IE y msn con problemas

Responder
kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

IE y msn con problemas

Mensaje por kaliro » 10 Dic 2007, 18:03

:( hola q tal espero que esten bien todos estoy aqui para ver si me pudisen dar su ayuda



todo empeso cuando intale el msn live 8.5 y como me puso el inicio de la maquina lenta lo desintale y intale la varsion antigua la 8.1 la cual no me dejaba intalarse y buscando en intenet en una pagina reconosida por microsoft no la mensiono por que despues la consideran spam

me dijo q desbloquiara la carpeta de windows d solo lectura lo ise y se intalo y como considere que era algo peligroso teniendola sin restinciones la puse d nuevo como solo lectura despues de apagar el ordenador



me tiro el error que desia no se han podido reparar componentes del messenger (esto ocurre cada ves q ensiendo la pc) y de hay el intenet anda letisimo solo el IE y ares me baja peor que emule digo a 0.25kbs @ 0.75kbs en verdad no se que hacer le pase el nod32 original y nada



bueno aqui esta mi long

Logfile of HijackThis v1.99.1

Scan saved at 11:50:44 a.m., on 12/10/2007

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16544)



Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Archivos de programa\Lavasoft\Ad-Aware 2007\aawservice.exe

C:\WINDOWS\Explorer.EXE

C:\Archivos de programa\Thomson\SpeedTouch USB\Dragdiag.exe

C:\WINDOWS\RTHDCPL.EXE

C:\WINDOWS\system32\igfxpers.exe

C:\Archivos de programa\Eset\nod32kui.exe

C:\WINDOWS\system32\hkcmd.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\igfxsrvc.exe

C:\Archivos de programa\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Archivos de programa\Microsoft ActiveSync\wcescomm.exe

C:\WINDOWS\system32\ctfmon.exe

C:\ARCHIV~1\MI3AA1~1\rapimgr.exe

C:\WINDOWS\system32\crypserv.exe

C:\Archivos de programa\Eset\nod32krn.exe

c:\Archivos de programa\Microsoft SQL Server\90\Shared\sqlwriter.exe

C:\Archivos de programa\MSN Messenger\msnmsgr.exe

C:\Archivos de programa\MSN Messenger\usnsvc.exe

C:\ARCHIV~1\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Administrador\Escritorio\ELISTARA.16122007.EXE

C:\Archivos de programa\Archivos comunes\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\Documents and Settings\Administrador\Mis documentos\HijackThis.exe



R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

O2 - BHO: Aplicación auxiliar de vínculos de Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Archivos de programa\Archivos comunes\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Archivos de programa\Archivos comunes\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\archivos de programa\google\googletoolbar1.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Archivos de programa\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\archivos de programa\google\googletoolbar1.dll

O4 - HKLM\..\Run: [SpeedTouch USB Diagnostics] "C:\Archivos de programa\Thomson\SpeedTouch USB\Dragdiag.exe" /icon

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE

O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe

O4 - HKLM\..\Run: [nod32kui] "C:\Archivos de programa\Eset\nod32kui.exe" /WAITSERVICE

O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe

O4 - HKCU\..\Run: [ares] "C:\Archivos de programa\Ares\Ares.exe" -h

O4 - HKCU\..\Run: [swg] C:\Archivos de programa\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Archivos de programa\Microsoft ActiveSync\wcescomm.exe"

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Archivos de programa\MSN Messenger\MsnMsgr.Exe" /background

O4 - Startup: No-IP DUC.lnk = C:\Archivos de programa\No-IP\DUC20.exe

O8 - Extra context menu item: E&xportar a Microsoft Excel - res://C:\ARCHIV~1\MICROS~1\Office12\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Consola de Sun Java - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\ARCHIV~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: Referencia - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\ARCHIV~1\MICROS~1\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O11 - Options group: [INTERNATIONAL] International*

O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1194029476390

O17 - HKLM\System\CCS\Services\Tcpip\..\{3180E1A2-3C22-4E0C-93F1-6232E0C2B75B}: NameServer = 201.225.225.225 201.224.73.162

O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\ARCHIV~1\MSNMES~1\MSGRAP~1.DLL

O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Archivos de programa\Archivos comunes\Microsoft Shared\Help\hxds.dll

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\ARCHIV~1\MSNMES~1\MSGRAP~1.DLL

O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll

O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll

O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Archivos de programa\Lavasoft\Ad-Aware 2007\aawservice.exe

O23 - Service: Adobe LM Service - Adobe Systems - C:\Archivos de programa\Archivos comunes\Adobe Systems Shared\Service\Adobelmsvc.exe

O23 - Service: Ares Chatroom server (AresChatServer) - Ares Development Group - C:\Archivos de programa\Ares\chatServer.exe

O23 - Service: Crypkey License - Kenonic Controls Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Archivos de programa\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Archivos de programa\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)

O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Archivos de programa\Eset\nod32krn.exe



espero que me ayuden :lol:

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 10 Dic 2007, 18:50

El log está limpio.



