Page 1 of 4 1234 LastLast
Results 1 to 10 of 34

Thread: virtumonde, and browser hijacked

  1. #1
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Post virtumonde, and browser hijacked

    I ran spybot s&d when it first acted up around the 12th, it found the virtumonde among other problems that it couldn't fix. I looked on here and downloaded malwarebytes and it cleared the problem up.

    Malwarebytes' Anti-Malware 1.41
    Database version: 3157
    Windows 5.1.2600 Service Pack 3

    11/13/2009 5:58:34 PM
    mbam-log-2009-11-13 (17-58-34).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 29735
    Time elapsed: 22 hour(s), 2 minute(s), 37 second(s)

    Memory Processes Infected: 3
    Memory Modules Infected: 4
    Registry Keys Infected: 6
    Registry Values Infected: 3
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 17

    Memory Processes Infected:
    C:\Documents and Settings\Branden\Local Settings\Temp\wow64main.exe (Malware.Packer) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\winhbt.exe (Malware.Packer) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Application Data\lpkste\hxjpsysguard.exe (Trojan.FakeAlert) -> Unloaded process successfully.

    Memory Modules Infected:
    C:\WINDOWS\system32\kidokelo.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\bujivisi.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\inqk.hgo (Backdoor.Bredavi) -> Delete on reboot.
    C:\WINDOWS\system32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{a45a4b15-23f2-42ad-f4e4-00aac39c0004} (Trojan.Ertfor) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a45a4b15-23f2-42ad-f4e4-00aac39c0004} (Trojan.Ertfor) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a45a4b15-23f2-42ad-f4e4-00aac39c0004} (Trojan.Ertfor) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lpbaxsoi (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lpbaxsoi (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{a45a4b15-23f2-42ad-f4e4-00aac39c0004} (Trojan.Ertfor) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\system32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\kidokelo.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\bujivisi.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\inqk.hgo (Backdoor.Bredavi) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\wow64main.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\winhbt.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Application Data\lpkste\hxjpsysguard.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\luobk.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\oqbkddrr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\2163727214.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\2636070964.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\708407444.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\9.tmp (Trojan.Waledac) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\drweb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\Installer.exe (Malware.Packer) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\wscsvc32.exe (Trojan.FakeAlert) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\smss.exe (Trojan.Downloader) -> Quarantined and deleted successfully.


    today it was back, I ran malwarebytes again and it took care of the pop-ups

    Malwarebytes' Anti-Malware 1.41
    Database version: 3157
    Windows 5.1.2600 Service Pack 3

    11/17/2009 7:11:13 PM
    mbam-log-2009-11-17 (19-11-13).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 135658
    Time elapsed: 18 minute(s), 40 second(s)

    Memory Processes Infected: 5
    Memory Modules Infected: 4
    Registry Keys Infected: 13
    Registry Values Infected: 9
    Registry Data Items Infected: 2
    Folders Infected: 0
    Files Infected: 36

    Memory Processes Infected:
    C:\Documents and Settings\Branden\Local Settings\Temp\glknrcjw3w.exe (Trojan.Dropper) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\debug.exe (Trojan.Downloader) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\user.exe (Trojan.Downloader) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\spoolsv.exe (Trojan.Downloader) -> Unloaded process successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Unloaded process successfully.

    Memory Modules Infected:
    C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.
    c:\WINDOWS\system32\6to4v32.dll (Trojan.Inject) -> Delete on reboot.
    C:\WINDOWS\system32\e5n6p5cc.dll (Trojan.Downloader) -> Delete on reboot.
    C:\WINDOWS\system32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b45a4b16-23f2-41ad-f4e4-00aac39c0004} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_CLASSES_ROOT\CLSID\{b45a4b16-23f2-41ad-f4e4-00aac39c0004} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\6to4 (Trojan.Inject) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\6to4 (Trojan.Inject) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\6to4 (Trojan.Inject) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b45a4b16-23f2-41ad-f4e4-00aac39c0004} (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\AvScan (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\daqdrv (Backdoor.Bot) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{b45a4b16-23f2-41ad-f4e4-00aac39c0004} (Trojan.Zlob.H) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WINID (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nllhfjse (Trojan.FakeAlert.N) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nllhfjse (Trojan.FakeAlert.N) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsh87r3huiehf89esiudgd (Trojan.Downloader) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\asg984jgkfmgasi8ug98jgkfgfb (Trojan.Downloader) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\system32\e5n6p5cc.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.
    c:\WINDOWS\system32\6to4v32.dll (Trojan.Inject) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\glknrcjw3w.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\debug.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\user.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\spoolsv.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\ntuser.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\1035897254.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\1424276616.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\1871867458.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\2180773708.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\307837662.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\4250461208.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\545116004.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\drweb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\win16.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\winamp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\install.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\lfkti.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\login.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\rundll32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\setup.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\system.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\taskmgr.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Start Menu\Programs\Startup\scandisk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\LocalService\ntuser.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\daqdrv.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\jisfije9fjoiee.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Application Data\jkxaou\ausssysguard.exe (Trojan.FakeAlert.N) -> Delete on reboot.
    C:\Documents and Settings\Branden\Local Settings\Temp\habnf88jkefh87ifiks.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\pskfo83wijf89uwuhal8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

    I ran it again after reboot

    Malwarebytes' Anti-Malware 1.41
    Database version: 3191
    Windows 5.1.2600 Service Pack 3

    11/17/2009 7:56:36 PM
    mbam-log-2009-11-17 (19-56-36).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 136182
    Time elapsed: 14 minute(s), 37 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 2
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 7

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Documents and Settings\Branden\ntuser.dll (Trojan.Agent) -> Delete on reboot.
    C:\Documents and Settings\Branden\Start Menu\Programs\Startup\scandisk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> Delete on reboot.
    C:\ydlcgx.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Branden\Local Settings\Temp\c.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

    IE keeps getting misdirected

    I got an hjt scan

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:25:19 PM, on 11/17/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IDT\WDM\STacSV.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\WINDOWS\system32\igfxsrvc.exe
    C:\Program Files\IDT\WDM\sttray.exe
    C:\WINDOWS\system32\AESTFltr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
    C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\Program Files\Search Settings\SearchSettings.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\AWS\WeatherBug\Weather.exe
    C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe
    C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
    C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
    F:\antivirus\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.Yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    R3 - URLSearchHook: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb128\SearchSettings.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Ask Toolbar - {3041d03e-fd4b-44e0-b742-2d9b88305f98} - C:\Program Files\AskBarDis\bar\bin\askBar.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
    O4 - HKLM\..\Run: [IDTSysTrayApp] sttray.exe
    O4 - HKLM\..\Run: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
    O4 - HKLM\..\Run: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [HP Mobile Broadband] c:\SWsetup\HPQWWAN\HPMobileBroadband.exe /TrayMode
    O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
    O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
    O4 - HKLM\..\Run: [SearchSettings] C:\Program Files\Search Settings\SearchSettings.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKLM\..\Run: [calc] rundll32.exe C:\WINDOWS\system32\calc.dll,_IWMPEvents@0
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [Weather] C:\Program Files\AWS\WeatherBug\Weather.exe 1
    O4 - HKCU\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe
    O4 - HKCU\..\Run: [winhbt.exe] C:\DOCUME~1\Branden\LOCALS~1\Temp\winhbt.exe
    O4 - HKCU\..\Run: [calc] rundll32.exe C:\DOCUME~1\NETWOR~1\ntuser.dll,_IWMPEvents@0
    O4 - Global Startup: Bluetooth.lnk = ?
    O8 - Extra context menu item: Send to &Bluetooth Device... - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
    O8 - Extra context menu item: Send To Bluetooth - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
    O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
    O9 - Extra 'Tools' menuitem: @btrez.dll,-12650 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://apps.facebook.com
    O15 - Trusted Zone: www.facebook.com
    O15 - Trusted Zone: http://cams.pichunter.com
    O16 - DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} (Windows Live Hotmail Photo Upload Tool) - http://gfx2.hotmail.com/mail/w4/pr01...l/MSNPUpld.cab
    O21 - SSODL: lozemoyom - {0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll (file missing)
    O22 - SharedTaskScheduler: jugezatag - {0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll (file missing)
    O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
    O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation. - C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - c:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: Audio Service (STacSV) - IDT, Inc. - C:\Program Files\IDT\WDM\STacSV.exe
    O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

    --
    End of file - 7253 bytes

    help please!

  2. #2
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi there,

    Download DDS and save it to your desktop from here or here or here.
    Disable any script blocker, and then double click dds.scr to run the tool.
    • When done, DDS will open two (2) logs:
      1. DDS.txt
      2. Attach.txt
    • Save both reports to your desktop. Post them back to your topic.


    Download GMER here by clicking download exe -button and then saving it your desktop:
    • Double-click .exe that you downloaded
    • Click rootkit-tab and then scan.
    • Don't check
      Show All
      box while scanning in progress!
    • When scanning is ready, click Copy.
    • This copies log to clipboard
    • Post log in your reply.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  3. #3
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Default

    DDS (Ver_09-10-26.01) - NTFSx86
    Run by Branden at 11:34:26.20 on Sat 11/21/2009
    Internet Explorer: 8.0.6001.18702
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1015.603 [GMT -5:00]

    AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IDT\WDM\STacSV.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\Program Files\IDT\WDM\sttray.exe
    C:\WINDOWS\system32\AESTFltr.exe
    C:\WINDOWS\system32\igfxsrvc.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\Program Files\Search Settings\SearchSettings.exe
    C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\AWS\WeatherBug\Weather.exe
    C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe
    C:\DOCUME~1\Branden\LOCALS~1\Temp\wow64main.exe
    C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
    C:\DOCUME~1\Branden\LOCALS~1\Temp\wscsvc32.exe
    C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
    F:\dds.scr

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.yahoo.com/
    uDefault_Page_URL = hxxp://www.Yahoo.com
    uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    uURLSearchHooks: SearchSettings Class: {e312764e-7706-43f1-8dab-fcdd2b1e416d} - c:\program files\search settings\kb128\SearchSettings.dll
    BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    TB: Ask Toolbar: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - c:\program files\askbardis\bar\bin\askBar.dll
    TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    uRun: [Weather] c:\program files\aws\weatherbug\Weather.exe 1
    uRun: [TaskSwitchXP] c:\program files\taskswitchxp\TaskSwitchXP.exe
    uRun: [winhbt.exe] c:\docume~1\branden\locals~1\temp\winhbt.exe
    uRun: [wow64main.exe] c:\docume~1\branden\locals~1\temp\wow64main.exe
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [IDTSysTrayApp] sttray.exe
    mRun: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
    mRun: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [HP Mobile Broadband] c:\swsetup\hpqwwan\HPMobileBroadband.exe /TrayMode
    mRun: [hpWirelessAssistant] c:\program files\hewlett-packard\hp wireless assistant\HPWAMain.exe
    mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
    mRun: [SearchSettings] c:\program files\search settings\SearchSettings.exe
    mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
    mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\widcomm\bluetooth software\BTTray.exe
    uPolicies-system: EnableProfileQuota = 1 (0x1)
    mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
    mPolicies-system: EnableLUA = 0 (0x0)
    IE: Send to &Bluetooth Device... - c:\program files\widcomm\bluetooth software\btsendto_ie_ctx.htm
    IE: Send To Bluetooth - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
    IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx2.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab
    Notify: igfxcui - igfxdev.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
    SSODL: lozemoyom - {0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll
    STS: jugezatag: {0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll
    LSA: Notification Packages = scecli bujivisi.dll

    ============= SERVICES / DRIVERS ===============

    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2009-8-4 108289]
    R2 YahooAUService;Yahoo! Updater;c:\program files\yahoo!\softwareupdate\YahooAUService.exe [2008-11-9 602392]
    R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2008-10-5 112128]

    =============== Created Last 30 ================

    2009-11-21 05:52:41 552 ----a-w- c:\windows\system32\d3d8caps.dat
    2009-11-13 00:48:42 0 d-----w- c:\docume~1\branden\applic~1\Malwarebytes
    2009-11-13 00:48:19 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-11-13 00:48:15 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-11-13 00:48:15 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
    2009-11-13 00:48:15 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2009-11-12 21:31:18 2713 --sh--w- c:\windows\system32\damorume.dll
    2009-11-12 21:31:16 2713 --sh--w- c:\windows\system32\nozuzito.exe
    2009-11-11 04:28:27 966 ----a-w- c:\windows\wininit.ini
    2009-11-11 00:51:13 0 ----a-w- c:\windows\Swoyiqeniwarehe.bin
    2009-11-11 00:51:10 120 ----a-w- c:\windows\Bceqeyita.dat
    2009-11-11 00:48:41 826 ----a-w- c:\windows\system32\wininit.dll
    2009-11-11 00:45:11 0 --sha-w- C:\313856957
    2009-11-02 18:10:50 8704 ----a-w- c:\windows\system32\kbdjpn.dll
    2009-11-02 18:10:50 8192 ----a-w- c:\windows\system32\kbdkor.dll
    2009-11-02 18:10:50 6144 ----a-w- c:\windows\system32\kbd101c.dll
    2009-11-02 18:10:50 5632 ----a-w- c:\windows\system32\kbd103.dll
    2009-11-02 18:10:43 6144 ----a-w- c:\windows\system32\kbd101b.dll
    2009-11-02 18:10:41 6144 ----a-w- c:\windows\system32\kbd106.dll

