
Win32:Trojan-gen and Win32:Rootkit-gen malwares
#1
Posted 28 June 2010 - 10:45 AM
Register to Remove
#2
Posted 29 June 2010 - 08:23 AM

Identity Theft
It looks like you have been infected by a few Backdoor Trojans.
This allows hackers to remotely control your computer, steal critical system information and Download and Execute files
Its very possible that anything could have been installed on your computer by the remote attacker, including opening other backdoors and installing rootkits. While we can attempt to clean what we see in your logs, we cannot guarantee that your computer will be completely in the clear since we have no way of knowing that has been done to the computer. Your computer could be completely compromised at this moment. It may be prudent to backup your information, reformat, and reinstall.
More information on Remote Access Trojans can be found here.
I suggest you do the following immediately:
- Call all of your banks, credit card companies, financial institutions and inform them that you may be a victim of identity theft and to put a watch on your accounts or change all your account numbers.
- From a clean computer, change *all* your online passwords -- for email, for banks, financial accounts, PayPal, eBay, online companies, any online forums or groups you belong to.
- DO NOT change passwords or do any transactions while using the infected computer because the attacker will get the new passwords and transaction information.
If, however, you decide that the computer is not used for any sensitive work, or if you do not wish to reformat at this time, I can help you clean your computer to the best of my abilities. I must remind you that i cannot guarantee that your computer will be completely clean afterwards since we have no way of knowing what has been done to it.
To help you make your decision, here are a few related articles that i suggest you read:
- Danger: Remote Access Trojans.
- When should I re-format? How should I reinstall?
- How Do I Handle Possible Identify Theft, Internet Fraud and Credit Card Fraud?
Should you have any questions, please feel free to ask.
Please let me know what you decide to do in your next post.
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
#3
Posted 29 June 2010 - 10:50 AM
#4
Posted 29 June 2010 - 04:07 PM
You will need to turn off the AV, but not your Firewall. It's only temporary and won't be for long, do don''t worry.Hope I do not need to turn off the antivirus and firewall as I worry that I may be still under attack
We will begin with ComboFix.exe. Please visit this webpage for download links, and instructions for running the tool:
http://www.bleepingc...to-use-combofix
* Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
Please include the C:\ComboFix.txt in your next reply for further review.
Edited by IndiGenus, 29 June 2010 - 04:09 PM.
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
#5
Posted 01 July 2010 - 12:45 PM
#6
Posted 01 July 2010 - 12:55 PM
Make sure to check your Junk or Spam folders if you have filters on.ps. I did not get an email advising I had a reply on your site, I went and looked today as I thought it was taking a while to hear and there was your reply (still no email at time of posting).
Also make sure you have email notification on in the forum Control Panel.
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
#7
Posted 01 July 2010 - 02:06 PM
#8
Posted 01 July 2010 - 03:01 PM
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
#9
Posted 02 July 2010 - 06:57 AM
#10
Posted 02 July 2010 - 08:22 AM
It has been reported that there are issues with the version at bleepingcomputer. Please delete the copy you have and download a copy from the link below.
http://www.forospywa...Bs/ComboFix.exe
Edited by IndiGenus, 02 July 2010 - 08:48 AM.
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
Register to Remove
#11
Posted 02 July 2010 - 09:47 AM
#12
Posted 02 July 2010 - 10:48 AM
#13
Posted 02 July 2010 - 10:52 AM
Just simply right click on it and select delete. Or drag it to the recycling bin. We'll uninstall it when were done. Yes, I'd like to run the new version.Can you tell me how to delete it, as I said in my last message I have tried to uninstall and it would not work ?
bar457
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
#14
Posted 02 July 2010 - 02:17 PM
ComboFix 10-07-01.02 - Administrator 02/07/2010 19:50:59.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.248 [GMT 1:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix1.exe
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\Administrator\Application Data\Ebopaw\koso.exe
c:\documents and settings\Administrator\Application Data\Yxfehe
c:\documents and settings\Administrator\Application Data\Yxfehe\xylyd.exe
.
---- Previous Run -------
.
c:\docume~1\ADMINI~1\LOCALS~1\Temp\d1e7f579-db2f-424e-8a42-749f6b4bf62c\wrk21.tmp_42
c:\documents and settings\Administrator\Application Data\93b7f60d-dd2e-47c5-887e-49ff2bfa6857_42.avi
c:\documents and settings\Administrator\Application Data\Ebopaw\koso.exe
c:\documents and settings\Administrator\Application Data\Obutq\ekma.exe
c:\documents and settings\Administrator\g2mdlhlpx.exe
c:\documents and settings\Administrator\Local Settings\Temp\d1e7f579-db2f-424e-8a42-749f6b4bf62c\wrk21.tmp_42
c:\program files\Internet Explorer\config.dat
c:\program files\YouTube Downloader Toolbar\IE\1.0\yoUTubedownloadertoolbarie.dll
c:\program files\YouTube Downloader Toolbar\SeARchsettings.dll
c:\windows\system32\1028p.exe
c:\windows\system32\3657029765.dat
c:\windows\system32\lowsec\local.ds
c:\windows\system32\lowsec\user.ds
c:\windows\system32\lowsec\user.ds.lll
c:\windows\system32\sdra64.exe
c:\windows\xpsp1hfm.log
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_PASSWORD
-------\Legacy_PLUGPLAYRASAUTO
-------\Service_PlugPlayRasAuto
((((((((((((((((((((((((( Files Created from 2010-06-02 to 2010-07-02 )))))))))))))))))))))))))))))))
.
