sys
    0xF03E0000 \SystemRoot\System32\Drivers\NDProxy.SYS
    0xAA3F3000 \SystemRoot\system32\drivers\RtkHDAud.sys
    0xAA3CF000 \SystemRoot\system32\drivers\portcls.sys
    0xF03B0000 \SystemRoot\system32\drivers\drmk.sys
    0xF03A0000 \SystemRoot\system32\DRIVERS\Tvs.sys
    0xF030F000 \SystemRoot\system32\DRIVERS\tsxt_kern_i386.sys
    0xA97EA000 \SystemRoot\system32\DRIVERS\wowhd_kern_i386.sys
    0xEFDE3000 \SystemRoot\system32\DRIVERS\csiidecoder_kern_i386.sys
    0xA3333000 \SystemRoot\system32\DRIVERS\AGRSM.sys
    0xEF6D4000 \SystemRoot\System32\Drivers\Modem.SYS
    0xEFDC3000 \SystemRoot\system32\DRIVERS\usbhub.sys
    0xF7CD6000 \SystemRoot\System32\Drivers\Fs_Rec.SYS
    0xA4331000 \SystemRoot\System32\Drivers\Null.SYS
    0xF7CD8000 \SystemRoot\System32\Drivers\Beep.SYS
    0xEF6AC000 \SystemRoot\System32\Drivers\DLARTL_N.SYS
    0xF7A86000 \SystemRoot\System32\drivers\vga.sys
    0xF7CDA000 \SystemRoot\System32\Drivers\mnmdd.SYS
    0xF7CDC000 \SystemRoot\System32\DRIVERS\RDPCDD.sys
    0xA3234000 \SystemRoot\system32\drivers\fwdrv.sys
    0xF7B3E000 \SystemRoot\System32\Drivers\Msfs.SYS
    0xF626A000 \SystemRoot\System32\Drivers\Npfs.SYS
    0xA41BB000 \SystemRoot\system32\DRIVERS\rasacd.sys
    0xA3221000 \SystemRoot\system32\DRIVERS\ipsec.sys
    0xA31C8000 \SystemRoot\system32\DRIVERS\tcpip.sys
    0xA31A0000 \SystemRoot\system32\DRIVERS\netbt.sys
    0xA317A000 \SystemRoot\system32\DRIVERS\ipnat.sys
    0xA3158000 \SystemRoot\System32\drivers\afd.sys
    0xEFD93000 \SystemRoot\system32\DRIVERS\netbios.sys
    0xF6262000 \SystemRoot\system32\DRIVERS\ssmdrv.sys
    0xA312D000 \SystemRoot\system32\DRIVERS\rdbss.sys
    0xA30BD000 \SystemRoot\system32\DRIVERS\mrxsmb.sys
    0xEFD83000 \SystemRoot\system32\DRIVERS\wanarp.sys
    0xA30A8000 \SystemRoot\system32\drivers\khips.sys
    0xEFD73000 \SystemRoot\system32\DRIVERS\arp1394.sys
    0xEFD63000 \SystemRoot\System32\Drivers\Fips.SYS
    0xA3047000 \??\C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys
    0xA3021000 \SystemRoot\system32\DRIVERS\avipbb.sys
    0xF7CF0000 \??\C:\Program Files\Avira\AntiVir Desktop\avgio.sys
    0xF34C7000 \SystemRoot\System32\Drivers\Cdfs.SYS
    0xA3AB6000 \SystemRoot\system32\DRIVERS\hidusb.sys
    0xF34B7000 \SystemRoot\system32\DRIVERS\HIDCLASS.SYS
    0xA3A92000 \SystemRoot\system32\DRIVERS\HIDPARSE.SYS
    0xA3AAE000 \SystemRoot\system32\DRIVERS\mouhid.sys
    0xA3009000 \SystemRoot\System32\Drivers\dump_atapi.sys
    0xF7CF8000 \SystemRoot\System32\Drivers\dump_WMILIB.SYS
    0xBF800000 \SystemRoot\System32\win32k.sys
    0xF6A0F000 \SystemRoot\System32\drivers\Dxapi.sys
    0xA3A82000 \SystemRoot\System32\watchdog.sys
    0xBF000000 \SystemRoot\System32\drivers\dxg.sys
    0xA6DCA000 \SystemRoot\System32\drivers\dxgthk.sys
    0xBF012000 \SystemRoot\System32\ati2dvag.dll
    0xBF054000 \SystemRoot\System32\ati2cqag.dll
    0xBF08E000 \SystemRoot\System32\atikvmag.dll
    0xBF0C4000 \SystemRoot\System32\ati3duag.dll
    0xBF32B000 \SystemRoot\System32\ativvaxx.dll
    0xBFFA0000 \SystemRoot\System32\ATMFD.DLL
    0xA0FF4000 \SystemRoot\system32\DRIVERS\avgntflt.sys
    0xF49E6000 \SystemRoot\System32\Drivers\DRVNDDM.SYS
    0xF6282000 \SystemRoot\system32\DRIVERS\tifsfilt.sys
    0xA6DC7000 \SystemRoot\System32\DLA\DLADResN.SYS
    0xA0FDE000 \SystemRoot\System32\DLA\DLAIFS_M.SYS
    0xA4CA0000 \SystemRoot\System32\DLA\DLAOPIOM.SYS
    0xA9659000 \SystemRoot\System32\DLA\DLAPoolM.SYS
    0xF6272000 \SystemRoot\System32\DLA\DLABOIOM.SYS
    0xA0FC6000 \SystemRoot\System32\DLA\DLAUDFAM.SYS
    0xA0FB0000 \SystemRoot\System32\DLA\DLAUDF_M.SYS
    0xF7A66000 \SystemRoot\system32\DRIVERS\AegisP.sys
    0xF74D6000 \SystemRoot\system32\DRIVERS\s24trans.sys
    0xA0FA8000 \SystemRoot\system32\DRIVERS\ndisuio.sys
    0xA0F9C000 \SystemRoot\system32\DRIVERS\netdevio.sys
    0xA0E93000 \SystemRoot\system32\DRIVERS\mrxdav.sys
    0xF7CCA000 \??\C:\Program Files\LogMeIn\x86\RaInfo.sys
    0xA0DB6000 \SystemRoot\system32\drivers\wdmaud.sys
    0xF7936000 \SystemRoot\system32\drivers\sysaudio.sys
    0xF49C6000 \??\C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
    0xF42AB000 \SystemRoot\system32\DRIVERS\secdrv.sys
    0xA057D000 \SystemRoot\System32\Drivers\HTTP.sys
    0x9FFEE000 \??\C:\DOCUME~1\Malin\LOCALS~1\Temp\fxtdapob.sys
    0x9FFC3000 \SystemRoot\system32\drivers\kmixer.sys
    0x7C900000 \WINDOWS\system32\ntdll.dll

    Processes (total 41):
    0 System Idle Process
    4 System
    1000 C:\WINDOWS\system32\smss.exe
    1068 csrss.exe
    1100 C:\WINDOWS\system32\winlogon.exe
    1148 C:\WINDOWS\system32\services.exe
    1168 C:\WINDOWS\system32\lsass.exe
    1372 C:\WINDOWS\system32\ati2evxx.exe
    1392 C:\WINDOWS\system32\svchost.exe
    1484 svchost.exe
    1528 C:\WINDOWS\system32\svchost.exe
    1600 C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    1788 C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    2004 svchost.exe
    684 C:\WINDOWS\system32\spoolsv.exe
    728 C:\Program Files\Avira\AntiVir Desktop\sched.exe
    776 svchost.exe
    864 C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    920 C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    944 C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    952 C:\Program Files\Toshiba\ConfigFree\CFSvcs.exe
    1060 C:\Program Files\Java\jre6\bin\jqs.exe
    1076 C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
    1124 C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
    1428 C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
    1632 C:\Program Files\LogMeIn\x86\ramaint.exe
    1612 C:\Program Files\LogMeIn\x86\LogMeIn.exe
    1836 C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
    2036 C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    624 C:\WINDOWS\system32\svchost.exe
    856 C:\WINDOWS\system32\ati2evxx.exe
    1896 C:\Program Files\Google\Update\GoogleUpdate.exe
    380 C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe
    2128 C:\WINDOWS\explorer.exe
    2812 C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    2872 C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    2952 C:\WINDOWS\system32\ctfmon.exe
    3408 svchost.exe
    3956 alg.exe
    2600 C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
    468 C:\Rootkit Busters\MBRCheck\MBRCheck.exe

    \\.\C: --> \\.\PhysicalDrive0 at offset 0x00000000`00007e00 (NTFS)

    PhysicalDrive0 Model Number: HTS541010G9SA00, Rev: MBZOC60D

    Size Device Name MBR Status
    --------------------------------------------
    93 GB \\.\PhysicalDrive0 Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A


    Done!