    ==================== Find3M ====================

    2009-10-22 09:19:04 5939712 ------w- c:\windows\system32\dllcache\mshtml.dll
    2009-09-27 15:59:25 50176 ----a-w- c:\windows\system32\utilman.exe
    2009-09-27 15:59:25 3396608 ----a-w- c:\windows\system32\logonui.exe
    2009-09-27 15:59:21 276992 ----a-w- c:\windows\system32\audiodev.dll
    2009-09-27 15:59:18 540672 ----a-w- c:\windows\system32\sti_ci.dll
    2009-09-27 15:59:18 202752 ----a-w- c:\windows\system32\tcpmonui.dll
    2009-09-27 15:58:55 987648 ----a-w- c:\windows\system32\rasdlg.dll
    2009-09-27 15:58:48 1446912 ----a-w- c:\windows\system32\ntbackup.exe
    2009-09-27 15:58:45 200704 ----a-w- c:\windows\system32\mdminst.dll
    2009-09-27 15:58:44 399360 ----a-w- c:\windows\system32\fsquirt.exe
    2009-09-27 15:58:43 808960 ----a-w- c:\windows\system32\dmdlgs.dll
    2009-09-27 15:58:43 221696 ----a-w- c:\windows\system32\fldrclnr.dll
    2009-09-27 15:58:23 218624 ----a-w- c:\windows\system32\uxtheme.dll
    2009-09-27 15:57:37 794624 ----a-w- c:\windows\system32\sstext3d.scr
    2009-09-27 15:57:36 720896 ----a-w- c:\windows\system32\sspipes.scr
    2009-09-27 15:57:36 503808 ----a-w- c:\windows\system32\ssflwbox.scr
    2009-09-27 15:57:33 819200 ----a-w- c:\windows\system32\ss3dfo.scr
    2009-09-27 15:57:33 121856 ----a-w- c:\windows\system32\scrnsave.scr
    2009-09-27 15:56:37 806400 ----a-w- c:\windows\system32\comres.dll
    2009-09-27 15:56:35 835584 ----a-w- c:\windows\system32\certmgr.dll
    2009-09-27 15:56:17 427520 ----a-w- c:\windows\system32\devmgr.dll
    2009-09-27 15:56:16 146944 ----a-w- c:\windows\system32\eventvwr.exe
    2009-09-27 15:56:15 76288 ----a-w- c:\windows\system32\mmcshext.dll
    2009-09-27 15:56:15 1449984 ----a-w- c:\windows\system32\mmc.exe
    2009-09-27 15:55:57 512000 ----a-w- c:\windows\system32\cmd.exe
    2009-09-27 15:55:48 151040 ----a-w- c:\windows\system32\sndrec32.exe
    2009-09-27 15:55:46 184320 ----a-w- c:\windows\system32\taskmgr.exe
    2009-09-27 15:55:45 733696 ----a-w- c:\windows\system32\mstsc.exe
    2009-09-27 15:55:45 589824 ----a-w- c:\windows\system32\wscript.exe
    2009-09-27 15:55:45 527360 ----a-w- c:\windows\system32\mspaint.exe
    2009-09-27 15:55:45 426496 ----a-w- c:\windows\regedit.exe
    2009-09-27 15:55:45 192000 ----a-w- c:\windows\system32\notepad.exe
    2009-09-27 15:55:44 896000 ----a-w- c:\windows\system32\spider.exe
    2009-09-27 15:55:44 693760 ----a-w- c:\windows\system32\cards.dll
    2009-09-27 15:55:44 148992 ----a-w- c:\windows\hh.exe
    2009-09-27 15:54:31 20992 ----a-w- c:\windows\system32\write.exe
    2009-09-27 15:54:30 9128448 ----a-w- c:\windows\system32\wmploc.dll
    2009-09-27 15:54:13 2671104 ----a-w- c:\windows\system32\quartz.dll
    2009-09-27 15:52:39 385536 ----a-w- c:\windows\system32\msieftp.dll
    2009-09-27 15:51:48 841216 ----a-w- c:\windows\system32\shdoclc.dll
    2009-09-27 15:51:42 206336 ----a-w- c:\windows\system32\iexpress.exe
    2009-09-27 15:51:40 163840 ----a-w- c:\windows\system32\inetcplc.dll
    2009-09-27 15:51:39 1692672 ----a-w- c:\windows\system32\winbrand.dll
    2009-09-27 15:51:34 1789952 ----a-w- c:\windows\explorer.exe
    2009-09-27 15:51:24 964608 ----a-w- c:\windows\system32\zipfldr.dll
    2009-09-27 15:50:46 3905536 ----a-w- c:\windows\system32\xpsp2res.dll
    2009-09-27 15:50:32 2765312 ----a-w- c:\windows\system32\winntbbu.dll
    2009-09-27 15:50:09 711680 ----a-w- c:\windows\system32\wiashext.dll
    2009-09-27 15:50:00 538112 ----a-w- c:\windows\system32\wiadefui.dll
    2009-09-27 15:49:53 1377792 ----a-w- c:\windows\system32\wiaacmgr.exe
    2009-09-27 15:49:14 113664 ----a-w- c:\windows\system32\verifier.exe
    2009-09-27 15:49:04 387584 ----a-w- c:\windows\system32\themeui.dll
    2009-09-27 15:49:01 91136 ----a-w- c:\windows\system32\telnet.exe
    2009-09-27 15:48:56 178176 ----a-w- c:\windows\system32\tapiui.dll
    2009-09-27 15:48:55 743424 ----a-w- c:\windows\system32\sxs.dll
    2009-09-27 15:48:55 413184 ----a-w- c:\windows\system32\sysocmgr.exe
    2009-09-27 15:48:55 387072 ----a-w- c:\windows\system32\syncui.dll
    2009-09-27 15:48:55 127488 ----a-w- c:\windows\system32\stobject.dll
    2009-09-27 15:48:55 1214976 ----a-w- c:\windows\system32\syssetup.dll
    2009-09-27 15:48:54 42496 ----a-w- c:\windows\system32\shscrap.dll
    2009-09-27 15:48:54 259584 ----a-w- c:\windows\system32\srrstr.dll
    2009-09-27 15:48:54 258560 ----a-w- c:\windows\system32\shrpubw.exe
    2009-09-27 15:48:54 147456 ----a-w- c:\windows\system32\sndvol32.exe
    2009-09-27 15:48:54 129536 ----a-w- c:\windows\system32\sigverif.exe
    2009-09-27 15:48:52 1278976 ----a-w- c:\windows\system32\shimgvw.dll
    2009-09-27 15:47:15 1439232 ----a-w- c:\windows\system32\setupapi.dll
    2009-09-27 15:47:14 88064 ----a-w- c:\windows\system32\remotepg.dll
    2009-09-27 15:47:14 29696 ----a-w- c:\windows\system32\runonce.exe
    2009-09-27 15:47:14 184320 ----a-w- c:\windows\system32\scrobj.dll
    2009-09-27 15:47:13 18944 ----a-w- c:\windows\system32\regedt32.exe
    2009-09-27 15:47:09 891392 ----a-w- c:\windows\system32\printui.dll
    2009-09-27 15:47:05 489472 ----a-w- c:\windows\system32\photowiz.dll
    2009-09-27 15:47:05 173568 ----a-w- c:\windows\system32\pifmgr.dll
    2009-09-27 15:47:04 49152 ----a-w- c:\windows\system32\odbcad32.exe
    2009-09-27 15:47:04 31232 ----a-w- c:\windows\system32\perfmon.exe
    2009-09-27 15:47:04 110592 ----a-w- c:\windows\system32\odbcint.dll
    2009-09-27 15:46:42 47104 ----a-w- c:\windows\system32\ntsd.exe
    2009-09-27 15:46:39 31744 ----a-w- c:\windows\system32\ntlanui2.dll
    2009-09-27 15:46:36 92160 ----a-w- c:\windows\system32\nslookup.exe
    2009-09-27 15:46:34 705536 ----a-w- c:\windows\system32\newdev.dll
    2009-09-27 15:46:28 2336768 ----a-w- c:\windows\system32\netshell.dll
    2009-09-27 15:46:16 2058240 ----a-w- c:\windows\system32\netplwiz.dll
    2009-09-27 15:44:59 130048 ----a-w- c:\windows\system32\input.dll
    2009-09-27 15:43:52 512512 ----a-w- c:\windows\system32\accwiz.exe
    2009-09-27 15:43:51 96256 ----a-w- c:\windows\system32\acctres.dll
    2009-09-27 15:35:04 42496 ----a-w- c:\windows\system32\XPize Logo.scr
    2009-09-27 15:35:01 1634304 ----a-w- c:\windows\system32\Windows XP 3D Flag.scr
    2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
    2009-09-11 14:18:39 136192 ------w- c:\windows\system32\dllcache\msv1_0.dll
    2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
    2009-09-04 21:03:36 58880 ------w- c:\windows\system32\dllcache\msasn1.dll
    2009-08-28 10:35:52 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe
    2009-08-26 08:00:21 247326 ------w- c:\windows\system32\strmdll.dll
    2009-08-26 08:00:21 247326 ------w- c:\windows\system32\dllcache\strmdll.dll
    2009-08-12 21:29:50 303104 --sha-w- c:\windows\system32\gakilime.exe
    2009-08-11 00:51:55 405504 --sha-w- c:\windows\system32\jeyitizo.exe
    2008-06-24 17:17:10 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\application data\microsoft\feeds cache\index.dat
    2009-08-04 20:59:38 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009080420090805\index.dat

    ============= FINISH: 11:36:56.26 ===============


    GMER 1.0.15.15252 - http://www.gmer.net
    Rootkit scan 2009-11-21 12:20:40
    Windows 5.1.2600 Service Pack 3
    Running: oqnvkq4t.exe; Driver: C:\DOCUME~1\Branden\LOCALS~1\Temp\fxldipob.sys


    ---- System - GMER 1.0.15 ----

    SSDT F7A7B58E ZwCreateKey
    SSDT F7A7B584 ZwCreateThread
    SSDT F7A7B593 ZwDeleteKey
    SSDT F7A7B59D ZwDeleteValueKey
    SSDT F7A7B5A2 ZwLoadKey
    SSDT F7A7B570 ZwOpenProcess
    SSDT F7A7B575 ZwOpenThread
    SSDT F7A7B5AC ZwReplaceKey
    SSDT F7A7B5A7 ZwRestoreKey
    SSDT F7A7B598 ZwSetValueKey
    SSDT F7A7B57F ZwTerminateProcess

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
    AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

    Device \Driver\00000207 -> \Driver\atapi \Device\Harddisk0\DR0 86D4C170

    ---- Files - GMER 1.0.15 ----

    File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

    ---- EOF - GMER 1.0.15 ----

    I ran spybot and it stopped redirecting the browser, but still found virtumonde, and disable restore. I ran malwarebytes last night. It took care of some error messages on boot up, but it started acting up again today with the false security pop-ups.

  4. #4
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Default

    I attached the attach.txt file, I can copy and post it if you'd like.

  5. #5
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Thanks for the logs


    Please visit this webpage for download links, and instructions for running ComboFix tool:

    http://www.bleepingcomputer.com/comb...o-use-combofix

    Please ensure you read this guide carefully first.


    Please continue as follows:

    1. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix, link
      Remember to re-enable them afterwards.

    2. Click Yes to allow ComboFix to continue scanning for malware.


    When the tool is finished, it will produce a report for you.

    Please include the following reports for further review, and so we may continue cleansing the system:

    C:\ComboFix.txt
    New dds log.


    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  6. #6
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Default

    ComboFix 09-11-21.01 - Branden 11/21/2009 18:46.1.2 - x86
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1015.623 [GMT -5:00]
    Running from: c:\documents and settings\Branden\Desktop\ComboFix.exe
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\program files\Search Settings
    c:\program files\Search Settings\kb128\SeARchsettings.dll
    c:\program files\Search Settings\kb128\SearchSettingsRes409.dll
    c:\program files\Search Settings\SearchSettings.exe
    c:\recycler\S-1-5-21-1770227689-2806628479-656278076-1003
    c:\recycler\S-1-5-21-2429837910-1187963566-3045481847-1003
    c:\recycler\S-1-5-21-931290050-3804774149-3105744162-1003
    c:\windows\ronfP406.dll
    c:\windows\system32\damorume.dll
    c:\windows\system32\nozuzito.exe
    c:\windows\system32\oem1.inf

    c:\windows\system32\kernel32.dll . . . is infected!!

    c:\windows\system32\proquota.exe . . . is missing!!

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_6TO4


    ((((((((((((((((((((((((( Files Created from 2009-10-22 to 2009-11-22 )))))))))))))))))))))))))))))))
    .