2010-06-24 10:40 . 2010-07-01 14:08 4625422 --sha-w- c:\windows\system32\alrsvcy.sys
2010-06-15 16:11 . 2010-06-15 15:43 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-06-15 15:43 . 2010-06-15 15:42 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-06-15 15:37 . 2010-06-24 11:14 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-06-15 15:37 . 2010-02-04 15:53 2954656 -c--a-w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
2010-06-15 15:36 . 2010-06-15 15:38 -------- d-----w- c:\program files\Lavasoft
2010-06-10 09:12 . 2010-05-06 10:41 743424 ------w- c:\windows\system32\dllcache\iedvtool.dll
2010-06-10 08:11 . 2010-06-29 07:58 0 ----a-w- c:\windows\system32\ahuia.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-02 14:54 . 2010-01-27 12:24 -------- d-----w- c:\documents and settings\Administrator\Application Data\POP Peeper
2010-07-02 12:19 . 2007-09-29 17:30 -------- d-----w- c:\documents and settings\Administrator\Application Data\Siukp
2010-07-01 14:45 . 2010-02-16 19:03 -------- d-----w- c:\program files\YouTube Downloader Toolbar
2010-07-01 01:27 . 2009-05-25 16:33 -------- d-----w- c:\documents and settings\Administrator\Application Data\Beif
2010-06-24 11:14 . 2008-01-05 12:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\Ebopaw
2010-06-22 17:55 . 2005-10-01 07:21 -------- d-----w- c:\documents and settings\Administrator\Application Data\Horio
2010-06-14 10:51 . 2008-03-09 18:30 -------- d-----w- c:\program files\Mozilla Firefox 3 Beta 3
2010-06-04 09:17 . 2010-06-04 09:17 4 ----a-w- c:\documents and settings\Administrator\Application Data\dhxiuw.dat
2010-05-23 20:16 . 2010-05-23 20:16 348160 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-4d2c054a-n\msvcr71.dll
2010-05-23 20:16 . 2010-05-23 20:16 61440 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-21d05d91-n\decora-sse.dll
2010-05-23 20:16 . 2010-05-23 20:16 503808 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-4d2c054a-n\msvcp71.dll
2010-05-23 20:16 . 2010-05-23 20:16 499712 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-4d2c054a-n\jmc.dll
2010-05-23 20:16 . 2010-05-23 20:16 12800 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-21d05d91-n\decora-d3d.dll
2010-05-06 10:41 . 2004-08-04 08:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-05-02 05:22 . 2004-08-04 08:00 1851264 ----a-w- c:\windows\system32\win32k.sys
2010-04-22 12:46 . 2009-11-10 18:50 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-20 05:30 . 2004-08-04 08:00 285696 ----a-w- c:\windows\system32\atmfd.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{201f27d4-3704-41d6-89c1-aa35e39143ed}]
2008-11-18 12:58 333192 ----a-w- c:\program files\AskBarDis\bar\bin\askBar.dll
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{3041d03e-fd4b-44e0-b742-2d9b88305f98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]
[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{3041D03E-FD4B-44E0-B742-2D9B88305F98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]
[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-11-30 39408]
"PopUpStopperFreeEdition"="c:\progra~1\PANICW~1\POP-UP~1\PSFree.exe" [2005-03-17 536576]
"POP Peeper"="c:\program files\POP Peeper\POPPeeper.exe" [2010-01-12 1490944]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-18 204288]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AGRSMMSG"="AGRSMMSG.exe" [2004-08-24 88363]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-12-08 344064]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-08-03 122939]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-11-04 98394]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-11-04 688218]
"eabconfg.cpl"="c:\program files\HPQ\Quick Launch Buttons\EabServr.exe" [2004-11-12 290816]
"Cpqset"="c:\program files\HPQ\Default Settings\cpqset.exe" [2004-11-19 233534]
"hpWirelessAssistant"="c:\program files\HPQ\HP Wireless Assistant\HP Wireless Assistant.exe" [2004-11-21 790528]
"MPFExe"="c:\progra~1\McAfee.com\PERSON~1\MpfTray.exe" [2003-08-18 1048576]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-03-28 413696]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-04-04 36272]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-03-24 952768]
"NeroCheck"="c:\windows\system32\\NeroCheck.exe" [2001-07-09 155648]
"WatchDog"="c:\program files\InterVideo\DVD Check\DVDCheck.exe" [2004-10-26 184320]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]
"CanonSolutionMenu"="c:\program files\Canon\SolutionMenu\CNSLMAIN.exe" [2007-05-14 644696]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2007-04-03 1603152]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
DVD Check.lnk - c:\program files\InterVideo\DVD Check\DVDCheck.exe [2005-9-1 184320]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SearchSettings]
2010-02-08 12:37 975360 ----a-w- c:\program files\YouTube Downloader Toolbar\SearchSettings.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"iPodService"=3 (0x3)
"helpsvc"=2 (0x2)
"Fax"=2 (0x2)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\utorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [15/06/2010 16:43 64288]
R1 ATMhelpr;ATMhelpr;c:\windows\system32\drivers\ATMHELPR.SYS [17/11/2009 00:44 4064]
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [08/02/2010 13:23 380928]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [03/05/2004 17:26 80384]
S1 Klmc;KLMC driver;c:\windows\system32\Drivers\klmc.sys --> c:\windows\system32\Drivers\klmc.sys [?]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [04/02/2010 16:52 1352832]
.
