I needed quick help interpreting entries in Antirootkit section of RK marked as Hook.SSDTs, Hook.Shadows, Hook.IEATs, and "Unknown". They were all marked Orange, with no Red entries listed in any tabs, but though I've researched I've not been able to discern whether these, or 8 orange items in Registry tab are dangerous and need to be deleted. Other tabs came back Okay...
I've reviewed tutorial and Official documentation pgs and former seems to indicate that some of these items are malware.
Scan was run on older XP system I've been cleaning up and preparing to migrate to new PC/OS.
The Scan Report is below. Any help would be greatly appreciated!
RogueKiller V10.0.6.0 [Nov 13 2014] by Adlice Software
mail :
http://www.adlice.com/contact/Feedback :
http://forum.adlice.comWebsite :
http://www.adlice.com/softwares/roguekiller/Blog :
http://www.adlice.comOperating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Robert C [Administrator]
Mode : Scan -- Date : 11/19/2014 11:18:12
¤¤¤ Processes : 0 ¤¤¤
¤¤¤ Registry : 36 ¤¤¤
[PUP] HKEY_CLASSES_ROOT\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{19D2F415-D58B-46BC-9390-C03DCBC21EB2} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{6E45F3E8-2683-4824-A6BE-08108022FB36} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{744E0E81-BC79-4719-A58B-C98F7E78EE5D} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{9F0F16DD-4E76-4049-A9B1-7A91E48F0323} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{F4288797-CB12-49CE-9DF8-7CDFA1143BEA} -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\A2DDA (\??\C:\DOCUME~1\Carlos\LOCALS~1\Temp\A2ONLINESCAN\a2ddax86.sys) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\JYOIXWWQWAPKZB (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\JYOIXWWQWAPKZB.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ODABSUGBZSJ (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ODABSUGBZSJ.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\R (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\R.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ZUZKIH (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ZUZKIH.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\A2DDA (\??\C:\DOCUME~1\Carlos\LOCALS~1\Temp\A2ONLINESCAN\a2ddax86.sys) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\JYOIXWWQWAPKZB (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\JYOIXWWQWAPKZB.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\ODABSUGBZSJ (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ODABSUGBZSJ.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\R (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\R.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\ZUZKIH (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ZUZKIH.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\A2DDA (\??\C:\DOCUME~1\Carlos\LOCALS~1\Temp\A2ONLINESCAN\a2ddax86.sys) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\JYOIXWWQWAPKZB (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\JYOIXWWQWAPKZB.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\ODABSUGBZSJ (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ODABSUGBZSJ.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\R (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\R.exe) -> Found
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\ZUZKIH (C:\DOCUME~1\CARLOS~1\LOCALS~1\Temp\ZUZKIH.exe) -> Found
[PUM.Proxy] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1007\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : <local> -> Found
[PUM.HomePage] HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main | Start Page :
http://www.dell4me.com/myway -> Found
[PUM.HomePage] HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main | Start Page :
http://www.dell4me.com/myway -> Found
[PUM.SearchPage] HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main | Search Page :
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> Found
[PUM.SearchPage] HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main | Search Page :
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> Found
[PUM.SearchPage] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1011\Software\Microsoft\Internet Explorer\Main | Search Page :