    2009-11-21 17:03 . 2009-11-21 23:31 -------- d-----w- c:\program files\AntiMalware
    2009-11-21 05:52 . 2009-11-21 05:52 552 ----a-w- c:\windows\system32\d3d8caps.dat
    2009-11-17 23:17 . 2009-11-18 00:12 -------- d-----w- c:\documents and settings\Branden\Local Settings\Application Data\jkxaou
    2009-11-13 00:48 . 2009-11-13 00:48 -------- d-----w- c:\documents and settings\Branden\Application Data\Malwarebytes
    2009-11-13 00:48 . 2009-09-10 19:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-11-13 00:48 . 2009-11-13 00:48 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2009-11-13 00:48 . 2009-11-13 00:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-11-13 00:48 . 2009-09-10 19:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-11-11 14:47 . 2009-11-11 14:47 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
    2009-11-11 00:51 . 2009-11-11 00:51 0 ----a-w- c:\windows\Swoyiqeniwarehe.bin
    2009-11-11 00:51 . 2009-11-11 00:51 120 ----a-w- c:\windows\Bceqeyita.dat
    2009-11-11 00:48 . 2009-11-11 00:48 826 ----a-w- c:\windows\system32\wininit.dll
    2009-11-11 00:48 . 2009-11-13 22:58 -------- d-----w- c:\documents and settings\Branden\Local Settings\Application Data\lpkste
    2009-11-02 18:10 . 2001-08-18 03:36 8704 ----a-w- c:\windows\system32\kbdjpn.dll
    2009-11-02 18:10 . 2001-08-18 03:36 8192 ----a-w- c:\windows\system32\kbdkor.dll
    2009-11-02 18:10 . 2001-08-17 19:55 6144 ----a-w- c:\windows\system32\kbd101c.dll
    2009-11-02 18:10 . 2001-08-17 19:55 5632 ----a-w- c:\windows\system32\kbd103.dll
    2009-11-02 18:10 . 2001-08-17 19:55 6144 ----a-w- c:\windows\system32\kbd101b.dll
    2009-11-02 18:10 . 2008-04-14 10:39 6144 ----a-w- c:\windows\system32\kbd106.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-12-02 06:53 . 2009-09-27 15:14 116968 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
    2009-11-21 23:21 . 2009-08-04 20:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-11-21 20:52 . 2009-08-26 21:05 -------- d-----w- c:\program files\Blubster
    2009-11-20 02:42 . 2009-08-04 20:32 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2009-11-14 05:22 . 2009-09-26 23:27 48352 ----a-w- c:\documents and settings\Branden\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-09-29 22:36 . 2009-09-29 22:36 -------- d-----w- c:\documents and settings\Branden\Application Data\Apple Computer
    2009-09-29 22:29 . 2009-09-29 22:27 -------- d-----w- c:\program files\QuickTime
    2009-09-29 22:27 . 2009-09-29 22:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
    2009-09-29 22:25 . 2009-09-29 22:25 -------- d-----w- c:\program files\Common Files\Apple
    2009-09-29 22:25 . 2009-09-29 22:24 -------- d-----w- c:\program files\Apple Software Update
    2009-09-29 22:24 . 2009-09-29 22:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
    2009-09-27 15:59 . 2008-04-15 04:00 769024 ----a-w- c:\windows\pchealth\helpctr\binaries\helpctr.exe
    2009-09-27 15:59 . 2008-04-15 04:00 50176 ----a-w- c:\windows\system32\utilman.exe
    2009-09-27 15:59 . 2008-04-15 04:00 3396608 ----a-w- c:\windows\system32\logonui.exe
    2009-09-27 15:59 . 2006-10-19 12:47 276992 ----a-w- c:\windows\system32\audiodev.dll
    2009-09-27 15:59 . 2008-04-15 04:00 540672 ----a-w- c:\windows\system32\sti_ci.dll
    2009-09-27 15:59 . 2008-04-15 04:00 202752 ----a-w- c:\windows\system32\tcpmonui.dll
    2009-09-27 15:58 . 2008-04-15 04:00 987648 ----a-w- c:\windows\system32\rasdlg.dll
    2009-09-27 15:58 . 2001-08-18 13:36 1446912 ----a-w- c:\windows\system32\ntbackup.exe
    2009-09-27 15:58 . 2008-04-15 04:00 200704 ----a-w- c:\windows\system32\mdminst.dll
    2009-09-27 15:58 . 2008-04-15 04:00 399360 ----a-w- c:\windows\system32\fsquirt.exe
    2009-09-27 15:58 . 2008-04-15 04:00 808960 ----a-w- c:\windows\system32\dmdlgs.dll
    2009-09-27 15:58 . 2008-04-15 04:00 221696 ----a-w- c:\windows\system32\fldrclnr.dll
    2009-09-27 15:58 . 2009-09-27 15:58 -------- d-----w- c:\program files\TaskSwitchXP
    2009-09-27 15:58 . 2008-04-15 04:00 218624 ----a-w- c:\windows\system32\uxtheme.dll
    2009-09-27 15:57 . 2008-04-15 04:00 794624 ----a-w- c:\windows\system32\sstext3d.scr
    2009-09-27 15:57 . 2008-04-15 04:00 720896 ----a-w- c:\windows\system32\sspipes.scr
    2009-09-27 15:57 . 2008-04-15 04:00 503808 ----a-w- c:\windows\system32\ssflwbox.scr
    2009-09-27 15:57 . 2008-04-15 04:00 819200 ----a-w- c:\windows\system32\ss3dfo.scr
    2009-09-27 15:57 . 2008-04-15 04:00 121856 ----a-w- c:\windows\system32\scrnsave.scr
    2009-09-27 15:56 . 2008-04-15 04:00 806400 ----a-w- c:\windows\system32\comres.dll
    2009-09-27 15:56 . 2008-04-15 04:00 835584 ----a-w- c:\windows\system32\certmgr.dll
    2009-09-27 15:56 . 2008-04-15 04:00 427520 ----a-w- c:\windows\system32\devmgr.dll
    2009-09-27 15:56 . 2008-04-15 04:00 146944 ----a-w- c:\windows\system32\eventvwr.exe
    2009-09-27 15:56 . 2008-04-15 04:00 76288 ----a-w- c:\windows\system32\mmcshext.dll
    2009-09-27 15:56 . 2008-04-15 04:00 1449984 ----a-w- c:\windows\system32\mmc.exe
    2009-09-27 15:55 . 2008-04-15 04:00 512000 ----a-w- c:\windows\system32\cmd.exe
    2009-09-27 15:55 . 2008-04-15 04:00 151040 ----a-w- c:\windows\system32\sndrec32.exe
    2009-09-27 15:55 . 2008-04-15 04:00 184320 ----a-w- c:\windows\system32\taskmgr.exe
    2009-09-27 15:55 . 2008-04-15 04:00 733696 ----a-w- c:\windows\system32\mstsc.exe
    2009-09-27 15:55 . 2008-04-15 04:00 589824 ----a-w- c:\windows\system32\wscript.exe
    2009-09-27 15:55 . 2008-04-15 04:00 527360 ----a-w- c:\windows\system32\mspaint.exe
    2009-09-27 15:55 . 2008-04-15 04:00 426496 ----a-w- c:\windows\regedit.exe
    2009-09-27 15:55 . 2008-04-15 04:00 192000 ----a-w- c:\windows\system32\notepad.exe
    2009-09-27 15:55 . 2008-04-15 04:00 896000 ----a-w- c:\windows\system32\spider.exe
    2009-09-27 15:55 . 2008-04-15 04:00 693760 ----a-w- c:\windows\system32\cards.dll
    2009-09-27 15:55 . 2008-04-15 04:00 185344 ----a-w- c:\windows\pchealth\helpctr\binaries\msconfig.exe
    2009-09-27 15:55 . 2008-04-15 04:00 148992 ----a-w- c:\windows\hh.exe
    2009-09-27 15:54 . 2008-04-15 04:00 20992 ----a-w- c:\windows\system32\write.exe
    2009-09-27 15:54 . 2006-10-19 12:47 9128448 ----a-w- c:\windows\system32\wmploc.dll
    2009-09-27 15:54 . 2008-04-15 04:00 2671104 ----a-w- c:\windows\system32\quartz.dll
    2009-09-27 15:52 . 2008-04-15 04:00 385536 ----a-w- c:\windows\system32\msieftp.dll
    2009-09-27 15:51 . 2008-04-15 04:00 841216 ----a-w- c:\windows\system32\shdoclc.dll
    2009-09-27 15:51 . 2008-04-15 04:00 206336 ----a-w- c:\windows\system32\iexpress.exe
    2009-09-27 15:51 . 2008-04-15 04:00 163840 ----a-w- c:\windows\system32\inetcplc.dll
    2009-09-27 15:51 . 2008-04-15 04:00 1692672 ----a-w- c:\windows\system32\winbrand.dll
    2009-09-27 15:51 . 2008-04-15 04:00 1789952 ----a-w- c:\windows\explorer.exe
    2009-09-27 15:51 . 2008-04-15 04:00 964608 ----a-w- c:\windows\system32\zipfldr.dll
    2009-09-27 15:50 . 2008-04-15 04:00 3905536 ----a-w- c:\windows\system32\xpsp2res.dll
    2009-09-27 15:50 . 2008-04-15 04:00 2765312 ----a-w- c:\windows\system32\winntbbu.dll
    2009-09-27 15:50 . 2008-04-15 04:00 711680 ----a-w- c:\windows\system32\wiashext.dll
    2009-09-27 15:50 . 2008-04-15 04:00 538112 ----a-w- c:\windows\system32\wiadefui.dll
    2009-09-27 15:49 . 2008-04-15 04:00 1377792 ----a-w- c:\windows\system32\wiaacmgr.exe
    2009-09-27 15:49 . 2008-04-15 04:00 113664 ----a-w- c:\windows\system32\verifier.exe
    2009-09-27 15:49 . 2008-04-15 04:00 387584 ----a-w- c:\windows\system32\themeui.dll
    2009-09-27 15:49 . 2008-04-15 04:00 91136 ----a-w- c:\windows\system32\telnet.exe
    2009-09-27 15:48 . 2008-04-15 04:00 178176 ----a-w- c:\windows\system32\tapiui.dll
    2009-09-27 15:48 . 2008-04-15 04:00 743424 ----a-w- c:\windows\system32\sxs.dll
    2009-09-27 15:48 . 2008-04-15 04:00 413184 ----a-w- c:\windows\system32\sysocmgr.exe
    2009-09-27 15:48 . 2008-04-15 04:00 387072 ----a-w- c:\windows\system32\syncui.dll
    2009-09-27 15:48 . 2008-04-15 04:00 127488 ----a-w- c:\windows\system32\stobject.dll
    2009-09-27 15:48 . 2008-04-15 04:00 1214976 ----a-w- c:\windows\system32\syssetup.dll
    2009-09-27 15:48 . 2008-04-15 04:00 42496 ----a-w- c:\windows\system32\shscrap.dll
    2009-09-27 15:48 . 2008-04-15 04:00 259584 ----a-w- c:\windows\system32\srrstr.dll
    2009-09-27 15:48 . 2008-04-15 04:00 258560 ----a-w- c:\windows\system32\shrpubw.exe
    2009-09-27 15:48 . 2008-04-15 04:00 147456 ----a-w- c:\windows\system32\sndvol32.exe
    2009-09-27 15:48 . 2008-04-15 04:00 129536 ----a-w- c:\windows\system32\sigverif.exe
    2009-09-27 15:48 . 2008-04-15 04:00 1278976 ----a-w- c:\windows\system32\shimgvw.dll
    2009-09-27 15:47 . 2008-04-15 04:00 1439232 ----a-w- c:\windows\system32\setupapi.dll
    2009-09-27 15:47 . 2008-04-15 04:00 88064 ----a-w- c:\windows\system32\remotepg.dll
    2009-09-27 15:47 . 2008-04-15 04:00 29696 ----a-w- c:\windows\system32\runonce.exe
    2009-09-27 15:47 . 2008-04-15 04:00 184320 ----a-w- c:\windows\system32\scrobj.dll
    2009-09-27 15:47 . 2008-04-15 04:00 18944 ----a-w- c:\windows\system32\regedt32.exe
    2009-09-27 15:47 . 2008-04-15 04:00 891392 ----a-w- c:\windows\system32\printui.dll
    2009-09-27 15:47 . 2008-04-15 04:00 489472 ----a-w- c:\windows\system32\photowiz.dll
    2009-09-27 15:47 . 2008-04-15 04:00 173568 ----a-w- c:\windows\system32\pifmgr.dll
    2009-09-27 15:47 . 2008-04-15 04:00 49152 ----a-w- c:\windows\system32\odbcad32.exe
    2009-09-27 15:47 . 2008-04-15 04:00 31232 ----a-w- c:\windows\system32\perfmon.exe
    2009-09-27 15:47 . 2008-04-15 04:00 110592 ----a-w- c:\windows\system32\odbcint.dll
    2009-09-27 15:46 . 2008-04-15 04:00 47104 ----a-w- c:\windows\system32\ntsd.exe
    2009-09-27 15:46 . 2008-04-15 04:00 31744 ----a-w- c:\windows\system32\ntlanui2.dll
    2009-09-27 15:46 . 2008-04-15 04:00 92160 ----a-w- c:\windows\system32\nslookup.exe
    2009-09-27 15:46 . 2008-04-15 04:00 705536 ----a-w- c:\windows\system32\newdev.dll
    2009-09-27 15:46 . 2008-04-15 04:00 2336768 ----a-w- c:\windows\system32\netshell.dll
    2009-09-27 15:46 . 2008-04-15 04:00 2058240 ----a-w- c:\windows\system32\netplwiz.dll
    2009-09-27 15:44 . 2008-04-15 04:00 130048 ----a-w- c:\windows\system32\input.dll
    2009-09-27 15:43 . 2008-04-15 04:00 512512 ----a-w- c:\windows\system32\accwiz.exe
    2009-09-27 15:43 . 2008-04-15 04:00 96256 ----a-w- c:\windows\system32\acctres.dll
    2009-09-27 15:43 . 2009-09-27 15:43 -------- d-----w- c:\program files\Anolis
    2009-09-27 15:35 . 2009-09-27 15:57 42496 ----a-w- c:\windows\system32\XPize Logo.scr
    2009-08-12 21:29 . 2009-08-12 21:29 303104 --sha-w- c:\windows\system32\gakilime.exe
    2009-08-11 00:51 . 2009-08-11 00:51 405504 --sha-w- c:\windows\system32\jeyitizo.exe
    .