    DDS Log

    DDS (Ver_10-12-12.02) - NTFSx86
    Run by Malin at 4:43:21,45 on 2011-01-18
    Internet Explorer: 7.0.5730.11
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.535 [GMT 0:00]

    AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
    FW: Norton Internet Worm Protection *Disabled*
    FW: Sunbelt Kerio Personal Firewall *Enabled*

    ============== Running Processes ===============

    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
    C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    svchost.exe
    C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
    C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
    C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
    C:\Program Files\LogMeIn\x86\RaMaint.exe
    C:\Program Files\LogMeIn\x86\LogMeIn.exe
    C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
    C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\Program Files\Google\Update\GoogleUpdate.exe
    C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\system32\ctfmon.exe
    svchost.exe
    C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
    C:\Rootkit Busters\DDS\dds.scr

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.google.co.uk/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    mURLSearchHooks: H - No File
    BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
    BHO: Skype add-on (mastermind): {22bf413b-c6d2-4d91-82a9-a0f997ba588c} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
    BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
    BHO: : {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
    BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
    BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
    BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.6.5825.1100\swg.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
    TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
    TB: {A057A204-BACC-4D26-9990-79A187E2698E} - No File
    uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe "
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
    dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
    DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
    DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} - hxxp://upload.facebook.com/controls/FacebookPhotoUploader.cab
    DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
    DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
    DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
    DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_04-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
    DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com/activex/ractrl.cab?lmi=100
    Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
    Notify: AtiExtEvent - Ati2evxx.dll
    Notify: igfxcui - igfxdev.dll
    Notify: LMIinit - LMIinit.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

    ============= SERVICES / DRIVERS ===============

    R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2010-9-4 11608]
    R1 fwdrv;Firewall Driver;c:\windows\system32\drivers\fwdrv.sys [2006-7-18 284184]
    R1 khips;Kerio HIPS Driver;c:\windows\system32\drivers\khips.sys [2006-7-18 91672]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2010-9-4 135336]
    R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2010-9-4 267944]
    R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2010-9-4 61960]
    R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\logmein\x86\LMIGuardianSvc.exe [2010-10-10 374152]
    R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\logmein\x86\rainfo.sys [2007-8-3 12856]
    R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [2008-2-26 47640]
    S2 KillTheHooker;KillTheHooker;\??\e:\rootkit busters\tdl3 razor\tizerbruteforceex.sys --> e:\rootkit busters\tdl3 razor\TizerBruteForceEx.sys [?]
    S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\lavasoft\ad-aware\kernexplorer.sys --> c:\program files\lavasoft\ad-aware\KernExplorer.sys [?]
    S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2005-8-2 32512]
    S3 SEWModem;Sony Ericsson GC75 Wireless Modem;c:\windows\system32\drivers\GC75.sys [2006-8-14 39296]
    S3 TdsNordecr;Nordea NCR1 SmartCard Reader;c:\windows\system32\drivers\nordecr.sys [2007-10-30 23040]
    S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-5-6 11520]
    S4 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-18 135664]
    S4 LMIRfsClientNP;LMIRfsClientNP; [x]

    =============== Created Last 30 ================

    2011-01-18 03:00:49 -------- d-sha-r- C:\cmdcons
    2011-01-18 02:26:29 190032 ----a-w- c:\windows\system32\drivers\tmcomm.sys
    2011-01-18 01:45:23 -------- d-----w- c:\docume~1\malin\locals~1\applic~1\Help
    2011-01-18 01:38:20 2 --shatr- c:\windows\winstart.bat
    2011-01-18 01:13:56 -------- d-----w- c:\program files\UnHackMe
    2011-01-18 00:56:47 96512 ----a-w- c:\windows\system32\drivers\x001.sys
    2011-01-17 23:59:40 -------- d-----w- c:\docume~1\malin\applic~1\Malwarebytes
    2011-01-17 23:59:19 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-17 23:59:16 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2011-01-17 23:59:13 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-17 23:59:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-17 22:39:11 -------- d-----w- C:\Rootkit Busters
    2011-01-17 19:34:17 -------- d-----w- c:\windows\_ISTMP2.DIR
    2011-01-17 19:34:17 -------- d-----w- c:\windows\_ISTMP1.DIR

    ==================== Find3M ====================

    2011-01-17 20:29:29 768 --sha-w- C:\tlfjaezn.sys
    2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll
    2010-11-09 14:52:35 249856 ----a-w- c:\windows\system32\odbc32.dll
    2010-11-06 00:34:12 832512 ----a-w- c:\windows\system32\wininet.dll
    2010-11-06 00:34:11 78336 ----a-w- c:\windows\system32\ieencode.dll
    2010-11-06 00:34:11 1830912 ----a-w- c:\windows\system32\inetcpl.cpl
    2010-11-06 00:34:11 17408 ----a-w- c:\windows\system32\corpol.dll
    2010-11-03 12:25:53 389120 ----a-w- c:\windows\system32\html.iec
    2010-10-28 13:13:22 290048 ----a-w- c:\windows\system32\atmfd.dll
    2010-10-26 13:25:00 1853312 ----a-w- c:\windows\system32\win32k.sys

    =================== ROOTKIT ====================

    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: HTS541010G9SA00 rev.MBZOC60D -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

    device: opened successfully
    user: MBR read successfully

    Disk trace:
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x87285555]<<
    _asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8728b7b0]; MOV EAX, [0x8728b82c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
    1 nt!IofCallDriver[0x804E13B9] -> \Device\Harddisk0\DR0[0x873B7AB8]
    3 CLASSPNP[0xF77B6FD7] -> nt!IofCallDriver[0x804E13B9] -> \Device\0000008a[0x873BC9E8]
    5 ACPI[0xF770D620] -> nt!IofCallDriver[0x804E13B9] -> [0x872A2D98]
    \Driver\atapi[0x87281250] -> IRP_MJ_CREATE -> 0x87285555
    kernel: MBR read successfully
    _asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
    detected disk devices:
    \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskHTS541010G9SA00_________________________MBZOC60D#5&35291d97&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
    detected hooks:
    \Driver\atapi DriverStartIo -> 0x8728539B
    user & kernel MBR OK
    Warning: possible TDL3 rootkit infection !

    ============= FINISH: 4:45:45,96 ===============
     
  8. 2011/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I still need Attach.txt log.

    After you post it....

    Download TDSSKiller and save it to your desktop.
    • Extract (unzip) its contents to your desktop.
    • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
    • If an infected file is detected, the default action will be Cure, click on Continue.
    • If a suspicious file is detected, the default action will be Skip, click on Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
    • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
    • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
     
  9. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    Attach.txt

    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT

    DDS (Ver_10-12-12.02)

    Microsoft Windows XP Home Edition
    Boot Device: \Device\HarddiskVolume1
    Install Date: 2006-06-07 09:16:37
    System Uptime: 2011-01-18 04:05:02 (0 hours ago)

    Motherboard: Intel Corporation | | MPAD-MSAE Customer Reference Boards
    Processor: Genuine Intel(R) CPU T2300 @ 1.66GHz | U1 | 1662/mhz

    ==== Disk Partitions =========================

    C: is FIXED (NTFS) - 93 GiB total, 26,035 GiB free.
    D: is CDROM ()

    ==== Disabled Device Manager Items =============

    ==== System Restore Points ===================

    No restore point in system.