Pruebe nuestras utilidades ELITRIIP y ELISTARA yh posteenos el resultado, grcias:





[b] ELITRIIP: [/b]

http://www.zonavirus.com/descargas/elitriip.asp



[b] ELISTARA: [/b]

http://www.zonavirus.com/descargas/elistara.asp



Tras probarlo, reiniciar y postearnos el contenido de C:\infosat.txt para ver el resultado del proceso



saludos



ms, 10-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 11 Dic 2007, 01:52

Ahí está amigos, pero el archivo que eliminó no soluciono el problema me urge lo del internet ya que para postear esto estoy en un ciber cafe espero que me puedan ayudar de antemano grasias





Mon Dec 10 18:45:09 2007

EliStartPage v15.22 (c)2007 S.G.H. / Satinfo S.L.

--------------------------------------------------

Lista de Acciones (por Acción Directa):

Eliminadas las Paginas de Inicio y de Busqueda del IE

Eliminados Ficheros Temporales del IE



Mon Dec 10 18:45:18 2007

EliTriIP v4.17 (c)2007 S.G.H. / Satinfo S.L.

---------------------------------------------

Lista de Acciones (por Acción Directa):



Mon Dec 10 18:45:19 2007

EliTriIP v4.17 (c)2007 S.G.H. / Satinfo S.L.

---------------------------------------------

Lista de Acciones (por Exploración):

Explorando Unidad C:\



Mon Dec 10 18:45:21 2007

EliStartPage v15.22 (c)2007 S.G.H. / Satinfo S.L.

--------------------------------------------------

Lista de Acciones (por Exploración):

Explorando Unidad C:\

C:\Archivos de programa\Macromedia\Dreamweaver 8\Configuration\JSExtensions\SSITranslator.dll --> Eliminado, BackDoor.CMQ (dropper)



Nº Total de Directorios: 6868

Nº Total de Ficheros: 94701

Nº de Ficheros Analizados: 19020

Nº de Ficheros Infectados: 1

Nº de Ficheros Limpiados: 1



Mon Dec 10 18:58:09 2007

EliStartPage v15.22 (c)2007 S.G.H. / Satinfo S.L.

--------------------------------------------------

Lista de Acciones (por Acción Directa):

Eliminadas las Paginas de Inicio y de Busqueda del IE

Eliminados Ficheros Temporales del IE



Mon Dec 10 18:58:11 2007

EliStartPage v15.22 (c)2007 S.G.H. / Satinfo S.L.

--------------------------------------------------

Lista de Acciones (por Exploración):

Explorando Unidad C:\



Nº Total de Directorios: 6869

Nº Total de Ficheros: 94701

Nº de Ficheros Analizados: 21153

Nº de Ficheros Infectados: 0

Nº de Ficheros Limpiados: 0

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 11 Dic 2007, 05:07

Pues tras detectar y eliminar este backdoor CMQ, reinicie y diganos si persiste alguna anomalia o ya se han solucionado.



saludos



ms, 11-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 11 Dic 2007, 17:00

lamentablemente todavia pesiste el problema con el ares y el IE ya no se ni que hacer en verdad agradesco toda su ayuda pero en verdad quisiera que me ayudaran d verdad :cry:





saludos

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 11 Dic 2007, 18:00

Pues pruebe estos AV ONLINE:



[url=https://www.eset.es/analisis-online/][b][color=Darknesred]AV ONLINE aconsejado[/color][/b][/url]



y una manera facil y rapida de saber si se tiene virus en memoria es lanzar este escaneo ONLINE que tarda menos de 1 minuto:



[url=https://www.pandasecurity.com/spain/homeusers/solutions/online-antivirus/][b][color=Darknesred]testeo ONLINE de virus en memoria[/color][/b][/url]





Pero el uso de programas tipo P2P, conlleva además descarga de troyanos que luego le van a incordiar, eso debe saberlo !





Cuentenos el resultado, gracias



saludos



ms, 11-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 12 Dic 2007, 22:56

:( no me detecto nada ninguno de los dos en verdad quisiera saber la causa xq esto de ir a ciber me esta acabando mi dinero creen que haya solucion?

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 13 Dic 2007, 05:57

Sí, pero empieza por desinstalar el Ares y demas P2P, que sino de nada va a servir !



Tras ello prueba esta herramienta antiRootKit de McAfee y posteanos el log resultante:





ROOTKITDETECTIVE (ACCESO AL LINK DE DESCARGA)

http://download.nai.com/products/mcafee-avert/McafeeRootkitDetective.zip





Pensamos que pueda haber un RootKit que oculte claves, procesos y ficheros de este mañware que le incordia. A ver si lo identificamos con lo indicado



saludos



ms, 13-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 13 Dic 2007, 20:39

no se usar este programa muy bn pero aqui esta el long que dejo





McAfee(R) Rootkit Detective 1.1 scan report

On 13-12-2007 at 14:27:24

OS-Version 5.1.2600

Service Pack 2.0

====================================



Object-Type: SSDT-hook

Object-Name: ZwAcceptConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheck

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByType

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultList

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultListAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultListAndAuditAlarmByHandle

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAddAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAddBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAdjustGroupsToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAdjustPrivilegesToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAlertResumeThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAlertThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateLocallyUniqueId

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateUuids

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAreMappedFilesTheSame

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAssignProcessToJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCallbackReturn

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelDeviceWakeupRequest

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelIoFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwClearEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwClose

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCloseObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompactKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompareTokens

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompleteConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompressKey

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwContinue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateDebugObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateJobSet

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateMailslotFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateNamedPipeFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreatePagingFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreatePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateProcess

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateProcessEx

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateSection

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateSemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateSymbolicLinkObject

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateThread

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateWaitablePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDebugActiveProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDebugContinue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDelayExecution

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDeleteObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDeviceIoControlFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDisplayString

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDuplicateObject

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDuplicateToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateBootEntries

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwEnumerateSystemEnvironmentValuesEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwExtendSection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFilterToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFindAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushBuffersFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushInstructionCache

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwFlushVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushWriteBuffer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFreeUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFreeVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFsControlFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetContextThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetDevicePowerState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetPlugPlayEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetWriteWatch

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateAnonymousToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateClientOfPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwInitializeRegistry

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwInitiatePowerAction

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwIsProcessInJob

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwIsSystemResumeAutomatic

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwListenPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLoadDriver

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLoadKey2

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLoadKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLockFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockProductActivationKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockRegistryKey

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMakePermanentObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMakeTemporaryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapUserPhysicalPagesScatter

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapViewOfSection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwModifyBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeDirectoryFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeMultipleKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenFile

Object-Path: C:\WINDOWS\system32\drivers\kl1.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenProcess

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenProcessToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenProcessTokenEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenSection

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenSemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenSymbolicLinkObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThreadToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThreadTokenEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPlugPlayControl

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPowerInformation

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegeCheck

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegeObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegedServiceAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwProtectVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPulseEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryAttributesFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryBootEntryOrder

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryBootOptions

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDebugFilterState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDefaultLocale

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDefaultUILanguage

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDirectoryFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryEaFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryFullAttributesFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInstallUILanguage

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryIntervalProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwQueryMultipleValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwQueryMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryOpenSubKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryPerformanceCounter

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryQuotaInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySecurityObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySymbolicLinkObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySystemEnvironmentValue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySystemEnvironmentValueEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQuerySystemInformation

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwQuerySystemTime

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryTimerResolution

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwQueryVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryVolumeInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueueApcThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRaiseException

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRaiseHardError

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReadFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReadFileScatter

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReadRequestData

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReadVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRegisterThreadTerminatePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReleaseMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReleaseSemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRemoveIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRemoveProcessDebug

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRenameKey

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReplaceKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwReplyPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReplyWaitReceivePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReplyWaitReceivePortEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReplyWaitReplyPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRequestDeviceWakeup

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRequestPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRequestWaitReplyPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRequestWakeupLatency

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwResetEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwResetWriteWatch

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwRestoreKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwResumeProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwResumeThread

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSaveKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSaveKeyEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSaveMergedKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSecureConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetBootEntryOrder

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetBootOptions

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetContextThread

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSetDebugFilterState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetDefaultHardErrorPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetDefaultLocale

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetDefaultUILanguage

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetEaFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetEventBoostPriority

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetHighEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetHighWaitLowEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationDebugObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationFile

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSetInformationJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSetInformationObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetInformationToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetIntervalProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetLdtEntries

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetLowEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetLowWaitHighEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetQuotaInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetSecurityObject

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSetSystemEnvironmentValue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetSystemEnvironmentValueEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetSystemInformation

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetSystemPowerState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetSystemTime

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetThreadExecutionState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetTimerResolution

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetUuidSeed

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSetValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSetVolumeInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwShutdownSystem

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSignalAndWaitForSingleObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwStartProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwStopProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSuspendProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwSuspendThread

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwSystemDebugControl

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwTerminateJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwTerminateProcess

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwTerminateThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwTestAlert

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwTraceEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwTranslateFilePath

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwUnloadDriver

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwUnloadKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwUnloadKeyEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwUnlockFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwUnlockVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwUnmapViewOfSection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwVdmControl

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitForDebugEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitForMultipleObjects

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitForSingleObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitHighEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitLowEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWriteFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWriteFileGather

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWriteRequestData

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWriteVirtualMemory

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwYieldExecution

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateKeyedEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenKeyedEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwReleaseKeyedEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwWaitForKeyedEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryPortInformationProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: (NULL)

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_SYSTEM_CONTROL

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_POWER

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_CLEANUP

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_SHUTDOWN

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_INTERNAL_DEVICE_CONTROL

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_DEVICE_CONTROL

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_FLUSH_BUFFERS

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_WRITE

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_READ

Object-Path:



Object-Type: IRP-hook

Object-Name: \Driver\Ftdisk->IRP_MJ_CREATE

Object-Path:



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 19659239224E364682FA4BAF72C53EA4td\Cfg

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 00000001ontrolSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 0Jf40M\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Unable to access registry key



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Hidden



Object-Type: Registry-value

Object-Name: a0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: p0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: h0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: s1