    ------- Sigcheck -------

    [-] 2009-09-27 . EC5B4798DBF53403EB82553CD43CB7E2 . 1789952 . . [6.00.2900.5512] . . c:\windows\explorer.exe


    [-] 2009-09-27 . EB764361FE5112298C70B5CE46260F89 . 30208 . . [5.1.2600.5512] . . c:\windows\system32\ctfmon.exe

    c:\windows\system32\eventlog.dll ... is missing !!
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{3041d03e-fd4b-44e0-b742-2d9b88305f98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-12-05 333192]

    [HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
    [HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{3041D03E-FD4B-44E0-B742-2D9B88305F98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-12-05 333192]

    [HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
    [HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Weather"="c:\program files\AWS\WeatherBug\Weather.exe" [2009-01-30 1347584]
    "TaskSwitchXP"="c:\program files\TaskSwitchXP\TaskSwitchXP.exe" [2006-08-04 62976]
    "AntiMalware"="c:\program files\AntiMalware\antimalware.exe" [2009-11-21 1585152]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-15 135168]
    "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-15 159744]
    "Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-15 131072]
    "SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2008-08-30 442477]
    "AESTFltr"="c:\windows\system32\AESTFltr.exe" [2008-08-28 471040]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-07-31 1343488]
    "HP Mobile Broadband"="c:\swsetup\HPQWWAN\HPMobileBroadband.exe" [2008-07-08 439600]
    "hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2008-04-15 488752]
    "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
    "Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
    "IDTSysTrayApp"="sttray.exe" - c:\windows\sttray.exe [2008-08-30 442477]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2008-7-30 604776]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "ConsentPromptBehaviorAdmin"= 0 (0x0)

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
    "AWC"="c:\program files\AWC\AWC"
    "Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" -quiet

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" /min

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
    "c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
    "c:\\Program Files\\Blubster\\Blubster.exe"=
    "c:\\Program Files\\Messenger\\msmsgs.exe"=

    R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [10/5/2008 11:41 PM 112128]

    --- Other Services/Drivers In Memory ---

    *NewlyCreated* - CLASSPNP_2
    *Deregistered* - CLASSPNP_2
    .
    Contents of the 'Scheduled Tasks' folder

    2009-10-21 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.yahoo.com/
    IE: Send to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
    IE: Send To Bluetooth - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
    .
    - - - - ORPHANS REMOVED - - - -

    HKLM-Run-SearchSettings - c:\program files\Search Settings\SearchSettings.exe
    SharedTaskScheduler-{0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll
    SSODL-lozemoyom-{0c7c39de-3dc7-4551-bf25-2654b4ad27ab} - c:\windows\system32\mekiroba.dll
    AddRemove-HijackThis - f:\antivirus\HijackThis.exe



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-11-21 19:15
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x86D4D170]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0xf7539f28
    \Driver\ACPI -> ACPI.sys @ 0xf73accb8
    \Driver\atapi -> atapi.sys @ 0xf7364852
    IoDeviceObjectType ->\Device\Harddisk0\DR0 ->NDIS: Marvell Yukon 88E8040 PCI-E Fast Ethernet Controller -> SendCompleteHandler -> NDIS.sys @ 0xf7270bb0
    PacketIndicateHandler -> NDIS.sys @ 0xf725fa0d
    SendHandler -> NDIS.sys @ 0xf7273b40
    user & kernel MBR OK

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (LocalSystem)
    "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,41,a7,81,bb,f3,6f,27,4f,b0,78,24,\
    "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,41,a7,81,bb,f3,6f,27,4f,b0,78,24,\
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(792)
    c:\windows\system32\SETUPAPI.dll
    c:\windows\system32\WININET.dll
    c:\windows\system32\cscui.dll

    - - - - - - - > 'lsass.exe'(852)
    c:\windows\system32\WININET.dll
    c:\windows\system32\wdigest.dll
    c:\windows\system32\setupapi.dll

    - - - - - - - > 'explorer.exe'(2576)
    c:\windows\system32\SHDOCVW.dll
    c:\windows\system32\WININET.dll
    c:\windows\System32\cscui.dll
    c:\windows\system32\btmmhook.dll
    c:\progra~1\WINDOW~2\wmpband.dll
    c:\windows\system32\msi.dll
    c:\windows\system32\SETUPAPI.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\NETSHELL.dll
    c:\windows\system32\credui.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\btncopy.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    c:\program files\IDT\WDM\STacSV.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
    c:\windows\system32\wscntfy.exe
    c:\windows\system32\igfxsrvc.exe
    c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe
    c:\program files\Hewlett-Packard\Shared\HpqToaster.exe
    .
    **************************************************************************
    .
    Completion time: 2009-11-21 19:26 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-11-22 00:26

    Pre-Run: 8,053,809,152 bytes free
    Post-Run: 8,059,121,664 bytes free

    WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect /NOGUIBOOT /BOOTLOGO

    - - End Of File - - D604AD122A1C819239ABD3A502D1E2A2


    DDS (Ver_09-10-26.01) - NTFSx86
    Run by Branden at 19:33:41.00 on Sat 11/21/2009
    Internet Explorer: 8.0.6001.18702
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1015.573 [GMT -5:00]


    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\IDT\WDM\STacSV.exe
    svchost.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\WINDOWS\sttray.exe
    C:\Program Files\IDT\WDM\sttray.exe
    C:\WINDOWS\system32\AESTFltr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
    C:\WINDOWS\system32\igfxsrvc.exe
    C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
    C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe
    C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
    C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Branden\Desktop\dds.pif

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.yahoo.com/
    uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    TB: Ask Toolbar: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - c:\program files\askbardis\bar\bin\askBar.dll
    TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
    uRun: [Weather] c:\program files\aws\weatherbug\Weather.exe 1
    uRun: [TaskSwitchXP] c:\program files\taskswitchxp\TaskSwitchXP.exe
    uRun: [AntiMalware] "c:\program files\antimalware\antimalware.exe" -noscan
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [IDTSysTrayApp] sttray.exe
    mRun: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
    mRun: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [HP Mobile Broadband] c:\swsetup\hpqwwan\HPMobileBroadband.exe /TrayMode
    mRun: [hpWirelessAssistant] c:\program files\hewlett-packard\hp wireless assistant\HPWAMain.exe
    mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
    mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\widcomm\bluetooth software\BTTray.exe
    mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
    IE: Send to &Bluetooth Device... - c:\program files\widcomm\bluetooth software\btsendto_ie_ctx.htm
    IE: Send To Bluetooth - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
    IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
    DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx2.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab
    Notify: igfxcui - igfxdev.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

    ============= SERVICES / DRIVERS ===============

    R2 YahooAUService;Yahoo! Updater;c:\program files\yahoo!\softwareupdate\YahooAUService.exe [2008-11-9 602392]
    R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2008-10-5 112128]

    =============== Created Last 30 ================

    2009-11-21 23:43:43 0 d-sha-r- C:\cmdcons
    2009-11-21 23:39:38 98816 ----a-w- c:\windows\sed.exe
    2009-11-21 23:39:38 77312 ----a-w- c:\windows\MBR.exe
    2009-11-21 23:39:38 260608 ----a-w- c:\windows\PEV.exe
    2009-11-21 23:39:38 161792 ----a-w- c:\windows\SWREG.exe
    2009-11-21 17:03:00 0 d-----w- c:\program files\AntiMalware
    2009-11-21 05:52:41 552 ----a-w- c:\windows\system32\d3d8caps.dat
    2009-11-13 00:48:42 0 d-----w- c:\docume~1\branden\applic~1\Malwarebytes
    2009-11-13 00:48:19 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-11-13 00:48:15 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-11-13 00:48:15 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
    2009-11-13 00:48:15 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2009-11-11 04:28:27 966 ----a-w- c:\windows\wininit.ini
    2009-11-11 00:51:13 0 ----a-w- c:\windows\Swoyiqeniwarehe.bin
    2009-11-11 00:51:10 120 ----a-w- c:\windows\Bceqeyita.dat
    2009-11-11 00:48:41 826 ----a-w- c:\windows\system32\wininit.dll
    2009-11-11 00:45:11 0 --sha-w- C:\313856957
    2009-11-02 18:10:50 8704 ----a-w- c:\windows\system32\kbdjpn.dll
    2009-11-02 18:10:50 8192 ----a-w- c:\windows\system32\kbdkor.dll
    2009-11-02 18:10:50 6144 ----a-w- c:\windows\system32\kbd101c.dll
    2009-11-02 18:10:50 5632 ----a-w- c:\windows\system32\kbd103.dll
    2009-11-02 18:10:43 6144 ----a-w- c:\windows\system32\kbd101b.dll
    2009-11-02 18:10:41 6144 ----a-w- c:\windows\system32\kbd106.dll

    ==================== Find3M ====================

    2009-10-22 09:19:04 5939712 ------w- c:\windows\system32\dllcache\mshtml.dll
    2009-09-27 15:59:25 50176 ----a-w- c:\windows\system32\utilman.exe
    2009-09-27 15:59:25 3396608 ----a-w- c:\windows\system32\logonui.exe
    2009-09-27 15:59:21 276992 ----a-w- c:\windows\system32\audiodev.dll
    2009-09-27 15:59:18 540672 ----a-w- c:\windows\system32\sti_ci.dll
    2009-09-27 15:59:18 202752 ----a-w- c:\windows\system32\tcpmonui.dll
    2009-09-27 15:58:55 987648 ----a-w- c:\windows\system32\rasdlg.dll
    2009-09-27 15:58:48 1446912 ----a-w- c:\windows\system32\ntbackup.exe
    2009-09-27 15:58:45 200704 ----a-w- c:\windows\system32\mdminst.dll
    2009-09-27 15:58:44 399360 ----a-w- c:\windows\system32\fsquirt.exe
    2009-09-27 15:58:43 808960 ----a-w- c:\windows\system32\dmdlgs.dll
    2009-09-27 15:58:43 221696 ----a-w- c:\windows\system32\fldrclnr.dll
    2009-09-27 15:58:23 218624 ----a-w- c:\windows\system32\uxtheme.dll
    2009-09-27 15:57:37 794624 ----a-w- c:\windows\system32\sstext3d.scr
    2009-09-27 15:57:36 720896 ----a-w- c:\windows\system32\sspipes.scr
    2009-09-27 15:57:36 503808 ----a-w- c:\windows\system32\ssflwbox.scr
    2009-09-27 15:57:33 819200 ----a-w- c:\windows\system32\ss3dfo.scr
    2009-09-27 15:57:33 121856 ----a-w- c:\windows\system32\scrnsave.scr
    2009-09-27 15:56:37 806400 ----a-w- c:\windows\system32\comres.dll
    2009-09-27 15:56:35 835584 ----a-w- c:\windows\system32\certmgr.dll
    2009-09-27 15:56:17 427520 ----a-w- c:\windows\system32\devmgr.dll
    2009-09-27 15:56:16 146944 ----a-w- c:\windows\system32\eventvwr.exe
    2009-09-27 15:56:15 76288 ----a-w- c:\windows\system32\mmcshext.dll
    2009-09-27 15:56:15 1449984 ----a-w- c:\windows\system32\mmc.exe
    2009-09-27 15:55:57 512000 ----a-w- c:\windows\system32\cmd.exe
    2009-09-27 15:55:48 151040 ----a-w- c:\windows\system32\sndrec32.exe
    2009-09-27 15:55:46 184320 ----a-w- c:\windows\system32\taskmgr.exe
    2009-09-27 15:55:45 733696 ----a-w- c:\windows\system32\mstsc.exe
    2009-09-27 15:55:45 589824 ----a-w- c:\windows\system32\wscript.exe
    2009-09-27 15:55:45 527360 ----a-w- c:\windows\system32\mspaint.exe
    2009-09-27 15:55:45 426496 ----a-w- c:\windows\regedit.exe
    2009-09-27 15:55:45 192000 ----a-w- c:\windows\system32\notepad.exe
    2009-09-27 15:55:44 896000 ----a-w- c:\windows\system32\spider.exe
    2009-09-27 15:55:44 693760 ----a-w- c:\windows\system32\cards.dll
    2009-09-27 15:55:44 148992 ----a-w- c:\windows\hh.exe
    2009-09-27 15:54:31 20992 ----a-w- c:\windows\system32\write.exe
    2009-09-27 15:54:30 9128448 ----a-w- c:\windows\system32\wmploc.dll
    2009-09-27 15:54:13 2671104 ----a-w- c:\windows\system32\quartz.dll
    2009-09-27 15:52:39 385536 ----a-w- c:\windows\system32\msieftp.dll
    2009-09-27 15:51:48 841216 ----a-w- c:\windows\system32\shdoclc.dll
    2009-09-27 15:51:42 206336 ----a-w- c:\windows\system32\iexpress.exe
    2009-09-27 15:51:40 163840 ----a-w- c:\windows\system32\inetcplc.dll
    2009-09-27 15:51:39 1692672 ----a-w- c:\windows\system32\winbrand.dll
    2009-09-27 15:51:34 1789952 ----a-w- c:\windows\explorer.exe
    2009-09-27 15:51:24 964608 ----a-w- c:\windows\system32\zipfldr.dll
    2009-09-27 15:50:46 3905536 ----a-w- c:\windows\system32\xpsp2res.dll
    2009-09-27 15:50:32 2765312 ----a-w- c:\windows\system32\winntbbu.dll
    2009-09-27 15:50:09 711680 ----a-w- c:\windows\system32\wiashext.dll
    2009-09-27 15:50:00 538112 ----a-w- c:\windows\system32\wiadefui.dll
    2009-09-27 15:49:53 1377792 ----a-w- c:\windows\system32\wiaacmgr.exe
    2009-09-27 15:49:14 113664 ----a-w- c:\windows\system32\verifier.exe
    2009-09-27 15:49:04 387584 ----a-w- c:\windows\system32\themeui.dll
    2009-09-27 15:49:01 91136 ----a-w- c:\windows\system32\telnet.exe
    2009-09-27 15:48:56 178176 ----a-w- c:\windows\system32\tapiui.dll
    2009-09-27 15:48:55 743424 ----a-w- c:\windows\system32\sxs.dll
    2009-09-27 15:48:55 413184 ----a-w- c:\windows\system32\sysocmgr.exe
    2009-09-27 15:48:55 387072 ----a-w- c:\windows\system32\syncui.dll
    2009-09-27 15:48:55 127488 ----a-w- c:\windows\system32\stobject.dll
    2009-09-27 15:48:55 1214976 ----a-w- c:\windows\system32\syssetup.dll
    2009-09-27 15:48:54 42496 ----a-w- c:\windows\system32\shscrap.dll
    2009-09-27 15:48:54 259584 ----a-w- c:\windows\system32\srrstr.dll
    2009-09-27 15:48:54 258560 ----a-w- c:\windows\system32\shrpubw.exe
    2009-09-27 15:48:54 147456 ----a-w- c:\windows\system32\sndvol32.exe
    2009-09-27 15:48:54 129536 ----a-w- c:\windows\system32\sigverif.exe
    2009-09-27 15:48:52 1278976 ----a-w- c:\windows\system32\shimgvw.dll
    2009-09-27 15:47:15 1439232 ----a-w- c:\windows\system32\setupapi.dll
    2009-09-27 15:47:14 88064 ----a-w- c:\windows\system32\remotepg.dll
    2009-09-27 15:47:14 29696 ----a-w- c:\windows\system32\runonce.exe
    2009-09-27 15:47:14 184320 ----a-w- c:\windows\system32\scrobj.dll
    2009-09-27 15:47:13 18944 ----a-w- c:\windows\system32\regedt32.exe
    2009-09-27 15:47:09 891392 ----a-w- c:\windows\system32\printui.dll
    2009-09-27 15:47:05 489472 ----a-w- c:\windows\system32\photowiz.dll
    2009-09-27 15:47:05 173568 ----a-w- c:\windows\system32\pifmgr.dll
    2009-09-27 15:47:04 49152 ----a-w- c:\windows\system32\odbcad32.exe
    2009-09-27 15:47:04 31232 ----a-w- c:\windows\system32\perfmon.exe
    2009-09-27 15:47:04 110592 ----a-w- c:\windows\system32\odbcint.dll
    2009-09-27 15:46:42 47104 ----a-w- c:\windows\system32\ntsd.exe
    2009-09-27 15:46:39 31744 ----a-w- c:\windows\system32\ntlanui2.dll
    2009-09-27 15:46:36 92160 ----a-w- c:\windows\system32\nslookup.exe
    2009-09-27 15:46:34 705536 ----a-w- c:\windows\system32\newdev.dll
    2009-09-27 15:46:28 2336768 ----a-w- c:\windows\system32\netshell.dll
    2009-09-27 15:46:16 2058240 ----a-w- c:\windows\system32\netplwiz.dll
    2009-09-27 15:44:59 130048 ----a-w- c:\windows\system32\input.dll
    2009-09-27 15:43:52 512512 ----a-w- c:\windows\system32\accwiz.exe
    2009-09-27 15:43:51 96256 ----a-w- c:\windows\system32\acctres.dll
    2009-09-27 15:35:04 42496 ----a-w- c:\windows\system32\XPize Logo.scr
    2009-09-27 15:35:01 1634304 ----a-w- c:\windows\system32\Windows XP 3D Flag.scr
    2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
    2009-09-11 14:18:39 136192 ------w- c:\windows\system32\dllcache\msv1_0.dll
    2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
    2009-09-04 21:03:36 58880 ------w- c:\windows\system32\dllcache\msasn1.dll
    2009-08-28 10:35:52 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe
    2009-08-26 08:00:21 247326 ------w- c:\windows\system32\strmdll.dll
    2009-08-26 08:00:21 247326 ------w- c:\windows\system32\dllcache\strmdll.dll
    2009-08-12 21:29:50 303104 --sha-w- c:\windows\system32\gakilime.exe
    2009-08-11 00:51:55 405504 --sha-w- c:\windows\system32\jeyitizo.exe
    2008-06-24 17:17:10 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\application data\microsoft\feeds cache\index.dat
    2009-08-04 20:59:38 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009080420090805\index.dat