    ==== Installed Programs ======================

    AC3Filter (remove only)
    Acronis*True*Image*Home
    Adobe AIR
    Adobe Anchor Service CS3
    Adobe Asset Services CS3
    Adobe Bridge CS3
    Adobe Bridge Start Meeting
    Adobe Camera Raw 4.0
    Adobe CMaps
    Adobe Default Language CS3
    Adobe ExtendScript Toolkit 2
    Adobe Extension Manager CS3
    Adobe Fireworks CS3
    Adobe Flash Player 10 ActiveX
    Adobe Flash Player 10 Plugin
    Adobe Help Viewer CS3
    Adobe PDF Library Files
    Adobe Reader 7.1.0
    Adobe Setup
    Adobe Shockwave Player
    Adobe Type Support
    Adobe Update Manager CS3
    Adobe Version Cue CS3 Client
    Adobe XMP Panels CS3
    Apple Mobile Device Support
    Apple Software Update
    ATI - Software Uninstall Utility
    ATI Catalyst Control Center
    ATI Display Driver
    AutoUpdate
    Avira AntiVir Personal - Free Antivirus
    BBC iPlayer Desktop
    BBC iPlayer Download Manager
    BCL easyConverter SDK 1.0.0 Module
    Bluetooth Stack for Windows by Toshiba
    CCleaner
    CD/DVD Drive Acoustic Silencer
    Compatibility Pack for the 2007 Office system
    Critical Update for Windows Media Player 11 (KB959772)
    Defraggler
    DivX Codec
    DivX Converter
    DivX Player
    DivX Web Player
    ESET Online Scanner v3
    Facebook Plug-In
    Family Tree Maker 2008
    Google Chrome
    Google Earth
    Google Toolbar for Internet Explorer
    Google Update Helper
    High Definition Audio Driver Package - KB888111
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
    Hotfix for Windows Internet Explorer 7 (KB947864)
    Hotfix for Windows Media Format 11 SDK (KB929399)
    Hotfix for Windows Media Player 11 (KB939683)
    Hotfix for Windows XP (KB2158563)
    Hotfix for Windows XP (KB2443685)
    Hotfix for Windows XP (KB952287)
    Hotfix for Windows XP (KB954550-v5)
    Hotfix for Windows XP (KB961118)
    Hotfix for Windows XP (KB970653-v3)
    Hotfix for Windows XP (KB976002-v5)
    Hotfix for Windows XP (KB976098-v2)
    Hotfix for Windows XP (KB979306)
    Hotfix for Windows XP (KB981793)
    Intel(R) PRO Network Connections Drivers
    Intel(R) PROSet/Wireless Software
    InterVideo WinDVD Creator 2
    InterVideo WinDVD for TOSHIBA
    iTunes
    J2SE Runtime Environment 5.0 Update 4
    Java Auto Updater
    Java(TM) 6 Update 20
    KODAK Gallery Upload Software
    LogMeIn
    Macromedia Dreamweaver 3
    Macromedia Fireworks 3
    Macromedia Flash Player
    Malwarebytes' Anti-Malware
    mCore
    mDrWiFi
    mHelp
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1 Security Update (KB2416447)
    Microsoft .NET Framework 1.1 Security Update (KB979906)
    Microsoft .NET Framework 2.0 Service Pack 2
    Microsoft .NET Framework 3.0 Service Pack 2
    Microsoft .NET Framework 3.5 SP1
    Microsoft Compression Client Pack 1.0 for Windows XP
    Microsoft Internationalized Domain Names Mitigation APIs
    Microsoft National Language Support Downlevel APIs
    Microsoft Office OneNote 2003
    Microsoft Office Professional Edition 2003
    Microsoft Primary Interoperability Assemblies 2005
    Microsoft User-Mode Driver Framework Feature Pack 1.0
    Microsoft Visual C++ 2005 Redistributable
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
    Microsoft Works
    Microsoft WSE 3.0
    mIWA
    mLogView
    mMHouse
    Move Networks Media Player for Internet Explorer
    mPfMgr
    mPfWiz
    mProSafe
    MSXML 4.0 SP2 (KB927978)
    MSXML 4.0 SP2 (KB936181)
    MSXML 4.0 SP2 (KB954430)
    MSXML 4.0 SP2 (KB973688)
    mWlsSafe
    mXML
    mZConfig
    Network Stumbler 0.4.0 (remove only)
    Pettson1
    Puzzler Sudoku
    QuickTime
    RealPlayer
    Realtek High Definition Audio Driver
    Reg Tool
    SD Secure Module
    Security Update for Microsoft .NET Framework 3.5 SP1 (KB2416473)
    Security Update for Step By Step Interactive Training (KB898458)
    Security Update for Step By Step Interactive Training (KB923723)
    Security Update for Windows Internet Explorer 7 (KB2183461)
    Security Update for Windows Internet Explorer 7 (KB2360131)
    Security Update for Windows Internet Explorer 7 (KB2416400)
    Security Update for Windows Internet Explorer 7 (KB928090)
    Security Update for Windows Internet Explorer 7 (KB929969)
    Security Update for Windows Internet Explorer 7 (KB931768)
    Security Update for Windows Internet Explorer 7 (KB933566)
    Security Update for Windows Internet Explorer 7 (KB937143)
    Security Update for Windows Internet Explorer 7 (KB938127)
    Security Update for Windows Internet Explorer 7 (KB939653)
    Security Update for Windows Internet Explorer 7 (KB942615)
    Security Update for Windows Internet Explorer 7 (KB944533)
    Security Update for Windows Internet Explorer 7 (KB950759)
    Security Update for Windows Internet Explorer 7 (KB953838)
    Security Update for Windows Internet Explorer 7 (KB956390)
    Security Update for Windows Internet Explorer 7 (KB958215)
    Security Update for Windows Internet Explorer 7 (KB960714)
    Security Update for Windows Internet Explorer 7 (KB961260)
    Security Update for Windows Internet Explorer 7 (KB963027)
    Security Update for Windows Internet Explorer 7 (KB969897)
    Security Update for Windows Internet Explorer 7 (KB972260)
    Security Update for Windows Internet Explorer 7 (KB974455)
    Security Update for Windows Internet Explorer 7 (KB976325)
    Security Update for Windows Internet Explorer 7 (KB978207)
    Security Update for Windows Internet Explorer 7 (KB982381)
    Security Update for Windows Media Player (KB2378111)
    Security Update for Windows Media Player (KB911564)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player (KB954155)
    Security Update for Windows Media Player (KB968816)
    Security Update for Windows Media Player (KB973540)
    Security Update for Windows Media Player (KB975558)
    Security Update for Windows Media Player (KB978695)
    Security Update for Windows Media Player 10 (KB911565)
    Security Update for Windows Media Player 10 (KB917734)
    Security Update for Windows Media Player 10 (KB936782)
    Security Update for Windows Media Player 11 (KB936782)
    Security Update for Windows Media Player 11 (KB954154)
    Security Update for Windows Media Player 6.4 (KB925398)
    Security Update for Windows XP (KB2079403)
    Security Update for Windows XP (KB2115168)
    Security Update for Windows XP (KB2121546)
    Security Update for Windows XP (KB2160329)
    Security Update for Windows XP (KB2229593)
    Security Update for Windows XP (KB2259922)
    Security Update for Windows XP (KB2279986)
    Security Update for Windows XP (KB2286198)
    Security Update for Windows XP (KB2296011)
    Security Update for Windows XP (KB2296199)
    Security Update for Windows XP (KB2347290)
    Security Update for Windows XP (KB2360937)
    Security Update for Windows XP (KB2387149)
    Security Update for Windows XP (KB2419632)
    Security Update for Windows XP (KB2423089)
    Security Update for Windows XP (KB2436673)
    Security Update for Windows XP (KB2440591)
    Security Update for Windows XP (KB2443105)
    Security Update for Windows XP (KB923561)
    Security Update for Windows XP (KB923689)
    Security Update for Windows XP (KB938464-v2)
    Security Update for Windows XP (KB938464)
    Security Update for Windows XP (KB941569)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950760)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951066)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB951376)
    Security Update for Windows XP (KB951698)
    Security Update for Windows XP (KB951748)
    Security Update for Windows XP (KB952004)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB953839)
    Security Update for Windows XP (KB954211)
    Security Update for Windows XP (KB954459)
    Security Update for Windows XP (KB954600)
    Security Update for Windows XP (KB955069)
    Security Update for Windows XP (KB956391)
    Security Update for Windows XP (KB956572)
    Security Update for Windows XP (KB956744)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956803)
    Security Update for Windows XP (KB956841)
    Security Update for Windows XP (KB956844)
    Security Update for Windows XP (KB957095)
    Security Update for Windows XP (KB957097)
    Security Update for Windows XP (KB958644)
    Security Update for Windows XP (KB958687)
    Security Update for Windows XP (KB958690)
    Security Update for Windows XP (KB958869)
    Security Update for Windows XP (KB959426)
    Security Update for Windows XP (KB960225)
    Security Update for Windows XP (KB960715)
    Security Update for Windows XP (KB960803)
    Security Update for Windows XP (KB960859)
    Security Update for Windows XP (KB961371)
    Security Update for Windows XP (KB961373)
    Security Update for Windows XP (KB961501)
    Security Update for Windows XP (KB968537)
    Security Update for Windows XP (KB969059)
    Security Update for Windows XP (KB969898)
    Security Update for Windows XP (KB969947)
    Security Update for Windows XP (KB970238)
    Security Update for Windows XP (KB970430)
    Security Update for Windows XP (KB971468)
    Security Update for Windows XP (KB971486)
    Security Update for Windows XP (KB971557)
    Security Update for Windows XP (KB971633)
    Security Update for Windows XP (KB971657)
    Security Update for Windows XP (KB971961)
    Security Update for Windows XP (KB972270)
    Security Update for Windows XP (KB973346)
    Security Update for Windows XP (KB973354)
    Security Update for Windows XP (KB973507)
    Security Update for Windows XP (KB973525)
    Security Update for Windows XP (KB973869)
    Security Update for Windows XP (KB973904)
    Security Update for Windows XP (KB974112)
    Security Update for Windows XP (KB974318)
    Security Update for Windows XP (KB974392)
    Security Update for Windows XP (KB974571)
    Security Update for Windows XP (KB975025)
    Security Update for Windows XP (KB975467)
    Security Update for Windows XP (KB975560)
    Security Update for Windows XP (KB975561)
    Security Update for Windows XP (KB975562)
    Security Update for Windows XP (KB975713)
    Security Update for Windows XP (KB977165)
    Security Update for Windows XP (KB977816)
    Security Update for Windows XP (KB977914)
    Security Update for Windows XP (KB978037)
    Security Update for Windows XP (KB978251)
    Security Update for Windows XP (KB978262)
    Security Update for Windows XP (KB978338)
    Security Update for Windows XP (KB978542)
    Security Update for Windows XP (KB978601)
    Security Update for Windows XP (KB978706)
    Security Update for Windows XP (KB979309)
    Security Update for Windows XP (KB979482)
    Security Update for Windows XP (KB979559)
    Security Update for Windows XP (KB979683)
    Security Update for Windows XP (KB979687)
    Security Update for Windows XP (KB980195)
    Security Update for Windows XP (KB980218)
    Security Update for Windows XP (KB980232)
    Security Update for Windows XP (KB980436)
    Security Update for Windows XP (KB981322)
    Security Update for Windows XP (KB981349)
    Security Update for Windows XP (KB981852)
    Security Update for Windows XP (KB981957)
    Security Update for Windows XP (KB981997)
    Security Update for Windows XP (KB982132)
    Security Update for Windows XP (KB982214)
    Security Update for Windows XP (KB982665)
    Security Update for Windows XP (KB982802)
    Skypeâ„¢ 3.5
    Sonic DLA
    Sonic RecordNow!
    Sony Ericsson GC75 Manager
    SplitCam
    Spotify
    Spybot - Search & Destroy
    Spybot - Search & Destroy 1.4
    Sunbelt Kerio Personal Firewall
    Synaptics Pointing Device Driver
    Texas Instruments PCIxx21/x515/xx12 drivers.
    TIPCI
    TOSHIBA Assist
    TOSHIBA ConfigFree
    TOSHIBA Controls
    TOSHIBA Hotkey Utility
    TOSHIBA Manuals
    TOSHIBA PC Diagnostic Tool
    TOSHIBA Power Saver
    TOSHIBA SD Memory Card Format
    TOSHIBA Software Modem
    TOSHIBA TouchPad ON/Off Utility
    TOSHIBA Utilities
    TOSHIBA Virtual Sound
    TOSHIBA Zooming Utility
    Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
    Update for Windows Internet Explorer 7 (KB976749)
    Update for Windows XP (KB2141007)
    Update for Windows XP (KB2345886)
    Update for Windows XP (KB2467659)
    Update for Windows XP (KB951072-v2)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955759)
    Update for Windows XP (KB955839)
    Update for Windows XP (KB967715)
    Update for Windows XP (KB968389)
    Update for Windows XP (KB971737)
    Update for Windows XP (KB973687)
    Update for Windows XP (KB973815)
    WebFldrs XP
    Windows Genuine Advantage Notifications (KB905474)
    Windows Genuine Advantage Validation Tool (KB892130)
    Windows Internet Explorer 7
    Windows Media Format 11 runtime
    Windows Media Player 11
    Windows XP Service Pack 3
    WinPcap 3.1
    Visual C++ 2008 x86 Runtime - (v9.0.30729)
    Visual C++ 2008 x86 Runtime - v9.0.30729.01
    WM Recorder 11.2