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch -> Found
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 68.87.71.230 68.87.73.246 [UNITED STATES (US)][UNITED STATES (US)] -> Found
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DFC356A3-D4BE-4B48-A063-93DEA5C94087} | DhcpNameServer : 68.87.71.230 68.87.73.246 [UNITED STATES (US)][UNITED STATES (US)] -> Found
[PUM.StartMenu] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowPrinters : 0 -> Found
[PUM.StartMenu] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRecentDocs : 2 -> Found
[PUM.StartMenu] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1011\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRecentDocs : 2 -> Found
[PUM.DesktopIcons] HKEY_USERS\S-1-5-21-2032323870-3987493145-801179686-1007\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found
¤¤¤ Tasks : 0 ¤¤¤
¤¤¤ Files : 0 ¤¤¤
¤¤¤ Hosts File : 1 ¤¤¤
[C:\WINDOWS\System32\drivers\etc\hosts] 127.0.0.1 localhost
¤¤¤ Antirootkit : 105 (Driver: Loaded) ¤¤¤
[SSDT:Addr(Hook.SSDT)] NtAdjustPrivilegesToken[11] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d1fba
[SSDT:Addr(Hook.SSDT)] NtAlertResumeThread[12] : Unknown @ 0x8a7d3cc8
[SSDT:Addr(Hook.SSDT)] NtAlertThread[13] : Unknown @ 0x8a7d3d20
[SSDT:Addr(Hook.SSDT)] unknown[17] : Unknown @ 0x8a735800
[SSDT:Addr(Hook.SSDT)] NtAssignProcessToJobObject[19] : Unknown @ 0x8a67ccb0
[SSDT:Addr(Hook.SSDT)] NtClose[25] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d28b4
[SSDT:Addr(Hook.SSDT)] NtConnectPort[31] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ebaee
[SSDT:Addr(Hook.SSDT)] NtCreateEvent[35] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2e26
[SSDT:Addr(Hook.SSDT)] NtCreateMutant[43] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2d14
[SSDT:Addr(Hook.SSDT)] NtCreatePort[46] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ebe06
[SSDT:Addr(Hook.SSDT)] NtCreateProcess[47] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d3056
[SSDT:Addr(Hook.SSDT)] NtCreateProcessEx[48] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d321e
[SSDT:Addr(Hook.SSDT)] NtCreateSection[50] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d1d76
[SSDT:Addr(Hook.SSDT)] NtCreateSemaphore[51] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2f3e
[SSDT:Addr(Hook.SSDT)] NtCreateSymbolicLinkObject[52] : Unknown @ 0x8a67cb60
[SSDT:Addr(Hook.SSDT)] NtCreateThread[53] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d25e6
[SSDT:Addr(Hook.SSDT)] NtCreateWaitablePort[56] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ebece
[SSDT:Addr(Hook.SSDT)] NtDebugActiveProcess[57] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d353c
[SSDT:Addr(Hook.SSDT)] NtDeleteKey[63] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6084
[SSDT:Addr(Hook.SSDT)] NtDeleteValueKey[65] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e788e
[SSDT:Addr(Hook.SSDT)] NtDeviceIoControlFile[66] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d28f6
[SSDT:Addr(Hook.SSDT)] NtDuplicateObject[68] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d453c
[SSDT:Addr(Hook.SSDT)] NtEnumerateKey[71] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e7088
[SSDT:Addr(Hook.SSDT)] NtEnumerateValueKey[73] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e7a38
[SSDT:Addr(Hook.SSDT)] unknown[83] : Unknown @ 0x8a71bcf0
[SSDT:Addr(Hook.SSDT)] NtImpersonateAnonymousToken[89] : Unknown @ 0x8a633470
[SSDT:Addr(Hook.SSDT)] NtImpersonateThread[91] : Unknown @ 0x8a6334e8
[SSDT:Addr(Hook.SSDT)] NtLoadDriver[97] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d362e
[SSDT:Addr(Hook.SSDT)] NtLoadKey[98] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6bc0
[SSDT:Addr(Hook.SSDT)] NtLoadKey2[99] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6e1c
[SSDT:Addr(Hook.SSDT)] NtMapViewOfSection[108] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d3b9a
[SSDT:Addr(Hook.SSDT)] NtNotifyChangeKey[111] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ea30a
[SSDT:Addr(Hook.SSDT)] NtOpenEvent[114] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2eb8
[SSDT:Addr(Hook.SSDT)] NtOpenMutant[120] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2da0
[SSDT:Addr(Hook.SSDT)] NtOpenProcess[122] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d21f4
