I've been having a redirecting problem with firefox, I've run Malwarebytes and Super Antispyware in safemode like 6 times and only SAS finds the trojan and as soon as i get booted up and try firefox it starts again.
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Database version: 5665
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
2/10/2011 4:02:59 PM
mbam-log-2011-02-10 (16-02-59).txt
Scan type: Full scan (C:\|D:\|)
Objects scanned: 120841
Time elapsed: 24 minute(s), 31 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-02-10 12:07:36
Windows 6.1.7600 Harddisk0\DR0 -> \Device\Ide\IdePort0 WDC_WD800JB-00JJC0 rev.05.01C05
Running: lsc4vmnn.exe; Driver: C:\Users\Chaos\AppData\Local\Temp\kglcqpog.sys
---- System - GMER 1.0.15 ----
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAllocateVirtualMemory [0x91666328]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAlpcConnectPort [0x91664A8C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAlpcCreatePort [0x9166455E]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAssignProcessToJobObject [0x91665824]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwConnectPort [0x9166464C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateFile [0x9166B1F8]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreatePort [0x9166446A]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateSection [0x916624F2]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateThread [0x91663634]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateThreadEx [0x91663768]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwDebugActiveProcess [0x91663D22]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwDuplicateObject [0x9166432C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwLoadDriver [0x9166524C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenFile [0x9166B554]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenSection [0x916627B4]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenThread [0x916638B0]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwProtectVirtualMemory [0x916655D6]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwQueueApcThread [0x91665940]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwRequestPort [0x91664CB0]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwRequestWaitReplyPort [0x91664F14]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwResumeThread [0x916640CE]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSecureConnectPort [0x9166486E]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSetContextThread [0x91663BCC]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSetSystemInformation [0x91665FDC]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwShutdownSystem [0x91665186]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSuspendProcess [0x916641FE]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSuspendThread [0x91663F7A]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSystemDebugControl [0x91663E40]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwTerminateProcess [0x91663472]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwTerminateThread [0x91663A66]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwUnloadDriver [0x91665414]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwWriteVirtualMemory [0x91665700]
---- Kernel code sections - GMER 1.0.15 ----
.text ntkrnlpa.exe!ZwSaveKeyEx + 13AD 83289579 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 832ADF52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!RtlSidHashLookup + 23C 832B573C 4 Bytes [28, 63, 66, 91] {SUB [EBX+0x66], AH; XCHG ECX, EAX}
.text ntkrnlpa.exe!RtlSidHashLookup + 248 832B5748 8 Bytes [8C, 4A, 66, 91, 5E, 45, 66, ...] {MOV WORD [EDX+0x66], CS; XCHG ECX, EAX; POP ESI; INC EBP; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 29C 832B579C 4 Bytes [24, 58, 66, 91] {AND AL, 0x58; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 2DC 832B57DC 4 Bytes [4C, 46, 66, 91] {DEC ESP; INC ESI; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 2F8 832B57F8 4 Bytes [F8, B1, 66, 91] {CLC ; MOV CL, 0x66; XCHG ECX, EAX}
.text ...