    ==== Event Viewer Messages From Past Week ========

    2011-01-18 01:18:51, error: DCOM [10005] - DCOM got error "%1058" attempting to start the service gupdate with arguments "/comsvc" in order to run the server: {E225E692-4B47-4777-9BED-4FD7FE257F0E}
    2011-01-18 01:18:50, error: DCOM [10005] - DCOM got error "%1058" attempting to start the service gusvc with arguments " " in order to run the server: {89DAE4CD-9F17-4980-902A-99BA84A8F5C8}
    2011-01-18 01:14:09, error: Service Control Manager [7006] - The ScRegSetValueExW call failed for ImagePath with the following error: Access is denied.
    2011-01-18 00:23:48, error: atapi [9] - The device, \Device\Ide\IdePort0, did not respond within the timeout period.
    2011-01-18 00:20:09, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000001' while processing the file '' on the volume 'HarddiskVolume1'. It has stopped monitoring the volume.
    2011-01-17 23:57:05, error: Service Control Manager [7034] - The LogMeIn service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 23:57:05, error: Service Control Manager [7034] - The LogMeIn Maintenance Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 23:57:05, error: Service Control Manager [7034] - The LMIGuardianSvc service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 23:57:05, error: Service Control Manager [7034] - The ConfigFree Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 23:57:05, error: Service Control Manager [7034] - The Acronis Scheduler2 Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 23:57:05, error: Service Control Manager [7031] - The Lavasoft Ad-Aware Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 5000 milliseconds: Restart the service.
    2011-01-17 23:57:05, error: Service Control Manager [7031] - The Apple Mobile Device service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.
    2011-01-17 23:56:52, error: Service Control Manager [7034] - The Ati HotKey Poller service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 22:43:14, error: Removable Storage Service [111] - RSM could not load media in drive Drive 0 of library USB DISK 2.0 USB Device.
    2011-01-17 20:55:09, error: Service Control Manager [7034] - The Intel(R) PROSet/Wireless Registry Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 20:55:05, error: Service Control Manager [7034] - The Java Quick Starter service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 20:55:02, error: Service Control Manager [7034] - The Intel(R) PROSet/Wireless Event Log service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 20:54:57, error: Service Control Manager [7034] - The Intel(R) PROSet/Wireless Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 20:54:02, error: Service Control Manager [7034] - The TOSHIBA Application Service service terminated unexpectedly. It has done this 1 time(s).
    2011-01-17 20:48:15, error: DCOM [10005] - DCOM got error "%1058" attempting to start the service BITS with arguments " " in order to run the server: {4991D34B-80A1-4291-83B6-3328366B9097}
    2011-01-17 19:36:00, error: Service Control Manager [7034] - The Sunbelt Kerio Personal Firewall 4 service terminated unexpectedly. It has done this 1 time(s).
    2011-01-15 17:17:14, error: W32Time [17] - Time Provider NtpClient: An error occurred during DNS lookup of the manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 15 minutes. The error was: A socket operation was attempted to an unreachable host. (0x80072751)

    ==== End Of File ===========================


    Running TDSSKiller now
     
  10. 2011/01/17
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    TDSSKiller found the following Rootkit.win32.TDSS.tdl4 and tried to cure it along with reboot.