    ============= FINISH: 19:35:47.62 ===============

  7. #7
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi,

    Upload these files to http://www.virustotal.com and post back the results:
    c:\windows\system32\kernel32.dll
    c:\windows\explorer.exe
    c:\windows\system32\ctfmon.exe


    Open notepad and then copy and paste the bolded lines below into it. Go to File > save as and name the file fixes.bat, change the Save as type to all files and save it to your desktop.

    @echo off
    Pev -filelook %windir%\atapi.sys >LogIt.txt
    PEV -l %systemdrive%\proquota.exe >>LogIt.txt
    PEV -l %systemdrive%\eventlog.dll >>LogIt.txt
    START LogIt.txt
    del %0

    Double-click on fixes.bat file to execute it. Post contents of notepad that should open up.
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  8. #8
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Default

    ---- C:\WINDOWS\ERDNT\cache\atapi.sys ----
    Company: Microsoft Corporation
    File Description: IDE/ATAPI Port Driver
    File Version: 5.1.2600.5512 (xpsp.080413-2108)
    Product Name: Microsoft® Windows® Operating System
    Copyright: © Microsoft Corporation. All rights reserved.
    Original file name: atapi.sys
    File Size: 96512
    Created Time: 2009-11-22 00:18:11
    Modified Time: 2008-04-14 08:10:32
    Accessed Time: 2009-11-22 18:24:29
    MD5: 9F3A2F5AA6875C72BF062C712CFA2674
    SHA1: A719156E8AD67456556A02C34E762944234E7A44
    SHA224: 573FC09553A6AB302D0C1090F7412AC3ECE13B4F7949B80AA15063CE
    SHA256: B4DF1D2C56A593C6B54DE57395E3B51D288F547842893B32B0F59228A0CF70B9
    SHA384: 603D218C91A0D61059E5226C6F5722BC38ED369217D930E7872860B607F291A8A47A5254852AA53853C93E2831C718D9
    SHA512: 48ED3797DCDEF3158E1C46CC42246C6580A9096168748BBF45C8139CC0D548596CCD4852EE3516EF3F368D5887AF8B3FC71F902600FC8EF67E518B7A0D044AA7
    ---- C:\WINDOWS\system32\drivers\atapi.sys ----
    Company: Microsoft Corporation
    File Description: IDE/ATAPI Port Driver
    File Version: 5.1.2600.5512 (xpsp.080413-2108)
    Product Name: Microsoft® Windows® Operating System
    Copyright: © Microsoft Corporation. All rights reserved.
    Original file name: atapi.sys
    File Size: 96512
    Created Time: 2008-04-14 15:10:32
    Modified Time: 2008-04-14 08:10:32
    Accessed Time: 2009-11-22 18:24:32
    MD5: 9F3A2F5AA6875C72BF062C712CFA2674
    SHA1: A719156E8AD67456556A02C34E762944234E7A44
    SHA224: 573FC09553A6AB302D0C1090F7412AC3ECE13B4F7949B80AA15063CE
    SHA256: B4DF1D2C56A593C6B54DE57395E3B51D288F547842893B32B0F59228A0CF70B9
    SHA384: 603D218C91A0D61059E5226C6F5722BC38ED369217D930E7872860B607F291A8A47A5254852AA53853C93E2831C718D9
    SHA512: 48ED3797DCDEF3158E1C46CC42246C6580A9096168748BBF45C8139CC0D548596CCD4852EE3516EF3F368D5887AF8B3FC71F902600FC8EF67E518B7A0D044AA7
    ---- C:\WINDOWS\system32\ReinstallBackups\0008\DriverFiles\i386\atapi.sys ----
    Company: Microsoft Corporation
    File Description: IDE/ATAPI Port Driver
    File Version: 5.1.2600.5512 (xpsp.080413-2108)
    Product Name: Microsoft® Windows® Operating System
    Copyright: © Microsoft Corporation. All rights reserved.
    Original file name: atapi.sys
    File Size: 96512
    Created Time: 2008-10-06 04:40:26
    Modified Time: 2008-04-14 15:10:32
    Accessed Time: 2009-11-22 18:24:32
    MD5: 9F3A2F5AA6875C72BF062C712CFA2674
    SHA1: A719156E8AD67456556A02C34E762944234E7A44
    SHA224: 573FC09553A6AB302D0C1090F7412AC3ECE13B4F7949B80AA15063CE
    SHA256: B4DF1D2C56A593C6B54DE57395E3B51D288F547842893B32B0F59228A0CF70B9
    SHA384: 603D218C91A0D61059E5226C6F5722BC38ED369217D930E7872860B607F291A8A47A5254852AA53853C93E2831C718D9
    SHA512: 48ED3797DCDEF3158E1C46CC42246C6580A9096168748BBF45C8139CC0D548596CCD4852EE3516EF3F368D5887AF8B3FC71F902600FC8EF67E518B7A0D044AA7

    Entries: 0 (0)
    Directories: 0 Files: 0
    Bytes: 0 Blocks: 0

    Entries: 0 (0)
    Directories: 0 Files: 0
    Bytes: 0 Blocks: 0

    File has already been analysed:
    MD5: eb764361fe5112298c70b5ce46260f89
    First received: 2009.08.05 17:05:06 UTC
    Date: 2009.08.05 17:05:06 UTC [>109D]
    Results: 0/41
    Permalink: analisis/47651e7ba792a4a37c838a695237eb279a65f630cdb6fbcbff5b48d809f27f15-1249491906

    File ctfmon.exe received on 2009.08.05 17:05:06 (UTC)
    Current status: finished

    Result: 0/41 (0.00%)
    Compact Print results Antivirus Version Last Update Result
    a-squared 4.5.0.24 2009.08.05 -
    AhnLab-V3 5.0.0.2 2009.08.05 -
    AntiVir 7.9.0.240 2009.08.05 -
    Antiy-AVL 2.0.3.7 2009.08.05 -
    Authentium 5.1.2.4 2009.08.05 -
    Avast 4.8.1335.0 2009.08.05 -
    AVG 8.5.0.406 2009.08.05 -
    BitDefender 7.2 2009.08.05 -
    CAT-QuickHeal 10.00 2009.08.05 -
    ClamAV 0.94.1 2009.08.05 -
    Comodo 1876 2009.08.05 -
    DrWeb 5.0.0.12182 2009.08.05 -
    eSafe 7.0.17.0 2009.08.05 -
    eTrust-Vet 31.6.6659 2009.08.05 -
    F-Prot 4.4.4.56 2009.08.04 -
    F-Secure 8.0.14470.0 2009.08.05 -
    Fortinet 3.120.0.0 2009.08.05 -
    GData 19 2009.08.05 -
    Ikarus T3.1.1.64.0 2009.08.05 -
    Jiangmin None 2009.08.05 -
    K7AntiVirus 7.10.811 2009.08.05 -
    Kaspersky 7.0.0.125 2009.08.05 -
    McAfee 5699 2009.08.05 -
    McAfee+Artemis 5698 2009.08.04 -
    McAfee-GW-Edition 6.8.5 2009.08.05 -
    Microsoft 1.4903 2009.08.04 -
    NOD32 4309 2009.08.05 -
    Norman 6.01.09 2009.08.05 -
    nProtect 2009.1.8.0 2009.08.05 -
    Panda 10.0.0.14 2009.08.05 -
    PCTools 4.4.2.0 2009.08.05 -
    Prevx 3.0 2009.08.05 -
    Rising 21.41.24.00 2009.08.05 -
    Sophos 4.44.0 2009.08.05 -
    Sunbelt 3.2.1858.2 2009.08.05 -
    Symantec 1.4.4.12 2009.08.05 -
    TheHacker 6.3.4.3.375 2009.08.01 -
    TrendMicro 8.950.0.1094 2009.08.05 -
    VBA32 3.12.10.9 2009.08.05 -
    ViRobot 2009.8.5.1869 2009.08.05 -
    VirusBuster 4.6.5.0 2009.08.05 -
    Additional information
    File size: 30208 bytes
    MD5 : eb764361fe5112298c70b5ce46260f89
    SHA1 : e488898fdc477549b04c0199ce96f9dd08291848
    SHA256: 47651e7ba792a4a37c838a695237eb279a65f630cdb6fbcbff5b48d809f27f15
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0x2E35
    timedatestamp.....: 0x48025356 (Sun Apr 13 20:39:18 2008)
    machinetype.......: 0x14C (Intel I386)

    ( 3 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x2AB8 0x2C00 6.75 414ce647d4328e7513d4155b1a2c9499
    .data 0x4000 0x210 0x200 1.07 bd8c5cd346a9f53dc0dbc69260ab2240
    .rsrc 0x5000 0x43DC 0x4400 5.70 e8d9d315ac2f8dec6648aca18e584303

    ( 6 imports )

    > advapi32.dll: RegDeleteValueA, RegOpenKeyExA, RegCloseKey, RegSetValueExA, RegCreateKeyA, RegCreateKeyExA
    > kernel32.dll: lstrcpynA, lstrlenA, GetSystemDirectoryA, GetSystemWindowsDirectoryA, GetVersionExA, GetACP, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, LocalFree, CloseHandle, ResetEvent, OpenEventA, CreateProcessA, lstrcatA, GetSystemInfo, lstrcmpiA, FreeLibrary, LoadLibraryA, CreateEventA, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleHandleA, GetStartupInfoA, LocalAlloc, GetProcAddress
    > msctf.dll: TF_InitSystem, TF_GetGlobalCompartment, TF_InvalidAssemblyListCacheIfExist, TF_InvalidAssemblyListCache, TF_PostAllThreadMsg, TF_CreateCicLoadMutex, TF_UninitSystem
    > msutb.dll: ClosePopupTipbar, GetPopupTipbar
    > msvcrt.dll: _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _cexit, _XcptFilter, _exit, _c_exit
    > user32.dll: EnumWindows, GetClassNameA, FindWindowA, PostMessageA, SetTimer, KillTimer, MsgWaitForMultipleObjects, PeekMessageA, TranslateMessage, DispatchMessageA, GetMessageA, SetWindowPos, LoadCursorA, RegisterClassExA, DefWindowProcA, PostQuitMessage, CreateWindowExA, GetSystemMetrics

    ( 0 exports )

    TrID : File type identification
    Win32 Executable Generic (42.3%)
    Win32 Dynamic Link Library (generic) (37.6%)
    Generic Win/DOS Executable (9.9%)
    DOS Executable Generic (9.9%)
    Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
    ssdeep: 384:DA1Eo7NY8MPTIaW7/lumxlJ7XTbM+Xu/D3dlY6GS8dZPNVX+l5wrvbWDlgWk:D3opITIaWhuojADdlYrhzPNVa2rv2lG
    PEiD : -
    RDS : NSRL Reference Data Set