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: s2

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: g0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: h0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-key

Object-Name: 19659239224E364682FA4BAF72C53EA4td\Cfg

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-key

Object-Name: 00000001ontrolSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-key

Object-Name: 0Jf40M\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 19659239224E364682FA4BAF72C53EA4td\Cfg

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 00000001ontrolSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Unable to access registry key



Object-Type: Registry-key

Object-Name: 0Jf40M\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Hidden



Object-Type: Registry-value

Object-Name: (Default)

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Unable to access registry key



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40

Status: Hidden



Object-Type: Registry-value

Object-Name: a0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001

Status: Hidden



Object-Type: Registry-value

Object-Name: p0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: h0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: khjeh

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4

Status: Hidden



Object-Type: Registry-value

Object-Name: s1

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: s2

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: g0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-value

Object-Name: h0

Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg

Status: Hidden



Object-Type: Registry-key

Object-Name: DataEM\ControlSet001\Services\sptd\Cfg

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data

Status: Hidden



Object-Type: Registry-key

Object-Name: a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771 System Provider\*Local Machine*\Data

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771

Status: Hidden



Object-Type: Registry-key

Object-Name: 00000000-0000-0000-0000-000000000000 System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771\00000000-0000-0000-0000-000000000000

Status: Hidden



Object-Type: Registry-key

Object-Name: {6340E680-FF06-435f-8767-B79D88AEBD4D}ystem Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771\00000000-0000-0000-0000-000000000000

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771\00000000-0000-0000-0000-000000000000\{6340E680-FF06-435f-8767-B79D88AEBD4D}

Status: Hidden



Object-Type: Registry-value

Object-Name: Item Data

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771\00000000-0000-0000-0000-000000000000\{6340E680-FF06-435f-8767-B79D88AEBD4D}

Status: Hidden



Object-Type: Registry-value

Object-Name: Display String

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771\00000000-0000-0000-0000-000000000000

Status: Hidden



Object-Type: Registry-value

Object-Name: Display String

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771

Status: Hidden



Object-Type: Registry-key

Object-Name: edec4b50-3a44-4ded-86dd-85a4e65c20ea System Provider\*Local Machine*\Data\a5c5c2e4-6bee-4ef9-a0f5-f76a07cce771

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea

Status: Hidden



Object-Type: Registry-key

Object-Name: 0f88886d-d7b0-4839-9f39-5c335ef07898 System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea\0f88886d-d7b0-4839-9f39-5c335ef07898

Status: Hidden



Object-Type: Registry-key

Object-Name: MachineKeyicrosoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea\0f88886d-d7b0-4839-9f39-5c335ef07898

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea\0f88886d-d7b0-4839-9f39-5c335ef07898\MachineKey

Status: Hidden



Object-Type: Registry-value

Object-Name: Item Data

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea\0f88886d-d7b0-4839-9f39-5c335ef07898\MachineKey

Status: Hidden



Object-Type: Registry-value

Object-Name: Display String

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea\0f88886d-d7b0-4839-9f39-5c335ef07898

Status: Hidden



Object-Type: Registry-value

Object-Name: Display String

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea

Status: Hidden



Object-Type: Registry-key

Object-Name: Data 2RE\Microsoft\Protected Storage System Provider\*Local Machine*\Data\edec4b50-3a44-4ded-86dd-85a4e65c20ea

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data 2

Status: Hidden



Object-Type: Registry-key

Object-Name: WindowsE\Microsoft\Protected Storage System Provider\*Local Machine*\Data 2

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data 2\Windows

Status: Hidden



Object-Type: Registry-value

Object-Name: Value

Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Protected Storage System Provider\*Local Machine*\Data 2\Windows

Status: Hidden



Object-Type: Process

Object-Name: smss.exe

Pid: 836

Object-Path: C:\WINDOWS\System32\smss.exe

Status: Visible



Object-Type: Process

Object-Name: System Idle Process

Pid: 0

Object-Path:

Status: Visible



Object-Type: Process

Object-Name: Ares.exe

Pid: 744

Object-Path: C:\Archivos de programa\Ares\Ares.exe

Status: Visible



Object-Type: Process

Object-Name: ctfmon.exe

Pid: 868

Object-Path: C:\WINDOWS\system32\ctfmon.exe

Status: Visible



Object-Type: Process

Object-Name: svchost.exe

Pid: 1272

Object-Path: C:\WINDOWS\System32\svchost.exe

Status: Visible



Object-Type: Process

Object-Name: svchost.exe

Pid: 1396

Object-Path: C:\WINDOWS\system32\svchost.exe

Status: Visible



Object-Type: Process

Object-Name: DUC20.exe

Pid: 1180

Object-Path: C:\Archivos de programa\No-IP\DUC20.exe

Status: Visible



Object-Type: Process

Object-Name: services.exe

Pid: 964

Object-Path: C:\WINDOWS\system32\services.exe

Status: Visible



Object-Type: Process

Object-Name: hkcmd.exe

Pid: 716

Object-Path: C:\WINDOWS\system32\hkcmd.exe

Status: Visible



Object-Type: Process

Object-Name: System

Pid: 4

Object-Path:

Status: Visible



Object-Type: Process

Object-Name: explorer.exe

Pid: 1740

Object-Path: C:\WINDOWS\Explorer.EXE

Status: Visible



Object-Type: Process

Object-Name: svchost.exe

Pid: 1152

Object-Path: C:\WINDOWS\system32\svchost.exe

Status: Visible



Object-Type: Process

Object-Name: spoolsv.exe

Pid: 1896

Object-Path: C:\WINDOWS\system32\spoolsv.exe

Status: Visible



Object-Type: Process

Object-Name: Crypserv.exe

Pid: 2020

Object-Path: C:\WINDOWS\system32\crypserv.exe

Status: Visible



Object-Type: Process

Object-Name: RTHDCPL.exe

Pid: 688

Object-Path: C:\WINDOWS\RTHDCPL.EXE

Status: Visible



Object-Type: Process

Object-Name: svchost.exe

Pid: 1372

Object-Path: C:\WINDOWS\system32\svchost.exe

Status: Visible



Object-Type: Process

Object-Name: sqlwriter.exe

Pid: 412

Object-Path: c:\Archivos de programa\Microsoft SQL Server\90\Shared\sqlwriter.exe

Status: Visible



Object-Type: Process

Object-Name: avp.exe

Pid: 724

Object-Path: C:\Archivos de programa\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe

Status: Visible



Object-Type: Process

Object-Name: alg.exe

Pid: 3204

Object-Path: C:\WINDOWS\System32\alg.exe

Status: Visible



Object-Type: Process

Object-Name: igfxpers.exe

Pid: 696

Object-Path: C:\WINDOWS\system32\igfxpers.exe

Status: Visible



Object-Type: Process

Object-Name: msnmsgr.exe

Pid: 3424

Object-Path: C:\Archivos de programa\MSN Messenger\msnmsgr.exe

Status: Visible



Object-Type: Process

Object-Name: lsass.exe

Pid: 976

Object-Path: C:\WINDOWS\system32\lsass.exe

Status: Visible



Object-Type: Process

Object-Name: GoogleToolbarNo

Pid: 824

Object-Path: C:\Archivos de programa\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

Status: Visible



Object-Type: Process

Object-Name: usnsvc.exe

Pid: 1444

Object-Path: C:\Archivos de programa\MSN Messenger\usnsvc.exe

Status: Visible



Object-Type: Process

Object-Name: svchost.exe

Pid: 1228

Object-Path: C:\WINDOWS\system32\svchost.exe

Status: Visible



Object-Type: Process

Object-Name: avp.exe

Pid: 2004

Object-Path: C:\Archivos de programa\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe

Status: Visible



Object-Type: Process

Object-Name: winlogon.exe

Pid: 920

Object-Path: C:\WINDOWS\system32\winlogon.exe

Status: Visible



Object-Type: Process

Object-Name: wcescomm.exe

Pid: 860

Object-Path: C:\Archivos de programa\Microsoft ActiveSync\wcescomm.exe

Status: Visible



Object-Type: Process

Object-Name: sqlservr.exe

Pid: 272

Object-Path: c:\Archivos de programa\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe

Status: Visible



Object-Type: Process

Object-Name: sqlbrowser.exe

Pid: 396

Object-Path: c:\Archivos de programa\Microsoft SQL Server\90\Shared\sqlbrowser.exe

Status: Visible



Object-Type: Process

Object-Name: igfxsrvc.exe

Pid: 768

Object-Path: C:\WINDOWS\system32\igfxsrvc.exe

Status: Visible



Object-Type: Process

Object-Name: rapimgr.exe

Pid: 1328

Object-Path: C:\ARCHIV~1\MI3AA1~1\rapimgr.exe

Status: Visible



Object-Type: Process

Object-Name: csrss.exe

Pid: 896

Object-Path: C:\WINDOWS\system32\csrss.exe

Status: Visible



Object-Type: Process

Object-Name: aawservice.exe

Pid: 1516

Object-Path: C:\Archivos de programa\Lavasoft\Ad-Aware 2007\aawservice.exe

Status: Visible



Object-Type: Process

Object-Name: Rootkit_Detecti

Pid: 4616

Object-Path: C:\Documents and Settings\Administrador\Escritorio\McafeeRootkitDetective\Rootkit_Detective.exe

Status: Visible



Object-Type: Process

Object-Name: dragdiag.exe

Pid: 680

Object-Path: C:\Archivos de programa\Thomson\SpeedTouch USB\Dragdiag.exe

Status: Visible



Scan complete. Hidden registry keys/values: 45

McAfee(R) Rootkit Detective 1.1 scan report

On 13-12-2007 at 14:37:22

OS-Version 5.1.2600

Service Pack 2.0

====================================



Object-Type: SSDT-hook

Object-Name: ZwAcceptConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheck

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByType

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultList

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultListAndAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAccessCheckByTypeResultListAndAuditAlarmByHandle

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAddAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAddBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAdjustGroupsToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAdjustPrivilegesToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAlertResumeThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAlertThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateLocallyUniqueId

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateUuids

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAllocateVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAreMappedFilesTheSame

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwAssignProcessToJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCallbackReturn

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelDeviceWakeupRequest

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelIoFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCancelTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwClearEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwClose

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCloseObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompactKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompareTokens

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompleteConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCompressKey

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwConnectPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwContinue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateDebugObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateJobSet

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateMailslotFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateNamedPipeFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreatePagingFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreatePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateProcess

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateProcessEx

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateProfile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateSection

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateSemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateSymbolicLinkObject

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateThread

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwCreateTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwCreateWaitablePort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDebugActiveProcess

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDebugContinue

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDelayExecution

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDeleteObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDeleteValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDeviceIoControlFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDisplayString

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwDuplicateObject

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwDuplicateToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateBootEntries

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwEnumerateSystemEnvironmentValuesEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwEnumerateValueKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwExtendSection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFilterToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFindAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushBuffersFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushInstructionCache

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwFlushVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFlushWriteBuffer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFreeUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFreeVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwFsControlFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetContextThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetDevicePowerState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetPlugPlayEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwGetWriteWatch

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateAnonymousToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateClientOfPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwImpersonateThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwInitializeRegistry

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwInitiatePowerAction

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwIsProcessInJob

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwIsSystemResumeAutomatic

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwListenPort

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLoadDriver

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLoadKey2

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLoadKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwLockFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockProductActivationKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockRegistryKey

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwLockVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMakePermanentObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMakeTemporaryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapUserPhysicalPages

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapUserPhysicalPagesScatter

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwMapViewOfSection

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwModifyBootEntry

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeDirectoryFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwNotifyChangeMultipleKeys

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenEventPair

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenFile

Object-Path: C:\WINDOWS\system32\drivers\kl1.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenIoCompletion

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenJobObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenKey

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenMutant

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenProcess

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenProcessToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenProcessTokenEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenSection

Object-Path: C:\WINDOWS\system32\drivers\klif.sys



Object-Type: SSDT-hook

Object-Name: ZwOpenSemaphore

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenSymbolicLinkObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThread

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThreadToken

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenThreadTokenEx

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwOpenTimer

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPlugPlayControl

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPowerInformation

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegeCheck

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegeObjectAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPrivilegedServiceAuditAlarm

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwProtectVirtualMemory

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwPulseEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryAttributesFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryBootEntryOrder

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryBootOptions

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDebugFilterState

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDefaultLocale

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDefaultUILanguage

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDirectoryFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryDirectoryObject

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryEaFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryEvent

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryFullAttributesFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationAtom

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-hook

Object-Name: ZwQueryInformationFile

Object-Path: C:\WINDOWS\system32\TUKernel.exe



Object-Type: SSDT-

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 14 Dic 2007, 07:22

Pues empezaremos con estos:



C:\WINDOWS\system32\TUKernel.exe



C:\WINDOWS\system32\drivers\klif.sys



C:\WINDOWS\system32\drivers\kl1.sys



C:\Archivos de programa\No-IP\DUC20.exe



envianoslos para analizar, gracias



->[b] Para ello recordar[/b]: https://foros.zonavirus.com/viewtopic.php?f=2&t=45334



Por cierto, parece que no has desinstalado el ARES...



saludos



ms, 14-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 14 Dic 2007, 17:50

hay dos archivos que no se encuentran es el de los drivers y reinicie en modo seguro y nada el ares lo desintale despues de pasar el mcafee antirootktit los otros comentarion son que la aplicacion DUC20.exe es de no-ip ya que esta misma la intale por un proyecto del colegio el cual trataba de un FTP remoto el cual fue el bimestre antepasado y se me olvido desintalarlo pero los hostin que habia registrado ya se vencieron hace ya bastante tiempo casi apenas termino el proyecto el TuKernel.exe en verdad no se que es lo busque en google unos dicen que es un rootktit otras que es un archivo del sistema en fin no se que es bueno y y el ares no lo uso para descargar lo uso para hacer canales de envio ya q por msn es una eternidad enviando y bueno de vez en cuando descargo musica d hay no mas



bueno por ultimo agregue otro log para ver que dice usted que es el experto



bueno muchas gracias y espero que me ayuden :P

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 14 Dic 2007, 20:01

Pues envianos los ficheros que puedas de los indicados, y veremos lo que son.



Especialmente este Tukernel.exe es muy sospechoso, y no ha de tener nada que ver con el Kernel que si que es del sistema.