    TDSSKiller Log

    2011/01/18 05:42:42.0296 TDSS rootkit removing tool 2.4.13.0 Jan 12 2011 09:51:11
    2011/01/18 05:42:42.0296 ================================================================================
    2011/01/18 05:42:42.0296 SystemInfo:
    2011/01/18 05:42:42.0296
    2011/01/18 05:42:42.0296 OS Version: 5.1.2600 ServicePack: 3.0
    2011/01/18 05:42:42.0296 Product type: Workstation
    2011/01/18 05:42:42.0296 ComputerName: LARRY
    2011/01/18 05:42:42.0296 UserName: Malin
    2011/01/18 05:42:42.0296 Windows directory: C:\WINDOWS
    2011/01/18 05:42:42.0296 System windows directory: C:\WINDOWS
    2011/01/18 05:42:42.0296 Processor architecture: Intel x86
    2011/01/18 05:42:42.0296 Number of processors: 2
    2011/01/18 05:42:42.0296 Page size: 0x1000
    2011/01/18 05:42:42.0296 Boot type: Normal boot
    2011/01/18 05:42:42.0296 ================================================================================
    2011/01/18 05:42:42.0656 Initialize success
    2011/01/18 05:44:09.0015 ================================================================================
    2011/01/18 05:44:09.0015 Scan started
    2011/01/18 05:44:09.0015 Mode: Manual;
    2011/01/18 05:44:09.0015 ================================================================================
    2011/01/18 05:44:09.0437 61883 (914a9709fc3bf419ad2f85547f2a4832) C:\WINDOWS\system32\DRIVERS\61883.sys
    2011/01/18 05:44:09.0562 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
    2011/01/18 05:44:09.0593 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
    2011/01/18 05:44:09.0671 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
    2011/01/18 05:44:09.0734 AegisP (12dafd934641dcf61e446313bc261ec2) C:\WINDOWS\system32\DRIVERS\AegisP.sys
    2011/01/18 05:44:09.0796 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
    2011/01/18 05:44:09.0890 AgereSoftModem (b3192376c7a3814b5341efc2202022f8) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
    2011/01/18 05:44:10.0312 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
    2011/01/18 05:44:10.0437 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
    2011/01/18 05:44:10.0515 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\drivers\x001.sys
    2011/01/18 05:44:10.0640 ati2mtag (0959c83f18f8a5966afa2ec33bb96d14) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
    2011/01/18 05:44:10.0703 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
    2011/01/18 05:44:10.0750 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
    2011/01/18 05:44:11.0046 Avc (f8e6956a614f15a0860474c5e2a7de6b) C:\WINDOWS\system32\DRIVERS\avc.sys
    2011/01/18 05:44:11.0218 avgio (0b497c79824f8e1bf22fa6aacd3de3a0) C:\Program Files\Avira\AntiVir Desktop\avgio.sys
    2011/01/18 05:44:11.0296 avgntflt (47b879406246ffdced59e18d331a0e7d) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
    2011/01/18 05:44:11.0375 avipbb (da39805e2bad99d37fce9477dd94e7f2) C:\WINDOWS\system32\DRIVERS\avipbb.sys
    2011/01/18 05:44:11.0453 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
    2011/01/18 05:44:11.0890 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
    2011/01/18 05:44:11.0937 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
    2011/01/18 05:44:12.0062 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
    2011/01/18 05:44:12.0109 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
    2011/01/18 05:44:12.0187 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
    2011/01/18 05:44:12.0281 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
    2011/01/18 05:44:12.0359 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
    2011/01/18 05:44:12.0500 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
    2011/01/18 05:44:12.0546 DLABOIOM (ee4325becef51b8c32b4329097e4f301) C:\WINDOWS\system32\DLA\DLABOIOM.SYS
    2011/01/18 05:44:12.0593 DLACDBHM (d979bebcf7edcc9c9ee1857d1a68c67b) C:\WINDOWS\system32\Drivers\DLACDBHM.SYS
    2011/01/18 05:44:12.0765 DLADResN (1e6c6597833a04c2157be7b39ea92ce1) C:\WINDOWS\system32\DLA\DLADResN.SYS
    2011/01/18 05:44:12.0796 DLAIFS_M (752376e109a090970bfa9722f0f40b03) C:\WINDOWS\system32\DLA\DLAIFS_M.SYS
    2011/01/18 05:44:12.0828 DLAOPIOM (62ee7902e74b90bf1ccc4643fc6c07a7) C:\WINDOWS\system32\DLA\DLAOPIOM.SYS
    2011/01/18 05:44:12.0843 DLAPoolM (5c220124c5afeaee84a9bb89d685c17b) C:\WINDOWS\system32\DLA\DLAPoolM.SYS
    2011/01/18 05:44:12.0906 DLARTL_N (7ee0852ae8907689df25049dcd2342e8) C:\WINDOWS\system32\Drivers\DLARTL_N.SYS
    2011/01/18 05:44:12.0937 DLAUDFAM (4ebb78d9bbf072119363b35b9b3e518f) C:\WINDOWS\system32\DLA\DLAUDFAM.SYS
    2011/01/18 05:44:12.0953 DLAUDF_M (333b770e52d2cea7bd86391120466e43) C:\WINDOWS\system32\DLA\DLAUDF_M.SYS
    2011/01/18 05:44:13.0078 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
    2011/01/18 05:44:13.0140 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
    2011/01/18 05:44:13.0171 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
    2011/01/18 05:44:13.0234 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
    2011/01/18 05:44:13.0281 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
    2011/01/18 05:44:13.0390 DRVMCDB (fd0f95981fef9073659d8ec58e40aa3c) C:\WINDOWS\system32\Drivers\DRVMCDB.SYS
    2011/01/18 05:44:13.0609 DRVNDDM (b4869d320428cdc5ec4d7f5e808e99b5) C:\WINDOWS\system32\Drivers\DRVNDDM.SYS
    2011/01/18 05:44:13.0687 E100B (2646883e6dd867cd872d5b51b6036710) C:\WINDOWS\system32\DRIVERS\e100b325.sys
    2011/01/18 05:44:13.0890 eeCtrl (cf06c54cbccf071e1ee322adb8ebd982) C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys
    2011/01/18 05:44:14.0000 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
    2011/01/18 05:44:14.0078 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
    2011/01/18 05:44:14.0125 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
    2011/01/18 05:44:14.0171 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
    2011/01/18 05:44:14.0265 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
    2011/01/18 05:44:14.0578 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
    2011/01/18 05:44:14.0640 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
    2011/01/18 05:44:14.0734 fwdrv (1ff2eef447a177df2c544b80f8f7f879) C:\WINDOWS\system32\drivers\fwdrv.sys
    2011/01/18 05:44:14.0796 GEARAspiWDM (4ac51459805264affd5f6fdfb9d9235f) C:\WINDOWS\system32\Drivers\GEARAspiWDM.sys
    2011/01/18 05:44:14.0875 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
    2011/01/18 05:44:14.0953 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
    2011/01/18 05:44:14.0984 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
    2011/01/18 05:44:15.0109 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
    2011/01/18 05:44:15.0265 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
    2011/01/18 05:44:15.0546 ialm (bc1f1ff8d5800398937966cdb0a97fdc) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
    2011/01/18 05:44:15.0640 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
    2011/01/18 05:44:15.0937 IntcAzAudAddService (b12a9fc49cd2765a43829d834f518aed) C:\WINDOWS\system32\drivers\RtkHDAud.sys
    2011/01/18 05:44:16.0265 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
    2011/01/18 05:44:16.0343 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
    2011/01/18 05:44:16.0406 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
    2011/01/18 05:44:16.0453 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
    2011/01/18 05:44:16.0484 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
    2011/01/18 05:44:16.0531 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
    2011/01/18 05:44:16.0578 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
    2011/01/18 05:44:16.0625 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
    2011/01/18 05:44:16.0656 Iviaspi (f59c3569a2f2c464bb78cb1bdcdca55e) C:\WINDOWS\system32\drivers\iviaspi.sys
    2011/01/18 05:44:16.0703 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
    2011/01/18 05:44:16.0937 khips (304ce9fb3d64caa07b940bef4f8c2dcd) C:\WINDOWS\system32\drivers\khips.sys
    2011/01/18 05:44:17.0015 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
    2011/01/18 05:44:17.0125 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
    2011/01/18 05:44:17.0390 LMIInfo (4f69faaabb7db0d43e327c0b6aab40fc) C:\Program Files\LogMeIn\x86\RaInfo.sys
    2011/01/18 05:44:17.0453 lmimirr (4477689e2d8ae6b78ba34c9af4cc1ed1) C:\WINDOWS\system32\DRIVERS\lmimirr.sys
    2011/01/18 05:44:17.0531 LMIRfsDriver (3faa563ddf853320f90259d455a01d79) C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
    2011/01/18 05:44:17.0578 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
    2011/01/18 05:44:17.0765 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
    2011/01/18 05:44:17.0843 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
    2011/01/18 05:44:17.0890 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
    2011/01/18 05:44:17.0937 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
    2011/01/18 05:44:18.0015 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
    2011/01/18 05:44:18.0140 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
    2011/01/18 05:44:18.0218 MSDV (1477849772712bac69c144dcf2c9ce81) C:\WINDOWS\system32\DRIVERS\msdv.sys
    2011/01/18 05:44:18.0281 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
    2011/01/18 05:44:18.0359 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
    2011/01/18 05:44:18.0390 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
    2011/01/18 05:44:18.0406 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
    2011/01/18 05:44:18.0484 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
    2011/01/18 05:44:18.0656 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
    2011/01/18 05:44:18.0750 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
    2011/01/18 05:44:18.0796 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
    2011/01/18 05:44:18.0890 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
    2011/01/18 05:44:18.0937 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
    2011/01/18 05:44:18.0984 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
    2011/01/18 05:44:19.0015 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
    2011/01/18 05:44:19.0046 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
    2011/01/18 05:44:19.0093 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
    2011/01/18 05:44:19.0171 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
    2011/01/18 05:44:19.0234 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
    2011/01/18 05:44:19.0640 Netdevio (1265eb253ed4ebe4acb3bd5f548ff796) C:\WINDOWS\system32\DRIVERS\netdevio.sys
    2011/01/18 05:44:19.0718 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
    2011/01/18 05:44:19.0765 nm (1e421a6bcf2203cc61b821ada9de878b) C:\WINDOWS\system32\DRIVERS\NMnt.sys
    2011/01/18 05:44:19.0812 NPF (d21fee8db254ba762656878168ac1db6) C:\WINDOWS\system32\drivers\npf.sys
    2011/01/18 05:44:19.0859 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
    2011/01/18 05:44:19.0921 NSNDIS5 (53f7546e8daefb3a0813f5e19c4613c9) C:\WINDOWS\system32\NSNDIS5.SYS
    2011/01/18 05:44:20.0234 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
    2011/01/18 05:44:20.0312 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
    2011/01/18 05:44:20.0375 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
    2011/01/18 05:44:20.0406 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
    2011/01/18 05:44:20.0453 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
    2011/01/18 05:44:20.0515 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
    2011/01/18 05:44:20.0562 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
    2011/01/18 05:44:20.0593 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
    2011/01/18 05:44:20.0765 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
    2011/01/18 05:44:20.0828 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
    2011/01/18 05:44:20.0890 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
    2011/01/18 05:44:21.0078 Pfc (444f122e68db44c0589227781f3c8b3f) C:\WINDOWS\system32\drivers\pfc.sys
    2011/01/18 05:44:21.0125 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
    2011/01/18 05:44:21.0140 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
    2011/01/18 05:44:21.0203 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
    2011/01/18 05:44:21.0250 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
    2011/01/18 05:44:21.0406 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
    2011/01/18 05:44:21.0468 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
    2011/01/18 05:44:21.0500 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
    2011/01/18 05:44:21.0531 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
    2011/01/18 05:44:21.0609 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
    2011/01/18 05:44:21.0781 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
    2011/01/18 05:44:21.0843 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
    2011/01/18 05:44:21.0906 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
    2011/01/18 05:44:21.0984 s24trans (1cc074e0d48383d4e9bffc6a26c2a58a) C:\WINDOWS\system32\DRIVERS\s24trans.sys
    2011/01/18 05:44:22.0062 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys
    2011/01/18 05:44:22.0140 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
    2011/01/18 05:44:22.0234 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
    2011/01/18 05:44:22.0343 SEWModem (fc761eae609d5ce9fe9796e825dfc99b) C:\WINDOWS\system32\DRIVERS\GC75.sys
    2011/01/18 05:44:22.0500 sffdisk (0fa803c64df0914b41f807ea276bf2a6) C:\WINDOWS\system32\DRIVERS\sffdisk.sys
    2011/01/18 05:44:22.0531 sffp_sd (c17c331e435ed8737525c86a7557b3ac) C:\WINDOWS\system32\DRIVERS\sffp_sd.sys
    2011/01/18 05:44:22.0562 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
    2011/01/18 05:44:22.0640 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
    2011/01/18 05:44:22.0718 snapman (e78c98378a071ce4d48a7c514fa98fa1) C:\WINDOWS\system32\DRIVERS\snapman.sys
    2011/01/18 05:44:22.0796 SPLITCAM (c7c361a04742ab187e10583bbf4fa975) C:\WINDOWS\system32\DRIVERS\splitcam.sys
    2011/01/18 05:44:22.0859 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
    2011/01/18 05:44:22.0937 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
    2011/01/18 05:44:23.0031 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
    2011/01/18 05:44:23.0078 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
    2011/01/18 05:44:23.0125 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
    2011/01/18 05:44:23.0406 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
    2011/01/18 05:44:23.0437 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
    2011/01/18 05:44:23.0750 SynTP (e295fffff3aaf9a6a40b29497901908f) C:\WINDOWS\system32\DRIVERS\SynTP.sys
    2011/01/18 05:44:23.0781 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
    2011/01/18 05:44:23.0937 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
    2011/01/18 05:44:23.0984 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
    2011/01/18 05:44:24.0046 TdsNordecr (45fe2294261ff05aa986cdc757e7b524) C:\WINDOWS\system32\DRIVERS\nordecr.sys
    2011/01/18 05:44:24.0234 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
    2011/01/18 05:44:24.0281 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
    2011/01/18 05:44:24.0375 tifm21 (244cfbffdefb77f3df571a8cd108fc06) C:\WINDOWS\system32\drivers\tifm21.sys
    2011/01/18 05:44:24.0437 tifsfilter (d352fff2a623b916c08ceacbfc8b5c32) C:\WINDOWS\system32\DRIVERS\tifsfilt.sys
    2011/01/18 05:44:24.0515 timounter (64694b2a5c772e1c61feac300ed90ca6) C:\WINDOWS\system32\DRIVERS\timntr.sys
    2011/01/18 05:44:24.0593 tosrfec (cc069342ee0eae55b32a0ae99cf6185c) C:\WINDOWS\system32\DRIVERS\tosrfec.sys
    2011/01/18 05:44:24.0656 TVALD (676db15ddf2e0ff6ec03068dea428b8b) C:\WINDOWS\system32\DRIVERS\NBSMI.sys
    2011/01/18 05:44:24.0687 Tvs (cc6763889198ef975b143d49789bcfa9) C:\WINDOWS\system32\DRIVERS\Tvs.sys
    2011/01/18 05:44:24.0734 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
    2011/01/18 05:44:24.0812 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
    2011/01/18 05:44:25.0078 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
    2011/01/18 05:44:25.0125 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
    2011/01/18 05:44:25.0203 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
    2011/01/18 05:44:25.0265 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
    2011/01/18 05:44:25.0296 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
    2011/01/18 05:44:25.0328 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
    2011/01/18 05:44:25.0406 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
    2011/01/18 05:44:25.0484 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
    2011/01/18 05:44:25.0625 w39n51 (b1f126e7e28877106d60e6ff3998d033) C:\WINDOWS\system32\DRIVERS\w39n51.sys
    2011/01/18 05:44:25.0890 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
    2011/01/18 05:44:25.0953 WDC_SAM (d6efaf429fd30c5df613d220e344cce7) C:\WINDOWS\system32\DRIVERS\wdcsam.sys
    2011/01/18 05:44:26.0015 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
    2011/01/18 05:44:26.0156 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
    2011/01/18 05:44:26.0234 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
    2011/01/18 05:44:26.0281 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
    2011/01/18 05:44:26.0359 \HardDisk0 - detected Rootkit.Win32.TDSS.tdl4 (0)
    2011/01/18 05:44:26.0359 ================================================================================
    2011/01/18 05:44:26.0359 Scan finished
    2011/01/18 05:44:26.0359 ================================================================================
    2011/01/18 05:44:26.0375 Detected object count: 1
    2011/01/18 05:45:42.0703 \HardDisk0 - will be cured after reboot
    2011/01/18 05:45:42.0703 Rootkit.Win32.TDSS.tdl4(\HardDisk0) - User select action: Cure
    2011/01/18 05:45:46.0203 Deinitialize success
     
  11. 2011/01/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Good :)
    Things should be running little bit better for you, by now.