Contents of the 'Scheduled Tasks' folder
2010-07-02 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 15:42]
2010-07-01 c:\windows\Tasks\{FA758EFE-AE36-425B-A409-37236371032C}_NX8220_Administrator.job
- c:\windows\system32\mobsync.exe [2004-08-04 00:12]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
uInternet Settings,ProxyServer = sbserver:8080
uInternet Settings,ProxyOverride = local.;*.local
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Send To &Bluetooth - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: {{DDDD6D68-CF2E-4E7A-A8DF-43DF07C586F0} - c:\program files\FreshDevices\FreshDownload\fd.exe
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\sy0rkrb4.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - www.google.co.uk
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava11.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava12.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava13.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava14.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJava32.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPJPI150_06.dll
FF - plugin: c:\program files\Java\jre1.5.0_06\bin\NPOJI610.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox 3 Beta 4\greprefs\all.js - pref("security.fileuri.origin_policy", 2);
c:\program files\Mozilla Firefox 3 Beta 4\defaults\pref\firefox.js - pref("browser.places.importBookmarksHTML", true);
c:\program files\Mozilla Firefox 3 Beta 4\defaults\pref\firefox.js - pref("browser.places.createdSmartBookmarks", false);
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-{F230BC08-4182-CA60-C26A-4F0F5F9A7DBE} - c:\documents and settings\Administrator\Application Data\Ebopaw\koso.exe
HKCU-Run-93b7f60d-dd2e-47c5-887e-49ff2bfa6857_42 - c:\documents and settings\Administrator\Application Data\93b7f60d-dd2e-47c5-887e-49ff2bfa6857_42.avi
HKCU-Run-{672FC0DA-DF94-82F2-401B-4D1794AC3C54} - c:\documents and settings\Administrator\Application Data\Yxfehe\xylyd.exe
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-07-02 20:06
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Cpqset = c:\program files\HPQ\Default Settings\cpqset.exe????????8?7?6?5??????? ?4?B?????????????hLC? ??????
scanning hidden files ...
c:\documents and settings\Administrator\Start Menu\Programs\Startup\ntuser_mssec.exe 61440 bytes executable
C:\ntuser_mssec.exe 56832 bytes executable
scan completed successfully
hidden files: 2
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
[HKEY_USERS\S-1-5-21-3157458898-1794876567-261060495-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,00,44,f0,2e,f2,11,3c,45,90,09,b2,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,ba,8f,a7,2d,74,b1,07,40,b6,91,da,\
"6256FFB019F8FDFBD36745B06F4540E9AEAF222A25"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,00,44,f0,2e,f2,11,3c,45,90,09,b2,\
[HKEY_USERS\S-1-5-21-3157458898-1794876567-261060495-500\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
[HKEY_LOCAL_MACHINE\software\Micro Focus\ASLMF]
@Denied: (C D) (Everyone)
"status"="0"
"ASLMFDIR"="c:\\Program Files\\SYSPRO60\\base"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(760)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-07-02 20:15:05
ComboFix-quarantined-files.txt 2010-07-02 19:14
Pre-Run: 7,994,425,344 bytes free
Post-Run: 7,955,951,616 bytes free
- - End Of File - - 7435867F2CC95F8B5E63858C20A9B9BB
#15
Posted 02 July 2010 - 03:32 PM
* Click Start.
* Open My Computer.
* Select the Tools menu and click Folder Options.
* Select the View Tab.
* Under the Hidden files and folders heading select Show hidden files and folders.
* Uncheck the Hide protected operating system files (recommended) option.
* Click Yes to confirm.
* Click OK.
Please go to http://www.virustota.../en/indexf.html
click on Browse, and upload the following file for analysis:
C:\WINDOWS\SYSTEM32\ahuia.sys
Then click Submit. Allow the file to be scanned, and then please copy and paste the results here for me to see. Or you can copy the link to the VT results page if that is easier.
Repeat for this file also:
c:\windows\system32\alrsvcy.sys
The help you receive here is free, but if you would like to help me continue the fight against Malware then

Logs will be closed if you haven't replied within 5 days
Proud Graduate of TC/WTT Classroom
"To find perfect composure in the midst of change is to find ourselves in nirvana."
Suzuki Roshi
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users