    Current status: finished

    Result: 1/41 (2.44%)
    Compact Print results Antivirus Version Last Update Result
    a-squared 4.5.0.41 2009.11.20 -
    AhnLab-V3 5.0.0.2 2009.11.19 -
    AntiVir 7.9.1.72 2009.11.20 -
    Antiy-AVL 2.0.3.7 2009.11.20 -
    Authentium 5.2.0.5 2009.11.19 -
    Avast 4.8.1351.0 2009.11.20 -
    AVG 8.5.0.425 2009.11.20 -
    BitDefender 7.2 2009.11.20 -
    CAT-QuickHeal 10.00 2009.11.20 -
    ClamAV 0.94.1 2009.11.20 -
    Comodo 2983 2009.11.19 -
    DrWeb 5.0.0.12182 2009.11.20 -
    eSafe 7.0.17.0 2009.11.19 -
    eTrust-Vet 35.1.7132 2009.11.20 -
    F-Prot 4.5.1.85 2009.11.19 -
    F-Secure 9.0.15370.0 2009.11.20 -
    Fortinet 3.120.0.0 2009.11.20 -
    GData 19 2009.11.20 -
    Ikarus T3.1.1.74.0 2009.11.20 -
    Jiangmin 11.0.800 2009.11.20 -
    K7AntiVirus 7.10.900 2009.11.19 -
    Kaspersky 7.0.0.125 2009.11.20 -
    McAfee 5807 2009.11.19 -
    McAfee+Artemis 5807 2009.11.19 -
    McAfee-GW-Edition 6.8.5 2009.11.20 Heuristic.LooksLike.Trojan.Patched.O
    Microsoft 1.5302 2009.11.20 -
    NOD32 4624 2009.11.20 -
    Norman 6.03.02 2009.11.20 -
    nProtect 2009.1.8.0 2009.11.20 -
    Panda 10.0.2.2 2009.11.20 -
    PCTools 7.0.3.5 2009.11.20 -
    Prevx 3.0 2009.11.20 -
    Rising 22.22.04.09 2009.11.20 -
    Sophos 4.47.0 2009.11.20 -
    Sunbelt 3.2.1858.2 2009.11.19 -
    Symantec 1.4.4.12 2009.11.20 -
    TheHacker 6.5.0.2.074 2009.11.19 -
    TrendMicro 9.0.0.1003 2009.11.20 -
    VBA32 3.12.12.0 2009.11.20 -
    ViRobot 2009.11.20.2047 2009.11.20 -
    VirusBuster 5.0.21.0 2009.11.19 -
    Additional information
    File size: 989696 bytes
    MD5 : b921fb870c9ac0d509b2ccabbbbe95f3
    SHA1 : c88d57cc99f75cd928b47b6e444231f26670138f
    SHA256: d3b69a8b59e07e775f99871c4ad107a4f72f392325695e7f261f6aa6e590d4e6
    PEInfo: PE Structure information

    ( base data )
    entrypointaddress.: 0xB64E
    timedatestamp.....: 0x49C4F482 (Sat Mar 21 15:06:58 2009)
    machinetype.......: 0x14C (Intel I386)

    ( 4 sections )
    name viradd virsiz rawdsiz ntrpy md5
    .text 0x1000 0x831E9 0x83200 6.66 20e7d84df75e06dfbc481e20c3e7f8d2
    .data 0x85000 0x4460 0x2600 0.59 dd0a1d702ba641dd9a3e4aa8d1896aec
    .rsrc 0x8A000 0x65EE8 0x66000 3.39 c875d981cddbef706b9ead3eb62aec87
    .reloc 0xF0000 0x5C84 0x5E00 6.62 55b85ac969f28a4d4dff5820d55ffa12

    ( 1 imports )

    > ntdll.dll: _wcsnicmp, NtFsControlFile, NtCreateFile, RtlAllocateHeap, RtlFreeHeap, NtOpenFile, NtQueryInformationFile, NtQueryEaFile, RtlLengthSecurityDescriptor, NtQuerySecurityObject, NtSetEaFile, NtSetSecurityObject, NtSetInformationFile, CsrClientCallServer, NtDeviceIoControlFile, NtClose, RtlInitUnicodeString, wcscspn, RtlUnicodeToMultiByteSize, wcslen, _memicmp, memmove, NtQueryValueKey, NtOpenKey, NtFlushKey, NtSetValueKey, NtCreateKey, RtlNtStatusToDosError, RtlFreeUnicodeString, RtlDnsHostNameToComputerName, wcsncpy, RtlUnicodeStringToAnsiString, RtlxUnicodeStringToAnsiSize, NlsMbCodePageTag, RtlAnsiStringToUnicodeString, RtlInitAnsiString, RtlCreateUnicodeStringFromAsciiz, wcschr, wcsstr, RtlPrefixString, _wcsicmp, RtlGetFullPathName_U, RtlGetCurrentDirectory_U, NtQueryInformationProcess, RtlUnicodeStringToOemString, RtlReleasePebLock, RtlEqualUnicodeString, RtlAcquirePebLock, RtlFreeAnsiString, RtlSetCurrentDirectory_U, RtlTimeToTimeFields, NtSetSystemTime, RtlTimeFieldsToTime, NtQuerySystemInformation, RtlSetTimeZoneInformation, NtSetSystemInformation, RtlCutoverTimeToSystemTime, _allmul, NtEnumerateKey, RtlOpenCurrentUser, RtlQueryRegistryValues, _itow, DbgBreakPoint, RtlFreeSid, RtlSetDaclSecurityDescriptor, RtlCreateSecurityDescriptor, RtlAddAccessAllowedAce, RtlCreateAcl, RtlLengthSid, RtlAllocateAndInitializeSid, DbgPrint, NtOpenProcess, CsrGetProcessId, DbgUiDebugActiveProcess, DbgUiConnectToDbg, DbgUiIssueRemoteBreakin, NtSetInformationDebugObject, DbgUiGetThreadDebugObject, NtQueryInformationThread, DbgUiConvertStateChangeStructure, DbgUiWaitStateChange, DbgUiContinue, DbgUiStopDebugging, RtlDosPathNameToNtPathName_U, RtlIsDosDeviceName_U, RtlCreateAtomTable, NtAddAtom, RtlAddAtomToAtomTable, NtFindAtom, RtlLookupAtomInAtomTable, NtDeleteAtom, RtlDeleteAtomFromAtomTable, NtQueryInformationAtom, RtlQueryAtomInAtomTable, RtlOemStringToUnicodeString, RtlMultiByteToUnicodeN, RtlUnicodeToMultiByteN, RtlMultiByteToUnicodeSize, RtlPrefixUnicodeString, RtlLeaveCriticalSection, RtlEnterCriticalSection, NtEnumerateValueKey, RtlIsTextUnicode, NtReadFile, NtAllocateVirtualMemory, NtUnlockFile, NtLockFile, RtlAppendUnicodeStringToString, RtlAppendUnicodeToString, RtlCopyUnicodeString, NtFreeVirtualMemory, NtWriteFile, RtlCreateUnicodeString, RtlFormatCurrentUserKeyPath, RtlGetLongestNtPathLength, NtDuplicateObject, NtQueryKey, NtDeleteValueKey, RtlEqualString, CsrFreeCaptureBuffer, CsrCaptureMessageString, CsrAllocateCaptureBuffer, strncpy, RtlCharToInteger, RtlUpcaseUnicodeChar, RtlUpcaseUnicodeString, CsrAllocateMessagePointer, NtQueryObject, wcscmp, RtlCompareMemory, NtQueryDirectoryObject, NtQuerySymbolicLinkObject, NtOpenSymbolicLinkObject, NtOpenDirectoryObject, NtCreateIoCompletion, NtSetIoCompletion, NtRemoveIoCompletion, NtSetInformationProcess, NtQueryDirectoryFile, RtlDeleteCriticalSection, NtNotifyChangeDirectoryFile, NtWaitForSingleObject, RtlInitializeCriticalSection, NtQueryVolumeInformationFile, NtFlushBuffersFile, RtlDeactivateActivationContextUnsafeFast, RtlActivateActivationContextUnsafeFast, NtCancelIoFile, NtReadFileScatter, NtWriteFileGather, wcscpy, NtOpenSection, NtMapViewOfSection, NtFlushVirtualMemory, RtlFlushSecureMemoryCache, NtUnmapViewOfSection, NtCreateSection, NtQueryFullAttributesFile, swprintf, NtQueryAttributesFile, RtlDetermineDosPathNameType_U, NtRaiseHardError, NtQuerySystemEnvironmentValueEx, RtlGUIDFromString, NtSetSystemEnvironmentValueEx, RtlInitString, RtlUnlockHeap, RtlSetUserValueHeap, RtlFreeHandle, RtlAllocateHandle, RtlLockHeap, RtlSizeHeap, RtlGetUserInfoHeap, RtlReAllocateHeap, RtlIsValidHandle, RtlCompactHeap, RtlImageNtHeader, NtProtectVirtualMemory, NtQueryVirtualMemory, NtLockVirtualMemory, NtUnlockVirtualMemory, NtFlushInstructionCache, NtAllocateUserPhysicalPages, NtFreeUserPhysicalPages, NtMapUserPhysicalPages, NtMapUserPhysicalPagesScatter, NtGetWriteWatch, NtResetWriteWatch, NtSetInformationObject, LdrQueryImageFileExecutionOptions, CsrNewThread, CsrClientConnectToServer, RtlCreateTagHeap, LdrSetDllManifestProber, RtlSetThreadPoolStartFunc, RtlEncodePointer, _stricmp, wcscat, RtlCreateHeap, RtlDestroyHeap, RtlExtendHeap, RtlQueryTagHeap, RtlUsageHeap, RtlValidateHeap, RtlGetProcessHeaps, RtlWalkHeap, RtlSetHeapInformation, RtlQueryHeapInformation, RtlInitializeHandleTable, RtlExtendedLargeIntegerDivide, NtCreateMailslotFile, RtlFormatMessage, RtlFindMessage, LdrUnloadDll, LdrUnloadAlternateResourceModule, LdrDisableThreadCalloutsForDll, strchr, LdrGetDllHandle, LdrUnlockLoaderLock, LdrAddRefDll, RtlComputePrivatizedDllName_U, RtlPcToFileHeader, LdrLockLoaderLock, RtlGetVersion, LdrEnumerateLoadedModules, RtlVerifyVersionInfo, RtlUnicodeStringToInteger, LdrLoadAlternateResourceModule, RtlDosApplyFileIsolationRedirection_Ustr, LdrLoadDll, LdrGetProcedureAddress, LdrFindResource_U, LdrAccessResource, LdrFindResourceDirectory_U, RtlImageDirectoryEntryToData, _strcmpi, NtSetInformationThread, NtOpenThreadToken, NtCreateNamedPipeFile, RtlDefaultNpAcl, RtlDosSearchPath_Ustr, RtlInitUnicodeStringEx, RtlQueryEnvironmentVariable_U, RtlAnsiCharToUnicodeChar, RtlIntegerToChar, NtSetVolumeInformationFile, RtlIsNameLegalDOS8Dot3, NtQueryPerformanceCounter, sprintf, NtPowerInformation, NtInitiatePowerAction, NtSetThreadExecutionState, NtRequestWakeupLatency, NtGetDevicePowerState, NtIsSystemResumeAutomatic, NtRequestDeviceWakeup, NtCancelDeviceWakeupRequest, NtWriteVirtualMemory, LdrShutdownProcess, NtTerminateProcess, RtlRaiseStatus, RtlSetEnvironmentVariable, RtlExpandEnvironmentStrings_U, NtReadVirtualMemory, RtlCompareUnicodeString, NtCreateJobSet, NtCreateJobObject, NtIsProcessInJob, RtlEqualSid, RtlSubAuthoritySid, RtlInitializeSid, NtQueryInformationToken, NtOpenProcessToken, NtResumeThread, NtAssignProcessToJobObject, CsrCaptureMessageMultiUnicodeStringsInPlace, NtCreateThread, NtCreateProcessEx, RtlDestroyEnvironment, NtQuerySection, NtQueryInformationJobObject, RtlGetNativeSystemInformation, RtlxAnsiStringToUnicodeSize, NtOpenEvent, NtQueryEvent, NtTerminateThread, wcsrchr, NlsMbOemCodePageTag, RtlxUnicodeStringToOemSize, NtAdjustPrivilegesToken, RtlImpersonateSelf, wcsncmp, RtlDestroyProcessParameters, RtlCreateProcessParameters, RtlInitializeCriticalSectionAndSpinCount, NtSetEvent, NtClearEvent, NtPulseEvent, NtCreateSemaphore, NtOpenSemaphore, NtReleaseSemaphore, NtCreateMutant, NtOpenMutant, NtReleaseMutant, NtSignalAndWaitForSingleObject, NtWaitForMultipleObjects, NtDelayExecution, NtCreateTimer, NtOpenTimer, NtSetTimer, NtCancelTimer, NtCreateEvent, RtlCopyLuid, strrchr, _vsnwprintf, RtlReleaseActivationContext, RtlActivateActivationContextEx, RtlQueryInformationActivationContext, NtOpenThread, LdrShutdownThread, RtlFreeThreadActivationContextStack, NtGetContextThread, NtSetContextThread, NtSuspendThread, RtlRaiseException, RtlDecodePointer, towlower, RtlClearBits, RtlFindClearBitsAndSet, RtlAreBitsSet, NtQueueApcThread, NtYieldExecution, RtlRegisterWait, RtlDeregisterWait, RtlDeregisterWaitEx, RtlQueueWorkItem, RtlSetIoCompletionCallback, RtlCreateTimerQueue, RtlCreateTimer, RtlUpdateTimer, RtlDeleteTimer, RtlDeleteTimerQueueEx, CsrIdentifyAlertableThread, RtlApplicationVerifierStop, _alloca_probe, RtlDestroyQueryDebugBuffer, RtlQueryProcessDebugInformation, RtlCreateQueryDebugBuffer, RtlCreateEnvironment, RtlFreeOemString, strstr, toupper, isdigit, atol, tolower, NtOpenJobObject, NtTerminateJobObject, NtSetInformationJobObject, RtlAddRefActivationContext, RtlZombifyActivationContext, RtlActivateActivationContext, RtlDeactivateActivationContext, RtlGetActiveActivationContext, DbgPrintEx, LdrDestroyOutOfProcessImage, LdrAccessOutOfProcessResource, LdrFindCreateProcessManifest, LdrCreateOutOfProcessImage, RtlNtStatusToDosErrorNoTeb, RtlpApplyLengthFunction, RtlGetLengthWithoutLastFullDosOrNtPathElement, RtlpEnsureBufferSize, RtlMultiAppendUnicodeStringBuffer, _snwprintf, RtlCreateActivationContext, RtlFindActivationContextSectionString, RtlFindActivationContextSectionGuid, _allshl, RtlNtPathNameToDosPathName, RtlUnhandledExceptionFilter, CsrCaptureMessageBuffer, NtQueryInstallUILanguage, NtQueryDefaultUILanguage, wcspbrk, RtlGetDaclSecurityDescriptor, NtCreateDirectoryObject, _wcslwr, _wtol, RtlIntegerToUnicodeString, NtQueryDefaultLocale, _strlwr, RtlUnwind