    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.

    [color= "Blue"]**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**[/color]
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
      • Click on [color= "Red"]this link[/color] to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • [color= "Red"]WARNING:[/color] Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG users: ComboFix will not run until AVG is uninstalled as a protective measure against the anti-virus. This is because AVG "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results ". Since AVG cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error "Illegal operation attempted on a registery key that has been marked for deletion ", restart computer to fix the issue.



    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try one of the following:

    1. Run Combofix from Safe Mode.

    2. Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
    Do NOT run it yet.

    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.

    There are 4 different versions. If one of them won't run then download and try to run the other one.

    Vista and Win7 users need to right click Rkill and choose Run as Administrator

    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    Rkill.com
    Rkill.scr
    Rkill.exe

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    If normal mode still doesn't work, run BOTH tools from safe mode.

    In case #2, please post BOTH logs, rKill and Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  12. 2011/01/18
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    ComboFix has run and produced the following report


    ComboFix 11-01-17.03 - Malin 2011-01-18 5:59.2.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.558 [GMT 0:00]
    Running from: c:\documents and settings\Malin\Desktop\ComboFix.exe
    AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
    FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
    FW: Sunbelt Kerio Personal Firewall *Enabled* {E659E0EE-10E6-49B7-8696-60F38D0EB174}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Thumbs.db

    .
    ((((((((((((((((((((((((( Files Created from 2010-12-18 to 2011-01-18 )))))))))))))))))))))))))))))))
    .

    2011-01-18 01:45 . 2011-01-18 01:45 -------- d-----w- c:\documents and settings\Malin\Local Settings\Application Data\Help
    2011-01-18 01:38 . 2011-01-18 01:38 2 --shatr- c:\windows\winstart.bat
    2011-01-18 01:13 . 2011-01-18 02:25 -------- d-----w- c:\program files\UnHackMe
    2011-01-18 00:56 . 2010-03-16 03:12 96512 ----a-w- c:\windows\system32\drivers\x001.sys
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\documents and settings\Malin\Application Data\Malwarebytes
    2011-01-17 23:59 . 2010-12-20 18:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-17 23:59 . 2010-12-20 18:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-17 22:39 . 2011-01-18 00:17 -------- d-----w- C:\Rootkit Busters
    2011-01-17 19:34 . 2011-01-17 19:35 -------- d-----w- c:\windows\_ISTMP1.DIR
    2011-01-17 19:34 . 2011-01-17 19:35 -------- d-----w- c:\windows\_ISTMP2.DIR

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2011-01-18 02:21 . 2004-08-03 22:59 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
    2010-12-21 08:48 . 2010-09-04 16:28 135096 ----a-w- c:\windows\system32\drivers\avipbb.sys
    2010-11-25 22:20 . 2010-09-04 16:28 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2010-11-18 18:12 . 2006-01-16 07:54 81920 ----a-w- c:\windows\system32\isign32.dll
    2010-11-09 14:52 . 2006-01-16 06:41 249856 ----a-w- c:\windows\system32\odbc32.dll
    2010-11-06 00:34 . 2006-01-16 06:41 832512 ----a-w- c:\windows\system32\wininet.dll
    2010-11-06 00:34 . 2006-01-16 06:40 78336 ----a-w- c:\windows\system32\ieencode.dll
    2010-11-06 00:34 . 2006-01-16 06:40 1830912 ----a-w- c:\windows\system32\inetcpl.cpl
    2010-11-06 00:34 . 2006-01-16 06:40 17408 ----a-w- c:\windows\system32\corpol.dll
    2010-11-03 22:21 . 2010-09-04 18:52 98392 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
    2010-11-03 12:25 . 2006-01-16 06:40 389120 ----a-w- c:\windows\system32\html.iec
    2010-11-02 15:17 . 2006-01-16 06:41 40960 ----a-w- c:\windows\system32\drivers\ndproxy.sys
    2010-10-28 13:13 . 2006-01-16 06:40 290048 ----a-w- c:\windows\system32\atmfd.dll
    2010-10-26 13:25 . 2006-01-16 06:41 1853312 ----a-w- c:\windows\system32\win32k.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-12-14 68856]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "TkBellExe "= "c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-06-07 180269]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
    2010-10-06 14:10 87424 ----a-w- c:\windows\system32\LMIinit.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Acronis Scheduler2 Service]
    2006-10-16 21:13 87584 ----a-w- c:\program files\Common Files\Acronis\Schedule2\schedhlp.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AcronisTimounterMonitor]
    2006-10-16 21:17 1941784 ----a-w- c:\program files\Acronis\TrueImageHome\TimounterMonitor.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AGRSMMSG]
    2005-10-15 13:29 88203 ----a-w- c:\windows\agrsmmsg.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
    2005-05-04 01:43 69632 ----a-w- c:\windows\Alcmtr.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATICCC]
    2005-08-12 14:43 45056 ----a-w- c:\program files\ATI Technologies\ATI.ACE\CLI.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\avgnt]
    2010-11-02 12:14 281768 ----a-w- c:\program files\Avira\AntiVir Desktop\avgnt.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
    2008-04-14 00:12 15360 ----a-w- c:\windows\system32\ctfmon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DLA]
    2005-10-06 05:20 122940 ----a-w- c:\windows\system32\DLA\DLACTRLW.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
    2010-01-24 11:46 135664 ----atw- c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelWireless]
    2005-11-28 10:41 602182 ----a-w- c:\program files\Intel\Wireless\Bin\iFrmewrk.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelZeroConfig]
    2005-12-05 11:37 667718 ----a-w- c:\program files\Intel\Wireless\Bin\ZCfgSvc.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    2007-07-31 17:44 271672 ----a-w- c:\program files\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogMeIn GUI]
    2007-08-03 15:09 63048 ----a-w- c:\program files\LogMeIn\x86\LogMeInSystray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    2007-06-29 05:24 286720 ----a-w- c:\program files\QuickTime\QTTask.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
    2005-12-09 22:49 15691264 ----a-w- c:\windows\RTHDCPL.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
    2007-08-25 20:54 23090984 ----a-r- c:\program files\Skype\Phone\Skype.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
    2005-05-12 10:31 118784 ----a-w- c:\program files\Toshiba\TOSHIBA Zooming Utility\SmoothView.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    2010-02-18 10:43 248040 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
    2007-12-14 13:17 68856 ----a-w- c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
    2005-12-16 23:32 761945 ----a-w- c:\program files\Synaptics\SynTP\SynTPEnh.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TDispVol]
    2005-03-11 15:03 73728 ----a-w- c:\windows\system32\TDispVol.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\THotkey]
    2006-01-05 14:02 352256 ----a-w- c:\program files\Toshiba\TOSHIBA Applet\THotkey.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    2006-06-07 08:46 180269 ----a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TOSCDSPD]
    2005-04-11 11:26 65536 ----a-w- c:\program files\Toshiba\TOSCDSPD\TOSCDSPD.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPSMain]
    2005-08-03 14:26 266240 ----a-w- c:\windows\system32\TPSMain.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TrueImageMonitor.exe]
    2006-10-16 21:12 1164912 ----a-w- c:\program files\Acronis\TrueImageHome\TrueImageMonitor.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Tvs]
    2005-11-30 12:25 73728 ----a-w- c:\program files\Toshiba\Tvs\TvsTray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "TermService "=3 (0x3)
    "SharedAccess "=2 (0x2)
    "SCardSvr "=2 (0x2)
    "RSVP "=3 (0x3)
    "RDSessMgr "=3 (0x3)
    "ose "=3 (0x3)
    "Netlogon "=3 (0x3)
    "mnmsrvc "=3 (0x3)
    "LmHosts "=2 (0x2)
    "lanmanserver "=3 (0x3)
    "iPod Service "=3 (0x3)
    "CiSvc "=3 (0x3)
    "RasMan "=3 (0x3)
    "RasAuto "=3 (0x3)
    "TapiSrv "=3 (0x3)
    "KService "=2 (0x2)
    "idsvc "=3 (0x3)
    "gusvc "=3 (0x3)
    "gupdate "=2 (0x2)
    "Browser "=2 (0x2)
    "BITS "=3 (0x3)
    "Bonjour Service "=2 (0x2)

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall "= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Macromedia\\Dreamweaver 3\\Dreamweaver.tty "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "c:\\Program Files\\Sunbelt Software\\Personal Firewall\\kpf4gui.exe "=
    "c:\\Program Files\\iTunes\\iTunes.exe "=
    "c:\\Program Files\\Kontiki\\KService.exe "=
    "c:\\Program Files\\Skype\\Phone\\Skype.exe "=
    "c:\\Documents and Settings\\Malin\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe "=