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x91E3A000, 0x2D5378, 0xE8000020]
.text C:\Windows\system32\DRIVERS\lirsgt.sys section is writeable [0x97BAE300, 0x1BCE, 0xE8000020]
---- User code sections - GMER 1.0.15 ----
.text C:\Windows\Explorer.EXE[300] ntdll.dll!NtProtectVirtualMemory 76ED5360 5 Bytes JMP 009B000A
.text C:\Windows\Explorer.EXE[300] ntdll.dll!NtWriteVirtualMemory 76ED5EE0 5 Bytes JMP 009C000A
.text C:\Windows\Explorer.EXE[300] ntdll.dll!KiUserExceptionDispatcher 76ED6448 5 Bytes JMP 009A000A
.text C:\Windows\Explorer.EXE[300] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71900F5A
.text C:\Windows\Explorer.EXE[300] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 71930F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 717E0F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!BitBlt 75777180 6 Bytes JMP 717B0F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 71840F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71810F5A
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [86, 71]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [89, 71]
.text C:\Windows\Explorer.EXE[300] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Windows\Explorer.EXE[300] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 718D0F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [78, 71] {JS 0x73}
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [75, 71] {JNZ 0x73}
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A30F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A70F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71730F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71700F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [87, 71]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [8A, 71]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 71A00F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 718E0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 717F0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!BitBlt 75777180 6 Bytes JMP 717C0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 71850F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71820F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] advapi32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71910F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] advapi32.dll!CreateServiceA 75A72120 6 Bytes JMP 71940F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AF0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71970F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719D0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 719A0F5A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtProtectVirtualMemory 76ED5360 5 Bytes JMP 0037000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtWriteVirtualMemory 76ED5EE0 5 Bytes JMP 0038000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!KiUserExceptionDispatcher 76ED6448 5 Bytes JMP 0036000A
.text C:\Windows\system32\svchost.exe[1300] ole32.dll!CoCreateInstance 759257FC 5 Bytes JMP 0052000A
.text C:\Windows\system32\svchost.exe[1300] USER32.dll!GetCursorPos 757CC198 5 Bytes JMP 00EE000A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 716C0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71690F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 716C0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71690F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71660F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71630F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] advapi32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] advapi32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!LoadStringA 757C6563 6 Bytes JMP 71600F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!LoadStringW 757D5533 6 Bytes JMP 715C0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!ioctlsocket 75893131 6 Bytes JMP 71450F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!sendto 75893AED 6 Bytes JMP 714D0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!closesocket 75893BED 6 Bytes JMP 71590F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!recv 758947DF 6 Bytes JMP 71350F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!connect 758948BE 6 Bytes JMP 71560F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!select 75894981 6 Bytes JMP 714A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSASend 758968A7 6 Bytes JMP 712E0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSARecv 7589C29F 6 Bytes JMP 71310F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!send 7589C4C8 6 Bytes JMP 71500F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSAAsyncSelect 758AAACC 6 Bytes JMP 713A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [6E, 71]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6B, 71]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!LdrGetProcedureAddressEx 76EEEB05 6 Bytes JMP 71600F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!LdrGetProcedureAddress 76EEEE27 6 Bytes JMP 71630F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71690F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71660F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!WriteProcessMemory 75B6859F 6 Bytes JMP 715A0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!VirtualProtectEx 75B8F651 6 Bytes JMP 715D0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71870F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718A0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoGetClassObject 7590A2D4 6 Bytes JMP 718D0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoCreateInstance 759257FC 6 Bytes JMP 71930F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoCreateInstanceEx 7592583F 6 Bytes JMP 71900F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71750F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71720F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717B0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71780F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [7D, 71] {JGE 0x73}
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Database version: 5665
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
2/10/2011 4:02:59 PM
mbam-log-2011-02-10 (16-02-59).txt
Scan type: Full scan (C:\|D:\|)
Objects scanned: 120841
Time elapsed: 24 minute(s), 31 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-02-10 12:07:36
Windows 6.1.7600 Harddisk0\DR0 -> \Device\Ide\IdePort0 WDC_WD800JB-00JJC0 rev.05.01C05
Running: lsc4vmnn.exe; Driver: C:\Users\Chaos\AppData\Local\Temp\kglcqpog.sys
---- System - GMER 1.0.15 ----
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAllocateVirtualMemory [0x91666328]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAlpcConnectPort [0x91664A8C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAlpcCreatePort [0x9166455E]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwAssignProcessToJobObject [0x91665824]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwConnectPort [0x9166464C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateFile [0x9166B1F8]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreatePort [0x9166446A]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateSection [0x916624F2]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateThread [0x91663634]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwCreateThreadEx [0x91663768]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwDebugActiveProcess [0x91663D22]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwDuplicateObject [0x9166432C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwLoadDriver [0x9166524C]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenFile [0x9166B554]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenSection [0x916627B4]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwOpenThread [0x916638B0]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwProtectVirtualMemory [0x916655D6]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwQueueApcThread [0x91665940]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwRequestPort [0x91664CB0]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwRequestWaitReplyPort [0x91664F14]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwResumeThread [0x916640CE]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSecureConnectPort [0x9166486E]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSetContextThread [0x91663BCC]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSetSystemInformation [0x91665FDC]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwShutdownSystem [0x91665186]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSuspendProcess [0x916641FE]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSuspendThread [0x91663F7A]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwSystemDebugControl [0x91663E40]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwTerminateProcess [0x91663472]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwTerminateThread [0x91663A66]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwUnloadDriver [0x91665414]
SSDT \??\C:\Windows\system32\drivers\OADriver.sys ZwWriteVirtualMemory [0x91665700]
---- Kernel code sections - GMER 1.0.15 ----
.text ntkrnlpa.exe!ZwSaveKeyEx + 13AD 83289579 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 832ADF52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!RtlSidHashLookup + 23C 832B573C 4 Bytes [28, 63, 66, 91] {SUB [EBX+0x66], AH; XCHG ECX, EAX}
.text ntkrnlpa.exe!RtlSidHashLookup + 248 832B5748 8 Bytes [8C, 4A, 66, 91, 5E, 45, 66, ...] {MOV WORD [EDX+0x66], CS; XCHG ECX, EAX; POP ESI; INC EBP; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 29C 832B579C 4 Bytes [24, 58, 66, 91] {AND AL, 0x58; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 2DC 832B57DC 4 Bytes [4C, 46, 66, 91] {DEC ESP; INC ESI; XCHG CX, AX}
.text ntkrnlpa.exe!RtlSidHashLookup + 2F8 832B57F8 4 Bytes [F8, B1, 66, 91] {CLC ; MOV CL, 0x66; XCHG ECX, EAX}
.text ...
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x91E3A000, 0x2D5378, 0xE8000020]
.text C:\Windows\system32\DRIVERS\lirsgt.sys section is writeable [0x97BAE300, 0x1BCE, 0xE8000020]
---- User code sections - GMER 1.0.15 ----
.text C:\Windows\Explorer.EXE[300] ntdll.dll!NtProtectVirtualMemory 76ED5360 5 Bytes JMP 009B000A
.text C:\Windows\Explorer.EXE[300] ntdll.dll!NtWriteVirtualMemory 76ED5EE0 5 Bytes JMP 009C000A
.text C:\Windows\Explorer.EXE[300] ntdll.dll!KiUserExceptionDispatcher 76ED6448 5 Bytes JMP 009A000A
.text C:\Windows\Explorer.EXE[300] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71900F5A
.text C:\Windows\Explorer.EXE[300] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 71930F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 717E0F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!BitBlt 75777180 6 Bytes JMP 717B0F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 71840F5A
.text C:\Windows\Explorer.EXE[300] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71810F5A
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [86, 71]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Windows\Explorer.EXE[300] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [89, 71]
.text C:\Windows\Explorer.EXE[300] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Windows\Explorer.EXE[300] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 718D0F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Windows\Explorer.EXE[300] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [78, 71] {JS 0x73}
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [75, 71] {JNZ 0x73}
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A30F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A70F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71730F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] KERNEL32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71700F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [87, 71]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [8A, 71]
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 71A00F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] user32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 718E0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 717F0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!BitBlt 75777180 6 Bytes JMP 717C0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 71850F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71820F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] advapi32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71910F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] advapi32.dll!CreateServiceA 75A72120 6 Bytes JMP 71940F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AF0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71970F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719D0F5A
.text C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[896] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 719A0F5A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtProtectVirtualMemory 76ED5360 5 Bytes JMP 0037000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtWriteVirtualMemory 76ED5EE0 5 Bytes JMP 0038000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!KiUserExceptionDispatcher 76ED6448 5 Bytes JMP 0036000A
.text C:\Windows\system32\svchost.exe[1300] ole32.dll!CoCreateInstance 759257FC 5 Bytes JMP 0052000A
.text C:\Windows\system32\svchost.exe[1300] USER32.dll!GetCursorPos 757CC198 5 Bytes JMP 00EE000A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 716C0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71690F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[1688] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 716C0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71690F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\AVG\AVG9\avgtray.exe[1692] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [71, 71] {JNO 0x73}
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6E, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CloseHandle 75B505B7 6 Bytes JMP 71900F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!CreateFileW 75B50B5D 6 Bytes JMP 71930F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71660F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71630F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] advapi32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 718A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] advapi32.dll!CreateServiceA 75A72120 6 Bytes JMP 718D0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71780F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71750F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717E0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 717B0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [80, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!LoadStringA 757C6563 6 Bytes JMP 71600F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterHotKey 757CC8F9 3 Bytes [FF, 25, 1E]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!RegisterHotKey + 4 757CC8FD 2 Bytes [83, 71]
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!LoadStringW 757D5533 6 Bytes JMP 715C0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!ExitWindowsEx 758106EF 6 Bytes JMP 719F0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] USER32.dll!DdeClientTransaction 7582329C 6 Bytes JMP 71870F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!ioctlsocket 75893131 6 Bytes JMP 71450F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!sendto 75893AED 6 Bytes JMP 714D0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!closesocket 75893BED 6 Bytes JMP 71590F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!socket 75893F00 6 Bytes JMP 71AE0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!recv 758947DF 6 Bytes JMP 71350F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!connect 758948BE 6 Bytes JMP 71560F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!select 75894981 6 Bytes JMP 714A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSASend 758968A7 6 Bytes JMP 712E0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSARecv 7589C29F 6 Bytes JMP 71310F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!send 7589C4C8 6 Bytes JMP 71500F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] WS2_32.dll!WSAAsyncSelect 758AAACC 6 Bytes JMP 713A0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho2Ex 71A8561D 6 Bytes JMP 71960F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho 71A867C3 6 Bytes JMP 719C0F5A
.text C:\Program Files\Online Armor\oaui.exe[1768] IPHLPAPI.DLL!IcmpSendEcho2 71A867F3 6 Bytes JMP 71990F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtCreateSymbolicLinkObject 76ED4B50 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtCreateSymbolicLinkObject + 4 76ED4B54 2 Bytes [6E, 71]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtOpenFile 76ED5120 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!NtOpenFile + 4 76ED5124 2 Bytes [6B, 71]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!LdrGetProcedureAddressEx 76EEEB05 6 Bytes JMP 71600F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ntdll.dll!LdrGetProcedureAddress 76EEEE27 6 Bytes JMP 71630F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!CreateProcessW 75B0202D 6 Bytes JMP 71A20F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!CreateProcessA 75B02062 6 Bytes JMP 71A50F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!LoadLibraryA 75B52864 6 Bytes JMP 71690F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!LoadLibraryW 75B528B2 6 Bytes JMP 71660F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!WriteProcessMemory 75B6859F 6 Bytes JMP 715A0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] kernel32.dll!VirtualProtectEx 75B8F651 6 Bytes JMP 715D0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ADVAPI32.dll!CreateServiceW 75A5DBC1 6 Bytes JMP 71870F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ADVAPI32.dll!CreateServiceA 75A72120 6 Bytes JMP 718A0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoGetClassObject 7590A2D4 6 Bytes JMP 718D0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoCreateInstance 759257FC 6 Bytes JMP 71930F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] ole32.dll!CoCreateInstanceEx 7592583F 6 Bytes JMP 71900F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!DeleteDC 75776A2C 6 Bytes JMP 71750F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!BitBlt 75777180 6 Bytes JMP 71720F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!CreateDCA 75779975 6 Bytes JMP 717B0F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] GDI32.dll!CreateDCW 7577BD21 6 Bytes JMP 71780F5A
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] USER32.dll!RegisterRawInputDevices 757C5C2F 3 Bytes [FF, 25, 1E]
.text C:\Users\Chaos\AppData\Local\Google\Update\GoogleUpdate.exe[1844] USER32.dll!RegisterRawInputDevices + 4 757C5C33 2 Bytes [7D, 71] {JGE 0x73}