[SSDT:Addr(Hook.SSDT)] NtOpenProcessToken[123] : Unknown @ 0x8a6721a8
[SSDT:Addr(Hook.SSDT)] NtOpenSection[125] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d397e
[SSDT:Addr(Hook.SSDT)] NtOpenSemaphore[126] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2fd0
[SSDT:Addr(Hook.SSDT)] NtOpenThread[128] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d20e8
[SSDT:Addr(Hook.SSDT)] unknown[137] : Unknown @ 0x8a67cc08
[SSDT:Addr(Hook.SSDT)] NtQueryKey[160] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e5eb8
[SSDT:Addr(Hook.SSDT)] NtQueryMultipleValueKey[161] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e7698
[SSDT:Addr(Hook.SSDT)] NtQueryObject[163] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ea500
[SSDT:Addr(Hook.SSDT)] NtQuerySection[167] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d3ec0
[SSDT:Addr(Hook.SSDT)] NtQueryValueKey[177] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e7488
[SSDT:Addr(Hook.SSDT)] NtQueueApcThread[180] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d37ce
[SSDT:Addr(Hook.SSDT)] NtRenameKey[192] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6198
[SSDT:Addr(Hook.SSDT)] NtReplaceKey[193] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e680c
[SSDT:Addr(Hook.SSDT)] NtReplyPort[194] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ec048
[SSDT:Addr(Hook.SSDT)] NtReplyWaitReceivePort[195] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ebf96
[SSDT:Addr(Hook.SSDT)] NtRequestWaitReplyPort[200] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ec0b4
[SSDT:Addr(Hook.SSDT)] NtRestoreKey[204] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6a14
[SSDT:Addr(Hook.SSDT)] NtResumeThread[206] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d43de
[SSDT:Addr(Hook.SSDT)] NtSaveKey[207] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e633e
[SSDT:Addr(Hook.SSDT)] NtSaveKeyEx[208] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e64d4
[SSDT:Addr(Hook.SSDT)] NtSaveMergedKeys[209] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e6670
[SSDT:Addr(Hook.SSDT)] NtSecureConnectPort[210] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ebc76
[SSDT:Addr(Hook.SSDT)] NtSetContextThread[213] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d2756
[SSDT:Addr(Hook.SSDT)] NtSetInformationProcess[228] : Unknown @ 0x8a66a588
[SSDT:Addr(Hook.SSDT)] NtSetInformationToken[230] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d33e8
[SSDT:Addr(Hook.SSDT)] NtSetSystemInformation[240] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d4010
[SSDT:Addr(Hook.SSDT)] NtSetValueKey[247] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75e7248
[SSDT:Addr(Hook.SSDT)] NtSuspendProcess[253] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d4104
[SSDT:Addr(Hook.SSDT)] NtSuspendThread[254] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d423e
[SSDT:Addr(Hook.SSDT)] NtSystemDebugControl[255] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d345e
[SSDT:Addr(Hook.SSDT)] NtTerminateThread[258] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d22ea
[SSDT:Addr(Hook.SSDT)] NtUnmapViewOfSection[267] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d3d78
[SSDT:Addr(Hook.SSDT)] NtWriteVirtualMemory[277] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75d247c
[ShwSSDT:Addr(Hook.Shadow)] NtGdiBitBlt[13] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd508
[ShwSSDT:Addr(Hook.Shadow)] NtGdiMaskBlt[227] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd5de
[ShwSSDT:Addr(Hook.Shadow)] NtGdiPlgBlt[237] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd64e
[ShwSSDT:Addr(Hook.Shadow)] NtGdiStretchBlt[292] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd572
[ShwSSDT:Addr(Hook.Shadow)] NtUserAttachThreadInput[307] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ddbd6
[ShwSSDT:Addr(Hook.Shadow)] NtUserBuildHwndList[312] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd6b6
[ShwSSDT:Addr(Hook.Shadow)] NtUserCallOneParam[323] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd4d4
[ShwSSDT:Addr(Hook.Shadow)] NtUserFindWindowEx[378] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd2c8
[ShwSSDT:Addr(Hook.Shadow)] NtUserGetAsyncKeyState[383] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd0d6
[ShwSSDT:Addr(Hook.Shadow)] NtUserGetKeyboardState[414] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd3d6
[ShwSSDT:Addr(Hook.Shadow)] NtUserGetKeyState[416] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd122
[ShwSSDT:Addr(Hook.Shadow)] NtUserGetRawInputData[428] : Unknown @ 0x8a8ac830
[ShwSSDT:Addr(Hook.Shadow)] NtUserMessageCall[460] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd21a
[ShwSSDT:Addr(Hook.Shadow)] NtUserPostMessage[475] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd16e
[ShwSSDT:Addr(Hook.Shadow)] NtUserPostThreadMessage[476] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd1c2
[ShwSSDT:Addr(Hook.Shadow)] NtUserRegisterHotKey[490] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75ddc90
[ShwSSDT:Addr(Hook.Shadow)] NtUserRegisterRawInputDevices[491] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd35e
[ShwSSDT:Addr(Hook.Shadow)] NtUserSendInput[502] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd27a
[ShwSSDT:Addr(Hook.Shadow)] NtUserSetParent[529] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dda88
[ShwSSDT:Addr(Hook.Shadow)] NtUserSetWindowsHookEx[549] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd026
[ShwSSDT:Addr(Hook.Shadow)] NtUserSetWinEventHook[552] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dd07e
[ShwSSDT:Addr(Hook.Shadow)] NtUserUnregisterHotKey[576] : C:\WINDOWS\system32\DRIVERS\8577759drv.sys @ 0xa75dddb0
[Filter(Kernel.Filter)] \Driver\atapi @ \Device\Ide\IdeDeviceP0T0L0-3 : \Driver\iomdisk @ Unknown (iomdisk.sys)
[IAT:Inl] (explorer.exe @ KERNEL32.dll) ntdll.dll - NtAllocateVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008cf0 (jmp 0xffffffff936fbd82)
[IAT:Inl] (explorer.exe @ KERNEL32.dll) ntdll.dll - NtFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ KERNEL32.dll) ntdll.dll - NtProtectVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008d80 (jmp 0xffffffff936fb692)
[IAT:Inl] (explorer.exe @ ADVAPI32.dll) ntdll.dll - NtAllocateVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008cf0 (jmp 0xffffffff936fbd82)
[IAT:Inl] (explorer.exe @ ADVAPI32.dll) ntdll.dll - NtFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ Secur32.dll) ntdll.dll - NtFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ Secur32.dll) ntdll.dll - ZwFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ ShimEng.dll) ntdll.dll - NtFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ ShimEng.dll) ntdll.dll - NtAllocateVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008cf0 (jmp 0xffffffff936fbd82)
[IAT:Inl] (explorer.exe @ ShimEng.dll) ntdll.dll - NtProtectVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008d80 (jmp 0xffffffff936fb692)
[IAT:Inl] (explorer.exe @ apphelp.dll) ntdll.dll - NtProtectVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008d80 (jmp 0xffffffff936fb692)
[IAT:Inl] (explorer.exe @ apphelp.dll) ntdll.dll - NtAllocateVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008cf0 (jmp 0xffffffff936fbd82)
[IAT:Inl] (explorer.exe @ apphelp.dll) ntdll.dll - NtFreeVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008ea0 (jmp 0xffffffff936fbb12)
[IAT:Inl] (explorer.exe @ PSAPI.DLL) ntdll.dll - NtAllocateVirtualMemory : C:\WINDOWS\system32\hmpalert.dll @ 0x10008cf0 (jmp 0xffffffff936fbd82)
¤¤¤ Web browsers : 1 ¤¤¤
[PUM.HomePage][FIREFX:Config] xxd3xa0o.default : user_pref("browser.startup.homepage", "
www.google.com"); -> Found
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: +++++
--- User ---
[MBR] a9d88c5bfcceb358dee0fea0508aadd4
[BSP] 06fafca6e7c85f9f43ebb60ce3e626a6 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 156 MB
1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 321300 | Size: 152468 MB
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: Sony Storage Media USB Device +++++
--- User ---
[MBR] bc980fe5e099e12f5e0d9d86acbc5044
[BSP] 33a07a59d299ab4ea9f4ab0156f9d86f : Windows XP MBR Code
Partition table:
0 - [ACTIVE] FAT32-LBA (0xc) [VISIBLE] Offset (sectors): 32 | Size: 3823 MB
User = LL1 ... OK
Error reading LL2 MBR! ([32] The request is not supported. )
+++++ PhysicalDrive2: Sony Storage Media USB Device +++++
Error reading User MBR! ([15] The device is not ready. )
User = LL1 ... OK
Error reading LL2 MBR! ([32] The request is not supported. )