    R1 fwdrv;Firewall Driver;c:\windows\system32\drivers\fwdrv.sys [2006-07-18 284184]
    R1 khips;Kerio HIPS Driver;c:\windows\system32\drivers\khips.sys [2006-07-18 91672]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [2010-09-04 135336]
    R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [2010-10-10 374152]
    R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [2007-08-03 12856]
    S2 KillTheHooker;KillTheHooker;\??\e:\rootkit busters\TDL3 Razor\TizerBruteForceEx.sys --> e:\rootkit busters\TDL3 Razor\TizerBruteForceEx.sys [?]
    S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]
    S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2005-08-02 32512]
    S3 SEWModem;Sony Ericsson GC75 Wireless Modem;c:\windows\system32\drivers\GC75.sys [2006-08-14 39296]
    S3 TdsNordecr;Nordea NCR1 SmartCard Reader;c:\windows\system32\drivers\nordecr.sys [2007-10-30 23040]
    S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-05-06 11520]
    S4 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 135664]
    .
    Contents of the 'Scheduled Tasks' folder

    2011-01-11 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-07-25 12:15]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 02:34]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 02:34]

    2011-01-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-414378848-1182963850-3581767315-1006Core.job
    - c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-01-24 11:46]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-414378848-1182963850-3581767315-1006UA.job
    - c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-01-24 11:46]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2011-01-18 06:07
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\atapi]
    "ImagePath "=multi: "system32\drivers\x001.sys\00system32\drivers\iaStor. "

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\atapi]
    "ImagePath "=multi: "system32\drivers\x001.sys\00system32\drivers\iaStor. "
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(1100)
    c:\windows\system32\Ati2evxx.dll
    c:\windows\system32\LMIinit.dll
    c:\windows\system32\LMIRfsClientNP.dll
    .
    Completion time: 2011-01-18 06:11:05
    ComboFix-quarantined-files.txt 2011-01-18 06:11
    ComboFix2.txt 2011-01-18 03:37

    Pre-Run: 27*827*032*064 bytes free
    Post-Run: 27*812*245*504 bytes free

    - - End Of File - - E0B6CD90A8A9016FD5B14A2CB73028A0
     
  13. 2011/01/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You have some Norton's leftovers.
    Please, run this tool to remove them: http://us.norton.com/support/kb/web_view.jsp?wv_type=public_web&docurl=20080710133834EN

    ===============================================================

    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    c:\windows\winstart.bat
    c:\windows\system32\drivers\x001.sys
    c:\windows\Alcmtr.exe
    
    
    Folder::
    c:\windows\_ISTMP1.DIR
    c:\windows\_ISTMP2.DIR
    
    
    Registry::
    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\atapi]
     "ImagePath "=system32\drivers\atapi.sys
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
    
    

    3. Save the above as CFScript.txt

    4. Close/disable all anti virus and anti malware programs again, so they do not interfere with the running of ComboFix.

    5. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    6. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt


    Bed time here, so I'll check on you tomorrow morning :)
     
  14. 2011/01/18
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    Ah can finally get a page to load using google chrome. Excellent!

    Do I need to perform any further tests or cleanup?
     
  15. 2011/01/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Yes, cleaning process, once started has to be finished, if you don't want to be back here really soon.
    Please, continue with my previous instructions.
     
  16. 2011/01/19
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    Sorry my last post was placed before reading the next stage.

    Here are the latest logs

    combofix log

    ComboFix 11-01-17.03 - Malin 2011-01-18 6:44.3.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.561 [GMT 0:00]
    Running from: c:\documents and settings\Malin\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Malin\Desktop\CFScript.txt
    AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
    FW: Norton Internet Worm Protection *Disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
    FW: Sunbelt Kerio Personal Firewall *Enabled* {E659E0EE-10E6-49B7-8696-60F38D0EB174}

    FILE ::
    "c:\windows\Alcmtr.exe "
    "c:\windows\system32\drivers\x001.sys "
    "c:\windows\winstart.bat "
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\windows\_ISTMP1.DIR
    c:\windows\_ISTMP1.DIR\_ISTMP0.DIR\_isres.dll
    c:\windows\_ISTMP1.DIR\_ISTMP0.DIR\Corecomp.ini
    c:\windows\_ISTMP1.DIR\_ISTMP0.DIR\Ctl3d32.dll
    c:\windows\_ISTMP1.DIR\_ISTMP0.DIR\IsUninst.728
    c:\windows\_ISTMP2.DIR
    c:\windows\_ISTMP2.DIR\_ISTMP0.DIR\_isres.dll
    c:\windows\_ISTMP2.DIR\_ISTMP0.DIR\Corecomp.ini
    c:\windows\_ISTMP2.DIR\_ISTMP0.DIR\Ctl3d32.dll
    c:\windows\_ISTMP2.DIR\_ISTMP0.DIR\IsUninst.728
    c:\windows\Alcmtr.exe
    c:\windows\system32\drivers\x001.sys
    c:\windows\winstart.bat

    .
    ((((((((((((((((((((((((( Files Created from 2010-12-18 to 2011-01-18 )))))))))))))))))))))))))))))))
    .

    2011-01-18 01:45 . 2011-01-18 01:45 -------- d-----w- c:\documents and settings\Malin\Local Settings\Application Data\Help
    2011-01-18 01:13 . 2011-01-18 02:25 -------- d-----w- c:\program files\UnHackMe
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\documents and settings\Malin\Application Data\Malwarebytes
    2011-01-17 23:59 . 2010-12-20 18:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2011-01-17 23:59 . 2011-01-17 23:59 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-17 23:59 . 2010-12-20 18:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-17 22:39 . 2011-01-18 00:17 -------- d-----w- C:\Rootkit Busters

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2011-01-18 02:21 . 2004-08-03 22:59 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
    2010-12-21 08:48 . 2010-09-04 16:28 135096 ----a-w- c:\windows\system32\drivers\avipbb.sys
    2010-11-25 22:20 . 2010-09-04 16:28 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2010-11-18 18:12 . 2006-01-16 07:54 81920 ----a-w- c:\windows\system32\isign32.dll
    2010-11-09 14:52 . 2006-01-16 06:41 249856 ----a-w- c:\windows\system32\odbc32.dll
    2010-11-06 00:34 . 2006-01-16 06:41 832512 ----a-w- c:\windows\system32\wininet.dll
    2010-11-06 00:34 . 2006-01-16 06:40 78336 ----a-w- c:\windows\system32\ieencode.dll
    2010-11-06 00:34 . 2006-01-16 06:40 1830912 ----a-w- c:\windows\system32\inetcpl.cpl
    2010-11-06 00:34 . 2006-01-16 06:40 17408 ----a-w- c:\windows\system32\corpol.dll
    2010-11-03 22:21 . 2010-09-04 18:52 98392 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
    2010-11-03 12:25 . 2006-01-16 06:40 389120 ----a-w- c:\windows\system32\html.iec
    2010-11-02 15:17 . 2006-01-16 06:41 40960 ----a-w- c:\windows\system32\drivers\ndproxy.sys
    2010-10-28 13:13 . 2006-01-16 06:40 290048 ----a-w- c:\windows\system32\atmfd.dll
    2010-10-26 13:25 . 2006-01-16 06:41 1853312 ----a-w- c:\windows\system32\win32k.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-12-14 68856]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "TkBellExe "= "c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-06-07 180269]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
    2010-10-06 14:10 87424 ----a-w- c:\windows\system32\LMIinit.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Acronis Scheduler2 Service]
    2006-10-16 21:13 87584 ----a-w- c:\program files\Common Files\Acronis\Schedule2\schedhlp.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AcronisTimounterMonitor]
    2006-10-16 21:17 1941784 ----a-w- c:\program files\Acronis\TrueImageHome\TimounterMonitor.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AGRSMMSG]
    2005-10-15 13:29 88203 ----a-w- c:\windows\agrsmmsg.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATICCC]
    2005-08-12 14:43 45056 ----a-w- c:\program files\ATI Technologies\ATI.ACE\CLI.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\avgnt]
    2010-11-02 12:14 281768 ----a-w- c:\program files\Avira\AntiVir Desktop\avgnt.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
    2008-04-14 00:12 15360 ----a-w- c:\windows\system32\ctfmon.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DLA]
    2005-10-06 05:20 122940 ----a-w- c:\windows\system32\DLA\DLACTRLW.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
    2010-01-24 11:46 135664 ----atw- c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelWireless]
    2005-11-28 10:41 602182 ----a-w- c:\program files\Intel\Wireless\Bin\iFrmewrk.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IntelZeroConfig]
    2005-12-05 11:37 667718 ----a-w- c:\program files\Intel\Wireless\Bin\ZCfgSvc.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    2007-07-31 17:44 271672 ----a-w- c:\program files\iTunes\iTunesHelper.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogMeIn GUI]
    2007-08-03 15:09 63048 ----a-w- c:\program files\LogMeIn\x86\LogMeInSystray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    2007-06-29 05:24 286720 ----a-w- c:\program files\QuickTime\QTTask.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
    2005-12-09 22:49 15691264 ----a-w- c:\windows\RTHDCPL.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
    2007-08-25 20:54 23090984 ----a-r- c:\program files\Skype\Phone\Skype.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
    2005-05-12 10:31 118784 ----a-w- c:\program files\Toshiba\TOSHIBA Zooming Utility\SmoothView.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    2010-02-18 10:43 248040 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
    2007-12-14 13:17 68856 ----a-w- c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
    2005-12-16 23:32 761945 ----a-w- c:\program files\Synaptics\SynTP\SynTPEnh.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TDispVol]
    2005-03-11 15:03 73728 ----a-w- c:\windows\system32\TDispVol.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\THotkey]
    2006-01-05 14:02 352256 ----a-w- c:\program files\Toshiba\TOSHIBA Applet\THotkey.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    2006-06-07 08:46 180269 ----a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TOSCDSPD]
    2005-04-11 11:26 65536 ----a-w- c:\program files\Toshiba\TOSCDSPD\TOSCDSPD.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPSMain]
    2005-08-03 14:26 266240 ----a-w- c:\windows\system32\TPSMain.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TrueImageMonitor.exe]
    2006-10-16 21:12 1164912 ----a-w- c:\program files\Acronis\TrueImageHome\TrueImageMonitor.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Tvs]
    2005-11-30 12:25 73728 ----a-w- c:\program files\Toshiba\Tvs\TvsTray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "TermService "=3 (0x3)
    "SharedAccess "=2 (0x2)
    "SCardSvr "=2 (0x2)
    "RSVP "=3 (0x3)
    "RDSessMgr "=3 (0x3)
    "ose "=3 (0x3)
    "Netlogon "=3 (0x3)
    "mnmsrvc "=3 (0x3)
    "LmHosts "=2 (0x2)
    "lanmanserver "=3 (0x3)
    "iPod Service "=3 (0x3)
    "CiSvc "=3 (0x3)
    "RasMan "=3 (0x3)
    "RasAuto "=3 (0x3)
    "TapiSrv "=3 (0x3)
    "KService "=2 (0x2)
    "idsvc "=3 (0x3)
    "gusvc "=3 (0x3)
    "gupdate "=2 (0x2)
    "Browser "=2 (0x2)
    "BITS "=3 (0x3)
    "Bonjour Service "=2 (0x2)