    ( 1 exports )

    > ActivateActCtx, AddAtomA, AddAtomW, AddConsoleAliasA, AddConsoleAliasW, AddLocalAlternateComputerNameA, AddLocalAlternateComputerNameW, AddRefActCtx, AddVectoredExceptionHandler, AllocConsole, AllocateUserPhysicalPages, AreFileApisANSI, AssignProcessToJobObject, AttachConsole, BackupRead, BackupSeek, BackupWrite, BaseCheckAppcompatCache, BaseCleanupAppcompatCache, BaseCleanupAppcompatCacheSupport, BaseDumpAppcompatCache, BaseFlushAppcompatCache, BaseInitAppcompatCache, BaseInitAppcompatCacheSupport, BaseProcessInitPostImport, BaseQueryModuleData, BaseUpdateAppcompatCache, BasepCheckWinSaferRestrictions, Beep, BeginUpdateResourceA, BeginUpdateResourceW, BindIoCompletionCallback, BuildCommDCBA, BuildCommDCBAndTimeoutsA, BuildCommDCBAndTimeoutsW, BuildCommDCBW, CallNamedPipeA, CallNamedPipeW, CancelDeviceWakeupRequest, CancelIo, CancelTimerQueueTimer, CancelWaitableTimer, ChangeTimerQueueTimer, CheckNameLegalDOS8Dot3A, CheckNameLegalDOS8Dot3W, CheckRemoteDebuggerPresent, ClearCommBreak, ClearCommError, CloseConsoleHandle, CloseHandle, CloseProfileUserMapping, CmdBatNotification, CommConfigDialogA, CommConfigDialogW, CompareFileTime, CompareStringA, CompareStringW, ConnectNamedPipe, ConsoleMenuControl, ContinueDebugEvent, ConvertDefaultLocale, ConvertFiberToThread, ConvertThreadToFiber, CopyFileA, CopyFileExA, CopyFileExW, CopyFileW, CopyLZFile, CreateActCtxA, CreateActCtxW, CreateConsoleScreenBuffer, CreateDirectoryA, CreateDirectoryExA, CreateDirectoryExW, CreateDirectoryW, CreateEventA, CreateEventW, CreateFiber, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateFileMappingW, CreateFileW, CreateHardLinkA, CreateHardLinkW, CreateIoCompletionPort, CreateJobObjectA, CreateJobObjectW, CreateJobSet, CreateMailslotA, CreateMailslotW, CreateMemoryResourceNotification, CreateMutexA, CreateMutexW, CreateNamedPipeA, CreateNamedPipeW, CreateNlsSecurityDescriptor, CreatePipe, CreateProcessA, CreateProcessInternalA, CreateProcessInternalW, CreateProcessInternalWSecure, CreateProcessW, CreateRemoteThread, CreateSemaphoreA, CreateSemaphoreW, CreateSocketHandle, CreateTapePartition, CreateThread, CreateTimerQueue, CreateTimerQueueTimer, CreateToolhelp32Snapshot, CreateVirtualBuffer, CreateWaitableTimerA, CreateWaitableTimerW, DeactivateActCtx, DebugActiveProcess, DebugActiveProcessStop, DebugBreak, DebugBreakProcess, DebugSetProcessKillOnExit, DecodePointer, DecodeSystemPointer, DefineDosDeviceA, DefineDosDeviceW, DelayLoadFailureHook, DeleteAtom, DeleteCriticalSection, DeleteFiber, DeleteFileA, DeleteFileW, DeleteTimerQueue, DeleteTimerQueueEx, DeleteTimerQueueTimer, DeleteVolumeMountPointA, DeleteVolumeMountPointW, DeviceIoControl, DisableThreadLibraryCalls, DisconnectNamedPipe, DnsHostnameToComputerNameA, DnsHostnameToComputerNameW, DosDateTimeToFileTime, DosPathToSessionPathA, DosPathToSessionPathW, DuplicateConsoleHandle, DuplicateHandle, EncodePointer, EncodeSystemPointer, EndUpdateResourceA, EndUpdateResourceW, EnterCriticalSection, EnumCalendarInfoA, EnumCalendarInfoExA, EnumCalendarInfoExW, EnumCalendarInfoW, EnumDateFormatsA, EnumDateFormatsExA, EnumDateFormatsExW, EnumDateFormatsW, EnumLanguageGroupLocalesA, EnumLanguageGroupLocalesW, EnumResourceLanguagesA, EnumResourceLanguagesW, EnumResourceNamesA, EnumResourceNamesW, EnumResourceTypesA, EnumResourceTypesW, EnumSystemCodePagesA, EnumSystemCodePagesW, EnumSystemGeoID, EnumSystemLanguageGroupsA, EnumSystemLanguageGroupsW, EnumSystemLocalesA, EnumSystemLocalesW, EnumTimeFormatsA, EnumTimeFormatsW, EnumUILanguagesA, EnumUILanguagesW, EnumerateLocalComputerNamesA, EnumerateLocalComputerNamesW, EraseTape, EscapeCommFunction, ExitProcess, ExitThread, ExitVDM, ExpandEnvironmentStringsA, ExpandEnvironmentStringsW, ExpungeConsoleCommandHistoryA, ExpungeConsoleCommandHistoryW, ExtendVirtualBuffer, FatalAppExitA, FatalAppExitW, FatalExit, FileTimeToDosDateTime, FileTimeToLocalFileTime, FileTimeToSystemTime, FillConsoleOutputAttribute, FillConsoleOutputCharacterA, FillConsoleOutputCharacterW, FindActCtxSectionGuid, FindActCtxSectionStringA, FindActCtxSectionStringW, FindAtomA, FindAtomW, FindClose, FindCloseChangeNotification, FindFirstChangeNotificationA, FindFirstChangeNotificationW, FindFirstFileA, FindFirstFileExA, FindFirstFileExW, FindFirstFileW, FindFirstVolumeA, FindFirstVolumeMountPointA, FindFirstVolumeMountPointW, FindFirstVolumeW, FindNextChangeNotification, FindNextFileA, FindNextFileW, FindNextVolumeA, FindNextVolumeMountPointA, FindNextVolumeMountPointW, FindNextVolumeW, FindResourceA, FindResourceExA, FindResourceExW, FindResourceW, FindVolumeClose, FindVolumeMountPointClose, FlushConsoleInputBuffer, FlushFileBuffers, FlushInstructionCache, FlushViewOfFile, FoldStringA, FoldStringW, FormatMessageA, FormatMessageW, FreeConsole, FreeEnvironmentStringsA, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, FreeResource, FreeUserPhysicalPages, FreeVirtualBuffer, GenerateConsoleCtrlEvent, GetACP, GetAtomNameA, GetAtomNameW, GetBinaryType, GetBinaryTypeA, GetBinaryTypeW, GetCPFileNameFromRegistry, GetCPInfo, GetCPInfoExA, GetCPInfoExW, GetCalendarInfoA, GetCalendarInfoW, GetComPlusPackageInstallStatus, GetCommConfig, GetCommMask, GetCommModemStatus, GetCommProperties, GetCommState, GetCommTimeouts, GetCommandLineA, GetCommandLineW, GetCompressedFileSizeA, GetCompressedFileSizeW, GetComputerNameA, GetComputerNameExA, GetComputerNameExW, GetComputerNameW, GetConsoleAliasA, GetConsoleAliasExesA, GetConsoleAliasExesLengthA, GetConsoleAliasExesLengthW, GetConsoleAliasExesW, GetConsoleAliasW, GetConsoleAliasesA, GetConsoleAliasesLengthA, GetConsoleAliasesLengthW, GetConsoleAliasesW, GetConsoleCP, GetConsoleCharType, GetConsoleCommandHistoryA, GetConsoleCommandHistoryLengthA, GetConsoleCommandHistoryLengthW, GetConsoleCommandHistoryW, GetConsoleCursorInfo, GetConsoleCursorMode, GetConsoleDisplayMode, GetConsoleFontInfo, GetConsoleFontSize, GetConsoleHardwareState, GetConsoleInputExeNameA, GetConsoleInputExeNameW, GetConsoleInputWaitHandle, GetConsoleKeyboardLayoutNameA, GetConsoleKeyboardLayoutNameW, GetConsoleMode, GetConsoleNlsMode, GetConsoleOutputCP, GetConsoleProcessList, GetConsoleScreenBufferInfo, GetConsoleSelectionInfo, GetConsoleTitleA, GetConsoleTitleW, GetConsoleWindow, GetCurrencyFormatA, GetCurrencyFormatW, GetCurrentActCtx, GetCurrentConsoleFont, GetCurrentDirectoryA, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatA, GetDateFormatW, GetDefaultCommConfigA, GetDefaultCommConfigW, GetDefaultSortkeySize, GetDevicePowerState, GetDiskFreeSpaceA, GetDiskFreeSpaceExA, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetDllDirectoryA, GetDllDirectoryW, GetDriveTypeA, GetDriveTypeW, GetEnvironmentStrings, GetEnvironmentStringsA, GetEnvironmentStringsW, GetEnvironmentVariableA, GetEnvironmentVariableW, GetExitCodeProcess, GetExitCodeThread, GetExpandedNameA, GetExpandedNameW, GetFileAttributesA, GetFileAttributesExA, GetFileAttributesExW, GetFileAttributesW, GetFileInformationByHandle, GetFileSize, GetFileSizeEx, GetFileTime, GetFileType, GetFirmwareEnvironmentVariableA, GetFirmwareEnvironmentVariableW, GetFullPathNameA, GetFullPathNameW, GetGeoInfoA, GetGeoInfoW, GetHandleContext, GetHandleInformation, GetLargestConsoleWindowSize, GetLastError, GetLinguistLangSize, GetLocalTime, GetLocaleInfoA, GetLocaleInfoW, GetLogicalDriveStringsA, GetLogicalDriveStringsW, GetLogicalDrives, GetLogicalProcessorInformation, GetLongPathNameA, GetLongPathNameW, GetMailslotInfo, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExA, GetModuleHandleExW, GetModuleHandleW, GetNamedPipeHandleStateA, GetNamedPipeHandleStateW, GetNamedPipeInfo, GetNativeSystemInfo, GetNextVDMCommand, GetNlsSectionName, GetNumaAvailableMemory, GetNumaAvailableMemoryNode, GetNumaHighestNodeNumber, GetNumaNodeProcessorMask, GetNumaProcessorMap, GetNumaProcessorNode, GetNumberFormatA, GetNumberFormatW, GetNumberOfConsoleFonts, GetNumberOfConsoleInputEvents, GetNumberOfConsoleMouseButtons, GetOEMCP, GetOverlappedResult, GetPriorityClass, GetPrivateProfileIntA, GetPrivateProfileIntW, GetPrivateProfileSectionA, GetPrivateProfileSectionNamesA, GetPrivateProfileSectionNamesW, GetPrivateProfileSectionW, GetPrivateProfileStringA, GetPrivateProfileStringW, GetPrivateProfileStructA, GetPrivateProfileStructW, GetProcAddress, GetProcessAffinityMask, GetProcessDEPPolicy, GetProcessHandleCount, GetProcessHeap, GetProcessHeaps, GetProcessId, GetProcessIoCounters, GetProcessPriorityBoost, GetProcessShutdownParameters, GetProcessTimes, GetProcessVersion, GetProcessWorkingSetSize, GetProfileIntA, GetProfileIntW, GetProfileSectionA, GetProfileSectionW, GetProfileStringA, GetProfileStringW, GetQueuedCompletionStatus, GetShortPathNameA, GetShortPathNameW, GetStartupInfoA, GetStartupInfoW, GetStdHandle, GetStringTypeA, GetStringTypeExA, GetStringTypeExW, GetStringTypeW, GetSystemDEPPolicy, GetSystemDefaultLCID, GetSystemDefaultLangID, GetSystemDefaultUILanguage, GetSystemDirectoryA, GetSystemDirectoryW, GetSystemInfo, GetSystemPowerStatus, GetSystemRegistryQuota, GetSystemTime, GetSystemTimeAdjustment, GetSystemTimeAsFileTime, GetSystemTimes, GetSystemWindowsDirectoryA, GetSystemWindowsDirectoryW, GetSystemWow64DirectoryA, GetSystemWow64DirectoryW, GetTapeParameters, GetTapePosition, GetTapeStatus, GetTempFileNameA, GetTempFileNameW, GetTempPathA, GetTempPathW, GetThreadContext, GetThreadIOPendingFlag, GetThreadLocale, GetThreadPriority, GetThreadPriorityBoost, GetThreadSelectorEntry, GetThreadTimes, GetTickCount, GetTimeFormatA, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetUserDefaultLangID, GetUserDefaultUILanguage, GetUserGeoID, GetVDMCurrentDirectories, GetVersion, GetVersionExA, GetVersionExW, GetVolumeInformationA, GetVolumeInformationW, GetVolumeNameForVolumeMountPointA, GetVolumeNameForVolumeMountPointW, GetVolumePathNameA, GetVolumePathNameW, GetVolumePathNamesForVolumeNameA, GetVolumePathNamesForVolumeNameW, GetWindowsDirectoryA, GetWindowsDirectoryW, GetWriteWatch, GlobalAddAtomA, GlobalAddAtomW, GlobalAlloc, GlobalCompact, GlobalDeleteAtom, GlobalFindAtomA, GlobalFindAtomW, GlobalFix, GlobalFlags, GlobalFree, GlobalGetAtomNameA, GlobalGetAtomNameW, GlobalHandle, GlobalLock, GlobalMemoryStatus, GlobalMemoryStatusEx, GlobalReAlloc, GlobalSize, GlobalUnWire, GlobalUnfix, GlobalUnlock, GlobalWire, Heap32First, Heap32ListFirst, Heap32ListNext, Heap32Next, HeapAlloc, HeapCompact, HeapCreate, HeapCreateTagsW, HeapDestroy, HeapExtend, HeapFree, HeapLock, HeapQueryInformation, HeapQueryTagW, HeapReAlloc, HeapSetInformation, HeapSize, HeapSummary, HeapUnlock, HeapUsage, HeapValidate, HeapWalk, InitAtomTable, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeSListHead, InterlockedCompareExchange, InterlockedDecrement, InterlockedExchange, InterlockedExchangeAdd, InterlockedFlushSList, InterlockedIncrement, InterlockedPopEntrySList, InterlockedPushEntrySList, InvalidateConsoleDIBits, IsBadCodePtr, IsBadHugeReadPtr, IsBadHugeWritePtr, IsBadReadPtr, IsBadStringPtrA, IsBadStringPtrW, IsBadWritePtr, IsDBCSLeadByte, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessInJob, IsProcessorFeaturePresent, IsSystemResumeAutomatic, IsValidCodePage, IsValidLanguageGroup, IsValidLocale, IsValidUILanguage, IsWow64Process, LCMapStringA, LCMapStringW, LZClose, LZCloseFile, LZCopy, LZCreateFileW, LZDone, LZInit, LZOpenFileA, LZOpenFileW, LZRead, LZSeek, LZStart, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, LoadLibraryW, LoadModule, LoadResource, LocalAlloc, LocalCompact, LocalFileTimeToFileTime, LocalFlags, LocalFree, LocalHandle, LocalLock, LocalReAlloc, LocalShrink, LocalSize, LocalUnlock, LockFile, LockFileEx, LockResource, MapUserPhysicalPages, MapUserPhysicalPagesScatter, MapViewOfFile, MapViewOfFileEx, Module32First, Module32FirstW, Module32Next, Module32NextW, MoveFileA, MoveFileExA, MoveFileExW, MoveFileW, MoveFileWithProgressA, MoveFileWithProgressW, MulDiv, MultiByteToWideChar, NlsConvertIntegerToString, NlsGetCacheUpdateCount, NlsResetProcessLocale, NumaVirtualQueryNode, OpenConsoleW, OpenDataFile, OpenEventA, OpenEventW, OpenFile, OpenFileMappingA, OpenFileMappingW, OpenJobObjectA, OpenJobObjectW, OpenMutexA, OpenMutexW, OpenProcess, OpenProfileUserMapping, OpenSemaphoreA, OpenSemaphoreW, OpenThread, OpenWaitableTimerA, OpenWaitableTimerW, OutputDebugStringA, OutputDebugStringW, PeekConsoleInputA, PeekConsoleInputW, PeekNamedPipe, PostQueuedCompletionStatus, PrepareTape, PrivCopyFileExW, PrivMoveFileIdentityW, Process32First, Process32FirstW, Process32Next, Process32NextW, ProcessIdToSessionId, PulseEvent, PurgeComm, QueryActCtxW, QueryDepthSList, QueryDosDeviceA, QueryDosDeviceW, QueryInformationJobObject, QueryMemoryResourceNotification, QueryPerformanceCounter, QueryPerformanceFrequency, QueryWin31IniFilesMappedToRegistry, QueueUserAPC, QueueUserWorkItem, RaiseException, ReadConsoleA, ReadConsoleInputA, ReadConsoleInputExA, ReadConsoleInputExW, ReadConsoleInputW, ReadConsoleOutputA, ReadConsoleOutputAttribute, ReadConsoleOutputCharacterA, ReadConsoleOutputCharacterW, ReadConsoleOutputW, ReadConsoleW, ReadDirectoryChangesW, ReadFile, ReadFileEx, ReadFileScatter, ReadProcessMemory, RegisterConsoleIME, RegisterConsoleOS2, RegisterConsoleVDM, RegisterWaitForInputIdle, RegisterWaitForSingleObject, RegisterWaitForSingleObjectEx, RegisterWowBaseHandlers, RegisterWowExec, ReleaseActCtx, ReleaseMutex, ReleaseSemaphore, RemoveDirectoryA, RemoveDirectoryW, RemoveLocalAlternateComputerNameA, RemoveLocalAlternateComputerNameW, RemoveVectoredExceptionHandler, ReplaceFile, ReplaceFileA, ReplaceFileW, RequestDeviceWakeup, RequestWakeupLatency, ResetEvent, ResetWriteWatch, RestoreLastError, ResumeThread, RtlCaptureContext, RtlCaptureStackBackTrace, RtlFillMemory, RtlMoveMemory, RtlUnwind, RtlZeroMemory, ScrollConsoleScreenBufferA, ScrollConsoleScreenBufferW, SearchPathA, SearchPathW, SetCPGlobal, SetCalendarInfoA, SetCalendarInfoW, SetClientTimeZoneInformation, SetComPlusPackageInstallStatus, SetCommBreak, SetCommConfig, SetCommMask, SetCommState, SetCommTimeouts, SetComputerNameA, SetComputerNameExA, SetComputerNameExW, SetComputerNameW, SetConsoleActiveScreenBuffer, SetConsoleCP, SetConsoleCommandHistoryMode, SetConsoleCtrlHandler, SetConsoleCursor, SetConsoleCursorInfo, SetConsoleCursorMode, SetConsoleCursorPosition, SetConsoleDisplayMode, SetConsoleFont, SetConsoleHardwareState, SetConsoleIcon, SetConsoleInputExeNameA, SetConsoleInputExeNameW, SetConsoleKeyShortcuts, SetConsoleLocalEUDC, SetConsoleMaximumWindowSize, SetConsoleMenuClose, SetConsoleMode, SetConsoleNlsMode, SetConsoleNumberOfCommandsA, SetConsoleNumberOfCommandsW, SetConsoleOS2OemFormat, SetConsoleOutputCP, SetConsolePalette, SetConsoleScreenBufferSize, SetConsoleTextAttribute, SetConsoleTitleA, SetConsoleTitleW, SetConsoleWindowInfo, SetCriticalSectionSpinCount, SetCurrentDirectoryA, SetCurrentDirectoryW, SetDefaultCommConfigA, SetDefaultCommConfigW, SetDllDirectoryA, SetDllDirectoryW, SetEndOfFile, SetEnvironmentVariableA, SetEnvironmentVariableW, SetErrorMode, SetEvent, SetFileApisToANSI, SetFileApisToOEM, SetFileAttributesA, SetFileAttributesW, SetFilePointer, SetFilePointerEx, SetFileShortNameA, SetFileShortNameW, SetFileTime, SetFileValidData, SetFirmwareEnvironmentVariableA, SetFirmwareEnvironmentVariableW, SetHandleContext, SetHandleCount, SetHandleInformation, SetInformationJobObject, SetLastConsoleEventActive, SetLastError, SetLocalPrimaryComputerNameA, SetLocalPrimaryComputerNameW, SetLocalTime, SetLocaleInfoA, SetLocaleInfoW, SetMailslotInfo, SetMessageWaitingIndicator, SetNamedPipeHandleState, SetPriorityClass, SetProcessAffinityMask, SetProcessDEPPolicy, SetProcessPriorityBoost, SetProcessShutdownParameters, SetProcessWorkingSetSize, SetSearchPathMode, SetStdHandle, SetSystemPowerState, SetSystemTime, SetSystemTimeAdjustment, SetTapeParameters, SetTapePosition, SetTermsrvAppInstallMode, SetThreadAffinityMask, SetThreadContext, SetThreadExecutionState, SetThreadIdealProcessor, SetThreadLocale, SetThreadPriority, SetThreadPriorityBoost, SetThreadUILanguage, SetTimeZoneInformation, SetTimerQueueTimer, SetUnhandledExceptionFilter, SetUserGeoID, SetVDMCurrentDirectories, SetVolumeLabelA, SetVolumeLabelW, SetVolumeMountPointA, SetVolumeMountPointW, SetWaitableTimer, SetupComm, ShowConsoleCursor, SignalObjectAndWait, SizeofResource, Sleep, SleepEx, SuspendThread, SwitchToFiber, SwitchToThread, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, TerminateJobObject, TerminateProcess, TerminateThread, TermsrvAppInstallMode, Thread32First, Thread32Next, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, Toolhelp32ReadProcessMemory, TransactNamedPipe, TransmitCommChar, TrimVirtualBuffer, TryEnterCriticalSection, TzSpecificLocalTimeToSystemTime, UTRegister, UTUnRegister, UnhandledExceptionFilter, UnlockFile, UnlockFileEx, UnmapViewOfFile, UnregisterConsoleIME, UnregisterWait, UnregisterWaitEx, UpdateResourceA, UpdateResourceW, VDMConsoleOperation, VDMOperationStarted, ValidateLCType, ValidateLocale, VerLanguageNameA, VerLanguageNameW, VerSetConditionMask, VerifyConsoleIoHandle, VerifyVersionInfoA, VerifyVersionInfoW, VirtualAlloc, VirtualAllocEx, VirtualBufferExceptionHandler, VirtualFree, VirtualFreeEx, VirtualLock, VirtualProtect, VirtualProtectEx, VirtualQuery, VirtualQueryEx, VirtualUnlock, WTSGetActiveConsoleSessionId, WaitCommEvent, WaitForDebugEvent, WaitForMultipleObjects, WaitForMultipleObjectsEx, WaitForSingleObject, WaitForSingleObjectEx, WaitNamedPipeA, WaitNamedPipeW, WideCharToMultiByte, WinExec, WriteConsoleA, WriteConsoleInputA, WriteConsoleInputVDMA, WriteConsoleInputVDMW, WriteConsoleInputW, WriteConsoleOutputA, WriteConsoleOutputAttribute, WriteConsoleOutputCharacterA, WriteConsoleOutputCharacterW, WriteConsoleOutputW, WriteConsoleW, WriteFile, WriteFileEx, WriteFileGather, WritePrivateProfileSectionA, WritePrivateProfileSectionW, WritePrivateProfileStringA, WritePrivateProfileStringW, WritePrivateProfileStructA, WritePrivateProfileStructW, WriteProcessMemory, WriteProfileSectionA, WriteProfileSectionW, WriteProfileStringA, WriteProfileStringW, WriteTapemark, ZombifyActCtx, _hread, _hwrite, _lclose, _lcreat, _llseek, _lopen, _lread, _lwrite, lstrcat, lstrcatA, lstrcatW, lstrcmp, lstrcmpA, lstrcmpW, lstrcmpi, lstrcmpiA, lstrcmpiW, lstrcpy, lstrcpyA, lstrcpyW, lstrcpyn, lstrcpynA, lstrcpynW, lstrlen, lstrlenA, lstrlenW
    TrID : File type identification
    Win64 Executable Generic (42.6%)
    Win32 EXE PECompact compressed (generic) (20.7%)
    Win32 Executable MS Visual C++ (generic) (18.8%)
    Win 9x/ME Control Panel applet (7.7%)
    Win32 Executable Generic (4.2%)
    ThreatExpert: http://www.threatexpert.com/report.a...b2ccabbbbe95f3
    ssdeep: 12288:7wLw6PKp1IgSq1cNfxVNLww0I7OM4mQRQ:XpWHfnNLxwaQRQ
    PEiD : -
    RDS : NSRL Reference Data Set
    -