Mira si lo encuentras con un Inicio -> Buscar y cuando lo tengamos obraremos en consecuencia



Arranca en modo seguro, para encontrarlo, que si no igual se esconde y no lo encuentras



saludos



ms, 14-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 14 Dic 2007, 21:30

si ya les envie ese tukernel.exe y los otros archivos pero el que no encontre fue el de los drivers entre por Dos a buscar el archivo de los driver y nada lo primero que ise fue irne a inico/ejecutar y nada despues en buscar nada despues irme manualmente nada y por ultimo por Dos y nada pero el Tukernel.exe si lo encontre a la primera ya se los envie :lol:

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 14 Dic 2007, 21:32

Pues subelo al VirusTotal a ver si alguno de los 32 lo identifica, como espero...



https://www.virustotal.com/es/



y nos posteas el resultado, gracias



saludos



ms, 14-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 15 Dic 2007, 01:10

no detecto nadaaa waaahaaa a lo mejor estoy estrenando un nuevo virus y no sabes ni que diablo ess ya estoy medio tarumadoo x el tema del IE q ni entraa y el msn como a los 10 minutos de intentos es q inicia secion bueno ojala me ayuden a resolverlo grasiasss por su atencioo a sido exelente :lol:



bueno ojala si es lo que digo encuentre la cura rapido ya que es algo bn frustante





Motor antivirus Versión Última actualización Resultado

AhnLab-V3 2007.12.15.10 2007.12.14 -

AntiVir 7.6.0.45 2007.12.14 -

Authentium 4.93.8 2007.12.14 -

Avast 4.7.1098.0 2007.12.14 -

AVG 7.5.0.503 2007.12.14 -

BitDefender 7.2 2007.12.15 -

CAT-QuickHeal 9.00 2007.12.14 -

ClamAV 0.91.2 2007.12.14 -

DrWeb 4.44.0.09170 2007.12.14 -

eSafe 7.0.15.0 2007.12.13 -

eTrust-Vet 31.3.5375 2007.12.14 -

Ewido 4.0 2007.12.14 -

FileAdvisor 1 2007.12.15 -

Fortinet 3.14.0.0 2007.12.14 -

F-Prot 4.4.2.54 2007.12.14 -

F-Secure 6.70.13030.0 2007.12.14 -

Ikarus T3.1.1.15 2007.12.14 -

Kaspersky 7.0.0.125 2007.12.14 -

McAfee 5186 2007.12.14 -

Microsoft 1.3109 2007.12.14 -

NOD32v2 2723 2007.12.14 -

Norman 5.80.02 2007.12.13 -

Panda 9.0.0.4 2007.12.14 -

Prevx1 V2 2007.12.15 -

Rising 20.22.41.00 2007.12.14 -

Sophos 4.24.0 2007.12.14 -

Sunbelt 2.2.907.0 2007.12.15 -

Symantec 10 2007.12.14 -

TheHacker 6.2.9.160 2007.12.14 -

VBA32 3.12.2.5 2007.12.14 -

VirusBuster 4.3.26:9 2007.12.14 -

Webwasher-Gateway 6.0.1 2007.12.14 -

Información adicional

Tamano archivo: 2279936 bytes

MD5: 7a01420a66dd2a9a846353db567ac7ad

SHA1: 9fb11a08ec834cbceff4c96cc86db43eb0958f31

PEiD: -

:cry: :cry:

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 15 Dic 2007, 12:06

Pues prueba de aceder al msn y a internet arrancando en modo segur0 pero con funciones de Red, y asi evitar cargar el virus en memoria.



En tal modo prueba este AVOLINE y cuentanos el resultado, pues no es probable que sea este que nadie detecta (aunque no imporsible)



[url=https://www.eset.es/analisis-online/][b][color=Darknesred]AV ONLINE aconsejado[/color][/b][/url]



y nos comentas el resultado, gracias

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 19 Dic 2007, 01:09

:( pos no no encontro nada pero ni siquiera cookies malintencioanda



ps:el internet paresia internet cuando aranque con funcionalidad de red bueno espero q se pueda solucionar probe eliminando el fichero pero al reiniciar de nuevo estaba :cry:

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 19 Dic 2007, 04:07

Las cookies es lo de menos, las puedes eliminar desde el I.E.->Herramientas->opciones de Internet o con el ELITEMPO:



ELITEMPO

http://www.zonavirus.com/datos/descargas/70/EliTempo.asp



o incluso con el ELISTARA si se acepta ELIMINAR TEMPORALES , pero lo importante es que el antivirus ya no detecte nada. Confirmanos este punto, para dar por solucionado el Tema en tal caso.



saludos



ms, 19-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 20 Dic 2007, 21:48

:cry: no me explique bn es que cuando aranque en modo seguro con funcionalidades de red si ando bn pero cuando encendi la pc de nuevo estaba el archivo y el mismo problema



la utilidad que me dio elimino las cookies pero siguio igual



PD: disculpen la demora es que no tenia dinero para ir al ciber :lol:

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 21 Dic 2007, 05:41

Pues no te gastes dinero en el cyber, arrancando en modo seguro con funciones de red puedes navegar ...



Y respecto a este fichero que dices persiste, ahora no sé si es el TUKERNEL o uno de los otros que te pedía.



Lanza de nuevo el HJT y posteanos el log actual, para saber donde estamos.



saludos



ms, 21-12-2007

kaliro
Mensajes: 29
Registrado: 02 Jul 2007, 12:39

Mensaje por kaliro » 21 Dic 2007, 16:14

eh intalado el Eset Smart Security con una oferta de mi pais de esetme ah resultado bueno pero no ah solucionado los problemas del internet lento el firefox sirve pero esta tambien lento pero un poco menos que el IE ejecute una herramienta que usted da en una solucion de tema sobre un archivo Host solo desia 127.0.0.0 local host me imagino q debe estar bien cre o yo :) bueno aqui esta mi long



Logfile of HijackThis v1.99.1

Scan saved at 10:09:09 a.m., on 12/21/2007

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16574)



Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Archivos de programa\Lavasoft\Ad-Aware 2007\aawservice.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\Archivos de programa\Thomson\SpeedTouch USB\Dragdiag.exe

C:\WINDOWS\RTHDCPL.EXE

C:\WINDOWS\system32\igfxpers.exe

C:\WINDOWS\system32\hkcmd.exe

C:\Archivos de programa\ESET\ESET Smart Security\egui.exe

C:\WINDOWS\system32\igfxsrvc.exe

C:\Archivos de programa\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Archivos de programa\Microsoft ActiveSync\wcescomm.exe

C:\Archivos de programa\Messenger\MSMSGS.EXE

C:\ARCHIV~1\MI3AA1~1\rapimgr.exe

C:\WINDOWS\system32\crypserv.exe

C:\Archivos de programa\ESET\ESET Smart Security\ekrn.exe

c:\Archivos de programa\Microsoft SQL Server\90\Shared\sqlwriter.exe

C:\Archivos de programa\MSN Messenger\msnmsgr.exe

C:\Archivos de programa\MSN Messenger\usnsvc.exe

C:\ARCHIV~1\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Administrador\Escritorio\SProces.exe

C:\Documents and Settings\Administrador\Mis documentos\HijackThis.exe



R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

O2 - BHO: Aplicación auxiliar de vínculos de Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Archivos de programa\Archivos comunes\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Archivos de programa\Archivos comunes\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\archivos de programa\google\googletoolbar1.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Archivos de programa\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\archivos de programa\google\googletoolbar1.dll

O4 - HKLM\..\Run: [SpeedTouch USB Diagnostics] "C:\Archivos de programa\Thomson\SpeedTouch USB\Dragdiag.exe" /icon

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE

O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe

O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe

O4 - HKLM\..\Run: [egui] "C:\Archivos de programa\ESET\ESET Smart Security\egui.exe" /hide /waitservice

O4 - HKLM\..\Run: [NodLogin] C:\Archivos de programa\ESET\ESET Smart Security\nodlogin.exe

O4 - HKCU\..\Run: [ares] "C:\Archivos de programa\Ares\Ares.exe" -h

O4 - HKCU\..\Run: [swg] C:\Archivos de programa\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Archivos de programa\MSN Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Archivos de programa\Microsoft ActiveSync\wcescomm.exe"

O4 - HKCU\..\Run: [MSMSGS] "C:\Archivos de programa\Messenger\MSMSGS.EXE" /background

O8 - Extra context menu item: E&xportar a Microsoft Excel - res://C:\ARCHIV~1\MICROS~1\Office12\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Consola de Sun Java - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Archivos de programa\Java\jre1.6.0_02\bin\ssv.dll

O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\ARCHIV~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: Referencia - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\ARCHIV~1\MICROS~1\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\ARCHIV~1\SPYBOT~1\SDHelper.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Archivos de programa\Messenger\MSMSGS.EXE

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Archivos de programa\Messenger\MSMSGS.EXE

O11 - Options group: [INTERNATIONAL] International*

O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} - http://www.eset.eu/buxus/docs/OnlineScanner.cab

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1194029476390

O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab

O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/ve/securityadvisor/virusinfo/webscan.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{3180E1A2-3C22-4E0C-93F1-6232E0C2B75B}: NameServer = 201.225.225.225 201.224.73.162

O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\ARCHIV~1\MSNMES~1\MSGRAP~1.DLL

O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Archivos de programa\Archivos comunes\Microsoft Shared\Help\hxds.dll

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\ARCHIV~1\MSNMES~1\MSGRAP~1.DLL

O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll

O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll

O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\Archivos de programa\Lavasoft\Ad-Aware 2007\aawservice.exe

O23 - Service: Adobe LM Service - Adobe Systems - C:\Archivos de programa\Archivos comunes\Adobe Systems Shared\Service\Adobelmsvc.exe

O23 - Service: Crypkey License - Kenonic Controls Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe

O23 - Service: Eset HTTP Server (EhttpSrv) - Unknown owner - C:\Archivos de programa\ESET\ESET Smart Security\EHttpSrv.exe

O23 - Service: Eset Service (ekrn) - ESET - C:\Archivos de programa\ESET\ESET Smart Security\ekrn.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Archivos de programa\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Archivos de programa\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)

O23 - Service: ServiceLayer - Nokia. - C:\Archivos de programa\PC Connectivity Solution\ServiceLayer.exe



bueno si no se puede creo q voy a formatiar la maquina pero sera despues porque voy a celebrar navidad bueno chao y buena suerte si no los veo Feliz Navidad

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 21 Dic 2007, 19:11

el log del HJT está limpio...



Prueba el SPROCES y veamos si tienes algo mas oculto.



(posteanos luego el SPROCLOG.TXT, claro)



saludps



ms, 21-12-2007

Responder

Volver a “Foro Virus - Cuentanos tu problema”