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring "=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall "= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "c:\\Program Files\\Macromedia\\Dreamweaver 3\\Dreamweaver.tty "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "c:\\Program Files\\Sunbelt Software\\Personal Firewall\\kpf4gui.exe "=
    "c:\\Program Files\\iTunes\\iTunes.exe "=
    "c:\\Program Files\\Kontiki\\KService.exe "=
    "c:\\Program Files\\Skype\\Phone\\Skype.exe "=
    "c:\\Documents and Settings\\Malin\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe "=

    R1 fwdrv;Firewall Driver;c:\windows\system32\drivers\fwdrv.sys [2006-07-18 284184]
    R1 khips;Kerio HIPS Driver;c:\windows\system32\drivers\khips.sys [2006-07-18 91672]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [2010-09-04 135336]
    R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [2010-10-10 374152]
    R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [2007-08-03 12856]
    S2 KillTheHooker;KillTheHooker;\??\e:\rootkit busters\TDL3 Razor\TizerBruteForceEx.sys --> e:\rootkit busters\TDL3 Razor\TizerBruteForceEx.sys [?]
    S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]
    S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2005-08-02 32512]
    S3 SEWModem;Sony Ericsson GC75 Wireless Modem;c:\windows\system32\drivers\GC75.sys [2006-08-14 39296]
    S3 TdsNordecr;Nordea NCR1 SmartCard Reader;c:\windows\system32\drivers\nordecr.sys [2007-10-30 23040]
    S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-05-06 11520]
    S4 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 135664]
    .
    Contents of the 'Scheduled Tasks' folder

    2011-01-11 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-07-25 12:15]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 02:34]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-18 02:34]

    2011-01-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-414378848-1182963850-3581767315-1006Core.job
    - c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-01-24 11:46]

    2011-01-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-414378848-1182963850-3581767315-1006UA.job
    - c:\documents and settings\Malin\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-01-24 11:46]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2011-01-18 06:51
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\atapi]
    "ImagePath "=multi: "system32\drivers\x001.sys\00system32\drivers\iaStor. "

    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\atapi]
    "ImagePath "=multi: "system32\drivers\x001.sys\00system32\drivers\iaStor. "
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(1100)
    c:\windows\system32\Ati2evxx.dll
    c:\windows\system32\LMIinit.dll
    c:\windows\system32\LMIRfsClientNP.dll
    .
    Completion time: 2011-01-18 06:55:27
    ComboFix-quarantined-files.txt 2011-01-18 06:55
    ComboFix2.txt 2011-01-18 06:11
    ComboFix3.txt 2011-01-18 03:37

    Pre-Run: 27*810*463*744 bytes free
    Post-Run: 27*799*248*896 bytes free

    - - End Of File - - 676AD36C6EF4EE3854449105194ECFDD
     
  17. 2011/01/19
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    That looks good :)

    How is computer doing?

    Download OTL to your Desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Under the Custom Scan box paste this in:


    netsvcs
    drivers32
    %SYSTEMDRIVE%\*.*
    %systemroot%\Fonts\*.com
    %systemroot%\Fonts\*.dll
    %systemroot%\Fonts\*.ini
    %systemroot%\Fonts\*.ini2
    %systemroot%\Fonts\*.exe
    %systemroot%\system32\spool\prtprocs\w32x86\*.*
    %systemroot%\REPAIR\*.bak1
    %systemroot%\REPAIR\*.ini
    %systemroot%\system32\*.jpg
    %systemroot%\*.jpg
    %systemroot%\*.png
    %systemroot%\*.scr
    %systemroot%\*._sy
    %APPDATA%\Adobe\Update\*.*
    %ALLUSERSPROFILE%\Favorites\*.*
    %APPDATA%\Microsoft\*.*
    %PROGRAMFILES%\*.*
    %APPDATA%\Update\*.*
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\System32\config\*.sav
    %PROGRAMFILES%\bak. /s
    %systemroot%\system32\bak. /s
    %ALLUSERSPROFILE%\Start Menu\*.lnk /x
    %systemroot%\system32\config\systemprofile\*.dat /x
    %systemroot%\*.config
    %systemroot%\system32\*.db
    %APPDATA%\Microsoft\Internet Explorer\Quick Launch\*.lnk /x
    %USERPROFILE%\Desktop\*.exe
    %PROGRAMFILES%\Common Files\*.*
    %systemroot%\*.src
    %systemroot%\install\*.*
    %systemroot%\system32\DLL\*.*
    %systemroot%\system32\HelpFiles\*.*
    %systemroot%\system32\rundll\*.*
    %systemroot%\winn32\*.*
    %systemroot%\Java\*.*
    %systemroot%\system32\test\*.*
    %systemroot%\system32\Rundll32\*.*
    %systemroot%\AppPatch\Custom\*.*
    %APPDATA%\Roaming\Microsoft\Windows\Recent\*.lnk /x
    %PROGRAMFILES%\PC-Doctor\Downloads\*.*
    %PROGRAMFILES%\Internet Explorer\*.tmp
    %PROGRAMFILES%\Internet Explorer\*.dat
    %USERPROFILE%\My Documents\*.exe
    %USERPROFILE%\*.exe
    %systemroot%\ADDINS\*.*
    %systemroot%\assembly\*.bak2
    %systemroot%\Config\*.*
    %systemroot%\REPAIR\*.bak2
    %systemroot%\SECURITY\Database\*.sdb /x
    %systemroot%\SYSTEM\*.bak2
    %systemroot%\Web\*.bak2
    %systemroot%\Driver Cache\*.*
    %PROGRAMFILES%\Mozilla Firefox\0*.exe
    %ProgramFiles%\Microsoft Common\*.*
    %ProgramFiles%\TinyProxy.
    %USERPROFILE%\Favorites\*.url /x
    %systemroot%\system32\*.bk
    %systemroot%\*.te
    %systemroot%\system32\system32\*.*
    %ALLUSERSPROFILE%\*.dat /x
    %systemroot%\system32\drivers\*.rmv
    dir /b "%systemroot%\system32\*.exe" | find /i " " /c
    dir /b "%systemroot%\*.exe" | find /i " " /c
    %PROGRAMFILES%\Microsoft\*.*
    %systemroot%\System32\Wbem\proquota.exe
    %PROGRAMFILES%\Mozilla Firefox\*.dat
    %USERPROFILE%\Cookies\*.txt /x
    %SystemRoot%\system32\fonts\*.*
    %systemroot%\system32\winlog\*.*
    %systemroot%\system32\Language\*.*
    %systemroot%\system32\Settings\*.*
    %systemroot%\system32\*.quo
    %SYSTEMROOT%\AppPatch\*.exe
    %SYSTEMROOT%\inf\*.exe
    %SYSTEMROOT%\Installer\*.exe
    %systemroot%\system32\config\*.bak2
    %systemroot%\system32\Computers\*.*
    %SystemRoot%\system32\Sound\*.*
    %SystemRoot%\system32\SpecialImg\*.*
    %SystemRoot%\system32\code\*.*
    %SystemRoot%\system32\draft\*.*
    %SystemRoot%\system32\MSSSys\*.*
    %ProgramFiles%\Javascript\*.*
    %systemroot%\pchealth\helpctr\System\*.exe /s
    %systemroot%\Web\*.exe
    %systemroot%\system32\msn\*.*
    %systemroot%\system32\*.tro
    %AppData%\Microsoft\Installer\msupdates\*.*
    %ProgramFiles%\Messenger\*.*
    %systemroot%\system32\systhem32\*.*
    %systemroot%\system\*.exe
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs
    /md5start
    /md5stop


    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  18. 2011/01/22
    sfalla

    sfalla Inactive Thread Starter

    Joined:
    2011/01/17
    Messages:
    11
    Likes Received:
    0
    Computer was looking better, things were starting to work. The only thing we noticed was that Google Chrome had switched to Swedish (my wife is swedish, but she did not configure it to do this) and we could not get it to switch back or change any settings even after uninstall/reinstall of chrome. Apparently this happened a week or so ago.

    Then on a reboot the laptop went into a startup loop, it would not boot. In safe mode it would get as far as loading mup.sys then blue screen with a message for less than 1/2 second before restarting again.

    I could get to recovery console, but that was all. I did have a project coming up to put a new HDD in that laptop, so decided to rebuild from scratch.

    It now has Win 7, and I have so far installed
    - All windows updates
    - Avira AV
    - Comodo Firewall

    Thanks for the assistance on this thread. Do you have any further recommendations for security software to install. I normally put Lavasoft's Ad-Aware and Spybot S&D, have just not got around to it yet.

    S
     
  19. 2011/01/22
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Adaware and Spybot are considered as tools of the past, so I'd skip them.
    I suggest, you stay with Malwarebytes, the best free tool, you can get.

    Thanks for letting me know and good luck :)
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.