  9. #9
    Security Expert: Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,288

    Default

    Hi,

    Please start MBAM, update its definitions on update tab and then run a quick scan. Post back the report.

    Do you have Windows XP Home installation CD handy?
    Microsoft Windows Insider MVP 2016-2020
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  10. #10
    Junior Member
    Join Date
    Nov 2009
    Posts
    19

    Default

    the xp cd, I'm working on a netbook, and it doesn't have a drive. I have an external hdd, and another computer. The netbook has an solid state hard drive, and I read that formatting will affect the way it holds data.

    Malwarebytes' Anti-Malware 1.41
    Database version: 3206
    Windows 5.1.2600 Service Pack 3

    11/23/2009 3:59:09 PM
    mbam-log-2009-11-23 (15-59-04).txt

    Scan type: Quick Scan
    Objects scanned: 95802
    Time elapsed: 3 minute(s), 37 second(s)

    Memory Processes Infected: 1
    Memory Modules Infected: 0
    Registry Keys Infected: 2
    Registry Values Infected: 1
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 10

    Memory Processes Infected:
    C:\Program Files\AntiMalware\antimalware.exe (Trojan.FakeAlert) -> No action taken.

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Active Security (Rogue.ActiveSecurity) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\antimalware (Rogue.AntiMalware) -> No action taken.

    Registry Values Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\antimalware (Trojan.FakeAlert) -> No action taken.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Program Files\AntiMalware\antimalware.exe (Trojan.FakeAlert) -> No action taken.
    C:\Program Files\AntiMalware\help.ico (Rogue.AntiMalware) -> No action taken.
    C:\Program Files\AntiMalware\malw.db (Rogue.AntiMalware) -> No action taken.
    C:\Program Files\AntiMalware\Uninstall.exe (Rogue.AntiMalware) -> No action taken.
    C:\Documents and Settings\All Users\Desktop\AntiMalware Support.lnk (Rogue.AntiMalware) -> No action taken.
    C:\Documents and Settings\All Users\Desktop\AntiMalware.lnk (Rogue.AntiMalware) -> No action taken.
    C:\Documents and Settings\All Users\Start Menu\Programs\AntiMalware\AntiMalware Support.lnk (Rogue.AntiMalware) -> No action taken.
    C:\Documents and Settings\All Users\Start Menu\Programs\AntiMalware\AntiMalware.lnk (Rogue.AntiMalware) -> No action taken.
    C:\Documents and Settings\All Users\Start Menu\Programs\AntiMalware\Uninstall AntiMalware.lnk (Rogue.AntiMalware) -> No action taken.
    C:\Program Files\AntiMalware\amext.dll (Rogue.AntiMalware) -> No action taken.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •