Jump to content

Search the Community

Showing results for tags 'rootkit'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes 3 Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 92 results

  1. I'm starting to believe I have a virus or rootkit of some sort, so I've downloaded and scanned my system (multiple times) w/Bitdefender, Malwarebytes (with rootkit check enabled), Malwarebytes Anti-Rootkit, and GMER. GMER is the only one that consistently picks up a possible rootkit, and they're different files after I fix the previous detected files. This only happens when I do a quickscan with GMER, as when I do a fullscan with GMER it crashes my computer everytime on a file named "kfldiuod.sys", which I can't find any information for, except in the Running section of the log. Here are my current GMER logs on the quickscan; -- GMER 2.2.19882 Rootkit scan 2018-09-22 07:45:58 Windows 6.2.9200 x64 \Device\Harddisk1\DR1 -> \Device\00000046 NVMe____ rev.3D1Q 238.47GB Running: gmer.exe; Driver: C:\Users\TRAVEL~1\AppData\Local\Temp\kfldiuod.sys ---- Disk sectors - GMER 2.2 ---- Disk \Device\Harddisk1\DR1 unknown MBR code ---- System - GMER 2.2 ---- SSDT ZwAcceptConnectPort fffff80070bb8f7c ntoskrnl.exe [unknown section] SSDT ZwAccessCheck fffff8007068df6c ntoskrnl.exe [unknown section] SSDT ZwAccessCheckAndAuditAlarm fffff80070bc7368 ntoskrnl.exe [unknown section] SSDT ZwAccessCheckByType fffff8007071da08 ntoskrnl.exe [unknown section] SSDT ZwAccessCheckByTypeAndAuditAlarm fffff80070bc73f4 ntoskrnl.exe [unknown section] SSDT ZwAccessCheckByTypeResultList fffff800708b01ac ntoskrnl.exe [unknown section] SSDT ZwAccessCheckByTypeResultListAndAuditAlarm fffff80070da6b70 ntoskrnl.exe [unknown section] SSDT ZwAccessCheckByTypeResultListAndAuditAlarmByHandle fffff80070da6c1c ntoskrnl.exe [unknown section] SSDT ZwAcquireProcessActivityReference fffff80070bcee7c ntoskrnl.exe [unknown section] SSDT ZwAddAtom fffff80070ddbfa0 ntoskrnl.exe [unknown section] SSDT ZwAddAtomEx fffff80070ba571c ntoskrnl.exe [unknown section] SSDT ZwAddBootEntry fffff80070dd85c0 ntoskrnl.exe [unknown section] SSDT ZwAddDriverEntry fffff80070dd85f0 ntoskrnl.exe [unknown section] SSDT ZwAdjustGroupsToken fffff80070badfe8 ntoskrnl.exe [unknown section] SSDT ZwAdjustPrivilegesToken fffff80070b1da20 ntoskrnl.exe [unknown section] SSDT ZwAdjustTokenClaimsAndDeviceGroups fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwAlertResumeThread fffff80070d9423c ntoskrnl.exe [unknown section] SSDT ZwAlertThread fffff80070d94350 ntoskrnl.exe [unknown section] SSDT ZwAlertThreadByThreadId fffff80070b256a0 ntoskrnl.exe [unknown section] SSDT ZwAllocateLocallyUniqueId fffff80070b94bf0 ntoskrnl.exe [unknown section] SSDT ZwAllocateReserveObject fffff80070bb4704 ntoskrnl.exe [unknown section] SSDT ZwAllocateUserPhysicalPages fffff80070d659bc ntoskrnl.exe [unknown section] SSDT ZwAllocateUuids fffff80070baa430 ntoskrnl.exe [unknown section] SSDT ZwAllocateVirtualMemory fffff80070af00a0 ntoskrnl.exe [unknown section] SSDT ZwAllocateVirtualMemoryEx fffff80070b26f34 ntoskrnl.exe [unknown section] SSDT ZwAlpcAcceptConnectPort fffff80070b49a0c ntoskrnl.exe [unknown section] SSDT ZwAlpcCancelMessage fffff80070bc0520 ntoskrnl.exe [unknown section] SSDT ZwAlpcConnectPort fffff80070b45d00 ntoskrnl.exe [unknown section] SSDT ZwAlpcConnectPortEx fffff80070b45ea4 ntoskrnl.exe [unknown section] SSDT ZwAlpcCreatePort fffff80070bad794 ntoskrnl.exe [unknown section] SSDT ZwAlpcCreatePortSection fffff80070b46008 ntoskrnl.exe [unknown section] SSDT ZwAlpcCreateResourceReserve fffff80070b9e030 ntoskrnl.exe [unknown section] SSDT ZwAlpcCreateSectionView fffff80070b475f4 ntoskrnl.exe [unknown section] SSDT ZwAlpcCreateSecurityContext fffff80070b9b90c ntoskrnl.exe [unknown section] SSDT ZwAlpcDeletePortSection fffff80070b45f20 ntoskrnl.exe [unknown section] SSDT ZwAlpcDeleteResourceReserve fffff80070d5dd84 ntoskrnl.exe [unknown section] SSDT ZwAlpcDeleteSectionView fffff80070b45d7c ntoskrnl.exe [unknown section] SSDT ZwAlpcDeleteSecurityContext fffff80070b477b8 ntoskrnl.exe [unknown section] SSDT ZwAlpcDisconnectPort fffff80070baea20 ntoskrnl.exe [unknown section] SSDT ZwAlpcImpersonateClientContainerOfPort fffff80070d5d024 ntoskrnl.exe [unknown section] SSDT ZwAlpcImpersonateClientOfPort fffff80070b01420 ntoskrnl.exe [unknown section] SSDT ZwAlpcOpenSenderProcess fffff80070b4b534 ntoskrnl.exe [unknown section] SSDT ZwAlpcOpenSenderThread fffff80070b23544 ntoskrnl.exe [unknown section] SSDT ZwAlpcQueryInformation fffff80070b915d0 ntoskrnl.exe [unknown section] SSDT ZwAlpcQueryInformationMessage fffff80070b9bae4 ntoskrnl.exe [unknown section] SSDT ZwAlpcRevokeSecurityContext fffff80070d5d248 ntoskrnl.exe [unknown section] SSDT ZwAlpcSendWaitReceivePort fffff80070afbec0 ntoskrnl.exe [unknown section] SSDT ZwAlpcSetInformation fffff80070b63910 ntoskrnl.exe [unknown section] SSDT ZwApphelpCacheControl fffff80070b94070 ntoskrnl.exe [unknown section] SSDT ZwAreMappedFilesTheSame fffff80070bfcea0 ntoskrnl.exe [unknown section] SSDT ZwAssignProcessToJobObject fffff80070b664a0 ntoskrnl.exe [unknown section] SSDT ZwAssociateWaitCompletionPacket fffff800706bf850 ntoskrnl.exe [unknown section] SSDT ZwCallEnclave fffff800707a4ee0 ntoskrnl.exe [unknown section] SSDT ZwCallbackReturn fffff8007079f1a0 ntoskrnl.exe [unknown section] SSDT ZwCancelIoFile fffff80070b42ecc ntoskrnl.exe [unknown section] SSDT ZwCancelIoFileEx fffff80070b43950 ntoskrnl.exe [unknown section] SSDT ZwCancelSynchronousIoFile fffff80070d32dc8 ntoskrnl.exe [unknown section] SSDT ZwCancelTimer fffff800706f72b0 ntoskrnl.exe [unknown section] SSDT ZwCancelTimer2 fffff8007073102c ntoskrnl.exe [unknown section] SSDT ZwCancelWaitCompletionPacket fffff800706bf538 ntoskrnl.exe [unknown section] SSDT ZwClearEvent fffff80070b96b60 ntoskrnl.exe [unknown section] SSDT ZwClose fffff80070ae08d0 ntoskrnl.exe [unknown section] SSDT ZwCloseObjectAuditAlarm fffff80070ba7b24 ntoskrnl.exe [unknown section] SSDT ZwCommitComplete fffff80070779440 ntoskrnl.exe [unknown section] SSDT ZwCommitEnlistment fffff80070779450 ntoskrnl.exe [unknown section] SSDT ZwCommitRegistryTransaction fffff80070b89168 ntoskrnl.exe [unknown section] SSDT ZwCommitTransaction fffff80070779460 ntoskrnl.exe [unknown section] SSDT ZwCompactKeys fffff80070d0199c ntoskrnl.exe [unknown section] SSDT ZwCompareObjects fffff80070bb568c ntoskrnl.exe [unknown section] SSDT ZwCompareSigningLevels fffff80070bbff00 ntoskrnl.exe [unknown section] SSDT ZwCompareTokens fffff80070b2b584 ntoskrnl.exe [unknown section] SSDT ZwCompleteConnectPort fffff80070bbcb80 ntoskrnl.exe [unknown section] SSDT ZwCompressKey fffff80070d01c7c ntoskrnl.exe [unknown section] SSDT ZwConnectPort fffff80070b44ec0 ntoskrnl.exe [unknown section] SSDT ZwContinue fffff8007079bd80 ntoskrnl.exe [unknown section] SSDT ZwConvertBetweenAuxiliaryCounterAndPerformanceCounter fffff80070ddd748 ntoskrnl.exe [unknown section] SSDT ZwCreateDebugObject fffff80070d25410 ntoskrnl.exe [unknown section] SSDT ZwCreateDirectoryObject fffff80070ba5940 ntoskrnl.exe [unknown section] SSDT ZwCreateDirectoryObjectEx fffff80070ba5924 ntoskrnl.exe [unknown section] SSDT ZwCreateEnclave fffff80070d68a04 ntoskrnl.exe [unknown section] SSDT ZwCreateEnlistment fffff80070779470 ntoskrnl.exe [unknown section] SSDT ZwCreateEvent fffff80070af61b0 ntoskrnl.exe [unknown section] SSDT ZwCreateEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwCreateFile fffff80070b51380 ntoskrnl.exe [unknown section] SSDT ZwCreateIRTimer fffff80070c1f608 ntoskrnl.exe [unknown section] SSDT ZwCreateIoCompletion fffff80070ba3280 ntoskrnl.exe [unknown section] SSDT ZwCreateJobObject fffff80070ba9dc0 ntoskrnl.exe [unknown section] SSDT ZwCreateJobSet fffff80070bca5d0 ntoskrnl.exe [unknown section] SSDT ZwCreateKey fffff80070b31d48 ntoskrnl.exe [unknown section] SSDT ZwCreateKeyTransacted fffff80070b88b6c ntoskrnl.exe [unknown section] SSDT ZwCreateKeyedEvent fffff80070c53e00 ntoskrnl.exe [unknown section] SSDT ZwCreateLowBoxToken fffff80070b7af60 ntoskrnl.exe [unknown section] SSDT ZwCreateMailslotFile fffff80070a9f580 ntoskrnl.exe [unknown section] SSDT ZwCreateMutant fffff80070b993e8 ntoskrnl.exe [unknown section] SSDT ZwCreateNamedPipeFile fffff80070bb0b28 ntoskrnl.exe [unknown section] SSDT ZwCreatePagingFile fffff80070c46028 ntoskrnl.exe [unknown section] SSDT ZwCreatePartition fffff80070d94834 ntoskrnl.exe [unknown section] SSDT ZwCreatePort fffff80070bf4a1c ntoskrnl.exe [unknown section] SSDT ZwCreatePrivateNamespace fffff80070b7a0a4 ntoskrnl.exe [unknown section] SSDT ZwCreateProcess fffff80070d8e334 ntoskrnl.exe [unknown section] SSDT ZwCreateProcessEx fffff80070bcfe6c ntoskrnl.exe [unknown section] SSDT ZwCreateProfile fffff80070ddd864 ntoskrnl.exe [unknown section] SSDT ZwCreateProfileEx fffff80070ddd940 ntoskrnl.exe [unknown section] SSDT ZwCreateRegistryTransaction fffff80070bbe7b8 ntoskrnl.exe [unknown section] SSDT ZwCreateResourceManager fffff80070779480 ntoskrnl.exe [unknown section] SSDT ZwCreateSection fffff80070af42d0 ntoskrnl.exe [unknown section] SSDT ZwCreateSemaphore fffff80070af4cb0 ntoskrnl.exe [unknown section] SSDT ZwCreateSymbolicLinkObject fffff80070bada78 ntoskrnl.exe [unknown section] SSDT ZwCreateThread fffff80070d8e3bc ntoskrnl.exe [unknown section] SSDT ZwCreateThreadEx fffff80070ac0580 ntoskrnl.exe [unknown section] SSDT ZwCreateTimer fffff80070b257a8 ntoskrnl.exe [unknown section] SSDT ZwCreateTimer2 fffff80070b64030 ntoskrnl.exe [unknown section] SSDT ZwCreateToken fffff80070da810c ntoskrnl.exe [unknown section] SSDT ZwCreateTokenEx fffff80070b78500 ntoskrnl.exe [unknown section] SSDT ZwCreateTransaction fffff80070779490 ntoskrnl.exe [unknown section] SSDT ZwCreateTransactionManager fffff800707794a0 ntoskrnl.exe [unknown section] SSDT ZwCreateUserProcess fffff80070b503f4 ntoskrnl.exe [unknown section] SSDT ZwCreateWaitCompletionPacket fffff80070b9b800 ntoskrnl.exe [unknown section] SSDT ZwCreateWaitablePort fffff80070c1ef3c ntoskrnl.exe [unknown section] SSDT ZwCreateWnfStateName fffff80070b4feb8 ntoskrnl.exe [unknown section] SSDT ZwCreateWorkerFactory fffff80070b63cd4 ntoskrnl.exe [unknown section] SSDT ZwDebugActiveProcess fffff80070d255f8 ntoskrnl.exe [unknown section] SSDT ZwDebugContinue fffff80070d257f8 ntoskrnl.exe [unknown section] SSDT ZwDelayExecution fffff80070aec500 ntoskrnl.exe [unknown section] SSDT ZwDeleteAtom fffff80070b90650 ntoskrnl.exe [unknown section] SSDT ZwDeleteBootEntry fffff80070dd8620 ntoskrnl.exe [unknown section] SSDT ZwDeleteDriverEntry fffff80070dd87a8 ntoskrnl.exe [unknown section] SSDT ZwDeleteFile fffff80070bfea20 ntoskrnl.exe [unknown section] SSDT ZwDeleteKey fffff80070b2f054 ntoskrnl.exe [unknown section] SSDT ZwDeleteObjectAuditAlarm fffff80070bff1f0 ntoskrnl.exe [unknown section] SSDT ZwDeletePrivateNamespace fffff80070a9fa44 ntoskrnl.exe [unknown section] SSDT ZwDeleteValueKey fffff80070b3020c ntoskrnl.exe [unknown section] SSDT ZwDeleteWnfStateData fffff80070c5ab8c ntoskrnl.exe [unknown section] SSDT ZwDeleteWnfStateName fffff80070ba4110 ntoskrnl.exe [unknown section] SSDT ZwDeviceIoControlFile fffff80070ae1840 ntoskrnl.exe [unknown section] SSDT ZwDisableLastKnownGood fffff80070bfef08 ntoskrnl.exe [unknown section] SSDT ZwDisplayString fffff80070dd2a10 ntoskrnl.exe [unknown section] SSDT ZwDrawText fffff800708c7f20 ntoskrnl.exe [unknown section] SSDT ZwDuplicateObject fffff80070ac5eb0 ntoskrnl.exe [unknown section] SSDT ZwDuplicateToken fffff80070af3500 ntoskrnl.exe [unknown section] SSDT ZwEnableLastKnownGood fffff80070bfde8c ntoskrnl.exe [unknown section] SSDT ZwEnumerateBootEntries fffff80070dd8930 ntoskrnl.exe [unknown section] SSDT ZwEnumerateDriverEntries fffff80070dd8f78 ntoskrnl.exe [unknown section] SSDT ZwEnumerateKey fffff80070ad0c10 ntoskrnl.exe [unknown section] SSDT ZwEnumerateSystemEnvironmentValuesEx fffff80070dd9428 ntoskrnl.exe [unknown section] SSDT ZwEnumerateTransactionObject fffff800707794b0 ntoskrnl.exe [unknown section] SSDT ZwEnumerateValueKey fffff80070b08940 ntoskrnl.exe [unknown section] SSDT ZwExtendSection fffff80070bbf9d8 ntoskrnl.exe [unknown section] SSDT ZwFilterBootOption fffff80070da945c ntoskrnl.exe [unknown section] SSDT ZwFilterToken fffff80070bbab04 ntoskrnl.exe [unknown section] SSDT ZwFilterTokenEx fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwFindAtom fffff80070ac5220 ntoskrnl.exe [unknown section] SSDT ZwFlushBuffersFile fffff80070b9f174 ntoskrnl.exe [unknown section] SSDT ZwFlushBuffersFileEx fffff80070b9f198 ntoskrnl.exe [unknown section] SSDT ZwFlushInstallUILanguage fffff80070c5de74 ntoskrnl.exe [unknown section] SSDT ZwFlushInstructionCache fffff80070bbcb80 ntoskrnl.exe [unknown section] SSDT ZwFlushKey fffff80070bb8880 ntoskrnl.exe [unknown section] SSDT ZwFlushProcessWriteBuffers fffff800706ae3f0 ntoskrnl.exe [unknown section] SSDT ZwFlushVirtualMemory fffff80070aa24f0 ntoskrnl.exe [unknown section] SSDT ZwFlushWriteBuffer fffff80070d69810 ntoskrnl.exe [unknown section] SSDT ZwFreeUserPhysicalPages fffff80070873eb4 ntoskrnl.exe [unknown section] SSDT ZwFreeVirtualMemory fffff80070ac9210 ntoskrnl.exe [unknown section] SSDT ZwFreezeRegistry fffff80070d01e78 ntoskrnl.exe [unknown section] SSDT ZwFreezeTransactions fffff800707794c0 ntoskrnl.exe [unknown section] SSDT ZwFsControlFile fffff80070b9c920 ntoskrnl.exe [unknown section] SSDT ZwGetCachedSigningLevel fffff80070ba783c ntoskrnl.exe [unknown section] SSDT ZwGetCompleteWnfStateSubscription fffff80070b4c238 ntoskrnl.exe [unknown section] SSDT ZwGetContextThread fffff80070bb958c ntoskrnl.exe [unknown section] SSDT ZwGetCurrentProcessorNumber fffff80070d902d4 ntoskrnl.exe [unknown section] SSDT ZwGetCurrentProcessorNumberEx fffff80070d90324 ntoskrnl.exe [unknown section] SSDT ZwGetDevicePowerState fffff80070d7ae14 ntoskrnl.exe [unknown section] SSDT ZwGetMUIRegistryInfo fffff80070b62c58 ntoskrnl.exe [unknown section] SSDT ZwGetNextProcess fffff80070c193c0 ntoskrnl.exe [unknown section] SSDT ZwGetNextThread fffff80070bce580 ntoskrnl.exe [unknown section] SSDT ZwGetNlsSectionPtr fffff80070b91f4c ntoskrnl.exe [unknown section] SSDT ZwGetNotificationResourceManager fffff800707794d0 ntoskrnl.exe [unknown section] SSDT ZwGetWriteWatch fffff8007063b8d0 ntoskrnl.exe [unknown section] SSDT ZwImpersonateAnonymousToken fffff80070aaa4c0 ntoskrnl.exe [unknown section] SSDT ZwImpersonateClientOfPort fffff80070d5cc44 ntoskrnl.exe [unknown section] SSDT ZwImpersonateThread fffff80070b3e9d0 ntoskrnl.exe [unknown section] SSDT ZwInitializeEnclave fffff80070d68e68 ntoskrnl.exe [unknown section] SSDT ZwInitializeNlsFiles fffff80070b29004 ntoskrnl.exe [unknown section] SSDT ZwInitializeRegistry fffff80070c1e78c ntoskrnl.exe [unknown section] SSDT ZwInitiatePowerAction fffff80070bf688c ntoskrnl.exe [unknown section] SSDT ZwIsProcessInJob fffff80070b66368 ntoskrnl.exe [unknown section] SSDT ZwIsSystemResumeAutomatic fffff80070bfa580 ntoskrnl.exe [unknown section] SSDT ZwIsUILanguageComitted fffff80070bc11dc ntoskrnl.exe [unknown section] SSDT ZwListenPort fffff80070c5fa58 ntoskrnl.exe [unknown section] SSDT ZwLoadDriver fffff80070c014a0 ntoskrnl.exe [unknown section] SSDT ZwLoadEnclaveData fffff80070d69138 ntoskrnl.exe [unknown section] SSDT ZwLoadHotPatch fffff80070d383b8 ntoskrnl.exe [unknown section] SSDT ZwLoadKey fffff80070bf5214 ntoskrnl.exe [unknown section] SSDT ZwLoadKey2 fffff80070c11140 ntoskrnl.exe [unknown section] SSDT ZwLoadKeyEx fffff80070b31208 ntoskrnl.exe [unknown section] SSDT ZwLockFile fffff80070b10fc0 ntoskrnl.exe [unknown section] SSDT ZwLockProductActivationKeys fffff80070c45760 ntoskrnl.exe [unknown section] SSDT ZwLockRegistryKey fffff80070c50480 ntoskrnl.exe [unknown section] SSDT ZwLockVirtualMemory fffff800706cbb14 ntoskrnl.exe [unknown section] SSDT ZwMakePermanentObject fffff80070bcf5d0 ntoskrnl.exe [unknown section] SSDT ZwMakeTemporaryObject fffff80070b3ccf0 ntoskrnl.exe [unknown section] SSDT ZwManagePartition fffff80070b1a630 ntoskrnl.exe [unknown section] SSDT ZwMapCMFModule fffff80070bfeb6c ntoskrnl.exe [unknown section] SSDT ZwMapUserPhysicalPages fffff80070d66174 ntoskrnl.exe [unknown section] SSDT ZwMapUserPhysicalPagesScatter fffff80070d664c8 ntoskrnl.exe [unknown section] SSDT ZwMapViewOfSection fffff80070acabd0 ntoskrnl.exe [unknown section] SSDT ZwMapViewOfSectionEx fffff80070d5fd48 ntoskrnl.exe [unknown section] SSDT ZwModifyBootEntry fffff80070dd96dc ntoskrnl.exe [unknown section] SSDT ZwModifyDriverEntry fffff80070dd9708 ntoskrnl.exe [unknown section] SSDT ZwNotifyChangeDirectoryFile fffff80070bafc00 ntoskrnl.exe [unknown section] SSDT ZwNotifyChangeDirectoryFileEx fffff80070bafc60 ntoskrnl.exe [unknown section] SSDT ZwNotifyChangeKey fffff80070b15570 ntoskrnl.exe [unknown section] SSDT ZwNotifyChangeMultipleKeys fffff80070b148f0 ntoskrnl.exe [unknown section] SSDT ZwNotifyChangeSession fffff80070bbfb70 ntoskrnl.exe [unknown section] SSDT ZwOpenDirectoryObject fffff80070b3a91c ntoskrnl.exe [unknown section] SSDT ZwOpenEnlistment fffff800707794e0 ntoskrnl.exe [unknown section] SSDT ZwOpenEvent fffff80070b3a878 ntoskrnl.exe [unknown section] SSDT ZwOpenEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwOpenFile fffff80070b51310 ntoskrnl.exe [unknown section] SSDT ZwOpenIoCompletion fffff80070d32b2c ntoskrnl.exe [unknown section] SSDT ZwOpenJobObject fffff80070d910b4 ntoskrnl.exe [unknown section] SSDT ZwOpenKey fffff80070ae8028 ntoskrnl.exe [unknown section] SSDT ZwOpenKeyEx fffff80070aeb12c ntoskrnl.exe [unknown section] SSDT ZwOpenKeyTransacted fffff80070d01f00 ntoskrnl.exe [unknown section] SSDT ZwOpenKeyTransactedEx fffff80070b88ed4 ntoskrnl.exe [unknown section] SSDT ZwOpenKeyedEvent fffff80070dddd4c ntoskrnl.exe [unknown section] SSDT ZwOpenMutant fffff80070b3a7d4 ntoskrnl.exe [unknown section] SSDT ZwOpenObjectAuditAlarm fffff80070bec5c0 ntoskrnl.exe [unknown section] SSDT ZwOpenPartition fffff80070c5d860 ntoskrnl.exe [unknown section] SSDT ZwOpenPrivateNamespace fffff80070b79ee0 ntoskrnl.exe [unknown section] SSDT ZwOpenProcess fffff80070ae78e0 ntoskrnl.exe [unknown section] SSDT ZwOpenProcessToken fffff80070ae7710 ntoskrnl.exe [unknown section] SSDT ZwOpenProcessTokenEx fffff80070ae7ae0 ntoskrnl.exe [unknown section] SSDT ZwOpenRegistryTransaction fffff80070d01f1c ntoskrnl.exe [unknown section] SSDT ZwOpenResourceManager fffff800707794f0 ntoskrnl.exe [unknown section] SSDT ZwOpenSection fffff80070b988dc ntoskrnl.exe [unknown section] SSDT ZwOpenSemaphore fffff80070b3a730 ntoskrnl.exe [unknown section] SSDT ZwOpenSession fffff80070c1d358 ntoskrnl.exe [unknown section] SSDT ZwOpenSymbolicLinkObject fffff80070ae8050 ntoskrnl.exe [unknown section] SSDT ZwOpenThread fffff80070b25230 ntoskrnl.exe [unknown section] SSDT ZwOpenThreadToken fffff80070ae5fb0 ntoskrnl.exe [unknown section] SSDT ZwOpenThreadTokenEx fffff80070ae5fd0 ntoskrnl.exe [unknown section] SSDT ZwOpenTimer fffff80070dd48b0 ntoskrnl.exe [unknown section] SSDT ZwOpenTransaction fffff80070779500 ntoskrnl.exe [unknown section] SSDT ZwOpenTransactionManager fffff80070779510 ntoskrnl.exe [unknown section] SSDT ZwPlugPlayControl fffff80070ab96bc ntoskrnl.exe [unknown section] SSDT ZwPowerInformation fffff80070aa8884 ntoskrnl.exe [unknown section] SSDT ZwPrePrepareComplete fffff80070779520 ntoskrnl.exe [unknown section] SSDT ZwPrePrepareEnlistment fffff80070779530 ntoskrnl.exe [unknown section] SSDT ZwPrepareComplete fffff80070779540 ntoskrnl.exe [unknown section] SSDT ZwPrepareEnlistment fffff80070779550 ntoskrnl.exe [unknown section] SSDT ZwPrivilegeCheck fffff80070b1e2e4 ntoskrnl.exe [unknown section] SSDT ZwPrivilegeObjectAuditAlarm fffff80070c1c32c ntoskrnl.exe [unknown section] SSDT ZwPrivilegedServiceAuditAlarm fffff80070bc6564 ntoskrnl.exe [unknown section] SSDT ZwPropagationComplete fffff80070779560 ntoskrnl.exe [unknown section] SSDT ZwPropagationFailed fffff80070779570 ntoskrnl.exe [unknown section] SSDT ZwProtectVirtualMemory fffff80070af0f80 ntoskrnl.exe [unknown section] SSDT ZwPulseEvent fffff80070b25fe0 ntoskrnl.exe [unknown section] SSDT ZwQueryAttributesFile fffff80070ae7d90 ntoskrnl.exe [unknown section] SSDT ZwQueryAuxiliaryCounterFrequency fffff80070ddd9a4 ntoskrnl.exe [unknown section] SSDT ZwQueryBootEntryOrder fffff80070dd9734 ntoskrnl.exe [unknown section] SSDT ZwQueryBootOptions fffff80070dd99a0 ntoskrnl.exe [unknown section] SSDT ZwQueryDebugFilterState fffff80070733e30 ntoskrnl.exe [unknown section] SSDT ZwQueryDefaultLocale fffff80070b2607c ntoskrnl.exe [unknown section] SSDT ZwQueryDefaultUILanguage fffff80070c19db0 ntoskrnl.exe [unknown section] SSDT ZwQueryDirectoryFile fffff80070baae20 ntoskrnl.exe [unknown section] SSDT ZwQueryDirectoryFileEx fffff80070ae51e0 ntoskrnl.exe [unknown section] SSDT ZwQueryDirectoryObject fffff80070b04870 ntoskrnl.exe [unknown section] SSDT ZwQueryDriverEntryOrder fffff80070dd9c9c ntoskrnl.exe [unknown section] SSDT ZwQueryEaFile fffff80070ba2d80 ntoskrnl.exe [unknown section] SSDT ZwQueryEvent fffff80070bb1af0 ntoskrnl.exe [unknown section] SSDT ZwQueryFullAttributesFile fffff80070b95e90 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationAtom fffff80070b90860 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationByName fffff80070d32e9c ntoskrnl.exe [unknown section] SSDT ZwQueryInformationEnlistment fffff80070779580 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationFile fffff80070ae4350 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationJobObject fffff80070b5622c ntoskrnl.exe [unknown section] SSDT ZwQueryInformationPort fffff80070d5cc68 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationProcess fffff80070abb4a0 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationResourceManager fffff80070779590 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationThread fffff80070b01b10 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationToken fffff80070ae1d80 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationTransaction fffff800707795a0 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationTransactionManager fffff800707795b0 ntoskrnl.exe [unknown section] SSDT ZwQueryInformationWorkerFactory fffff800708cd3bc ntoskrnl.exe [unknown section] SSDT ZwQueryInstallUILanguage fffff80070bb9bc8 ntoskrnl.exe [unknown section] SSDT ZwQueryIntervalProfile fffff80070bcfb80 ntoskrnl.exe [unknown section] SSDT ZwQueryIoCompletion fffff80070d32c40 ntoskrnl.exe [unknown section] SSDT ZwQueryKey fffff80070ad4020 ntoskrnl.exe [unknown section] SSDT ZwQueryLicenseValue fffff80070b8d660 ntoskrnl.exe [unknown section] SSDT ZwQueryMultipleValueKey fffff80070b2fb7c ntoskrnl.exe [unknown section] SSDT ZwQueryMutant fffff80070bce2cc ntoskrnl.exe [unknown section] SSDT ZwQueryObject fffff80070b091d0 ntoskrnl.exe [unknown section] SSDT ZwQueryOpenSubKeys fffff80070d0206c ntoskrnl.exe [unknown section] SSDT ZwQueryOpenSubKeysEx fffff80070bf88d0 ntoskrnl.exe [unknown section] SSDT ZwQueryPerformanceCounter fffff80070b96900 ntoskrnl.exe [unknown section] SSDT ZwQueryPortInformationProcess fffff80070bca550 ntoskrnl.exe [unknown section] SSDT ZwQueryQuotaInformationFile fffff80070d34100 ntoskrnl.exe [unknown section] SSDT ZwQuerySection fffff80070bad5d8 ntoskrnl.exe [unknown section] SSDT ZwQuerySecurityAttributesToken fffff80070ad09e0 ntoskrnl.exe [unknown section] SSDT ZwQuerySecurityObject fffff80070b05190 ntoskrnl.exe [unknown section] SSDT ZwQuerySecurityPolicy fffff80070da1e44 ntoskrnl.exe [unknown section] SSDT ZwQuerySemaphore fffff80070bce1b0 ntoskrnl.exe [unknown section] SSDT ZwQuerySymbolicLinkObject fffff80070b935e0 ntoskrnl.exe [unknown section] SSDT ZwQuerySystemEnvironmentValue fffff80070dd9fc0 ntoskrnl.exe [unknown section] SSDT ZwQuerySystemEnvironmentValueEx fffff80070bbe108 ntoskrnl.exe [unknown section] SSDT ZwQuerySystemInformation fffff80070ae8ac0 ntoskrnl.exe [unknown section] SSDT ZwQuerySystemInformationEx fffff80070ba4d90 ntoskrnl.exe [unknown section] SSDT ZwQuerySystemTime fffff8007068df6c ntoskrnl.exe [unknown section] SSDT ZwQueryTimer fffff80070dd4954 ntoskrnl.exe [unknown section] SSDT ZwQueryTimerResolution fffff80070bbdf14 ntoskrnl.exe [unknown section] SSDT ZwQueryValueKey fffff80070ad46a0 ntoskrnl.exe [unknown section] SSDT ZwQueryVirtualMemory fffff80070af120c ntoskrnl.exe [unknown section] SSDT ZwQueryVolumeInformationFile fffff80070b032b0 ntoskrnl.exe [unknown section] SSDT ZwQueryWnfStateData fffff80070b4d130 ntoskrnl.exe [unknown section] SSDT ZwQueryWnfStateNameInformation fffff80070bab5c0 ntoskrnl.exe [unknown section] SSDT ZwQueueApcThread fffff80070b43dec ntoskrnl.exe [unknown section] SSDT ZwQueueApcThreadEx fffff80070b43e18 ntoskrnl.exe [unknown section] SSDT ZwRaiseException fffff8007079c0a0 ntoskrnl.exe [unknown section] SSDT ZwRaiseHardError fffff80070ddbc20 ntoskrnl.exe [unknown section] SSDT ZwReadFile fffff80070b65670 ntoskrnl.exe [unknown section] SSDT ZwReadFileScatter fffff80070b8c010 ntoskrnl.exe [unknown section] SSDT ZwReadOnlyEnlistment fffff800707795c0 ntoskrnl.exe [unknown section] SSDT ZwReadRequestData fffff80070d5cd2c ntoskrnl.exe [unknown section] SSDT ZwReadVirtualMemory fffff80070b06074 ntoskrnl.exe [unknown section] SSDT ZwRecoverEnlistment fffff800707795d0 ntoskrnl.exe [unknown section] SSDT ZwRecoverResourceManager fffff800707795e0 ntoskrnl.exe [unknown section] SSDT ZwRecoverTransactionManager fffff800707795f0 ntoskrnl.exe [unknown section] SSDT ZwRegisterProtocolAddressInformation fffff8007077987c ntoskrnl.exe [unknown section] SSDT ZwRegisterThreadTerminatePort fffff80070bbe3f4 ntoskrnl.exe [unknown section] SSDT ZwReleaseKeyedEvent fffff80070bb934c ntoskrnl.exe [unknown section] SSDT ZwReleaseMutant fffff80070b848b0 ntoskrnl.exe [unknown section] SSDT ZwReleaseSemaphore fffff80070b969b0 ntoskrnl.exe [unknown section] SSDT ZwReleaseWorkerFactoryWorker fffff800706bdec0 ntoskrnl.exe [unknown section] SSDT ZwRemoveIoCompletion fffff80070ace8d0 ntoskrnl.exe [unknown section] SSDT ZwRemoveIoCompletionEx fffff80070acfca0 ntoskrnl.exe [unknown section] SSDT ZwRemoveProcessDebug fffff80070d259dc ntoskrnl.exe [unknown section] SSDT ZwRenameKey fffff80070d022a0 ntoskrnl.exe [unknown section] SSDT ZwRenameTransactionManager fffff80070779888 ntoskrnl.exe [unknown section] SSDT ZwReplaceKey fffff80070d02804 ntoskrnl.exe [unknown section] SSDT ZwReplacePartitionUnit fffff800708db630 ntoskrnl.exe [unknown section] SSDT ZwReplyPort fffff80070b4fdcc ntoskrnl.exe [unknown section] SSDT ZwReplyWaitReceivePort fffff80070b02b80 ntoskrnl.exe [unknown section] SSDT ZwReplyWaitReceivePortEx fffff80070b02ba0 ntoskrnl.exe [unknown section] SSDT ZwReplyWaitReplyPort fffff80070d5cd8c ntoskrnl.exe [unknown section] SSDT ZwRequestPort fffff80070bb7e40 ntoskrnl.exe [unknown section] SSDT ZwRequestWaitReplyPort fffff80070b9ed60 ntoskrnl.exe [unknown section] SSDT ZwResetEvent fffff80070b6f194 ntoskrnl.exe [unknown section] SSDT ZwResetWriteWatch fffff80070af26e0 ntoskrnl.exe [unknown section] SSDT ZwRestoreKey fffff80070d02b78 ntoskrnl.exe [unknown section] SSDT ZwResumeProcess fffff80070ba4a44 ntoskrnl.exe [unknown section] SSDT ZwResumeThread fffff80070ba4b64 ntoskrnl.exe [unknown section] SSDT ZwRevertContainerImpersonation fffff80070895068 ntoskrnl.exe [unknown section] SSDT ZwRollbackComplete fffff80070779600 ntoskrnl.exe [unknown section] SSDT ZwRollbackEnlistment fffff80070779610 ntoskrnl.exe [unknown section] SSDT ZwRollbackRegistryTransaction fffff80070b89790 ntoskrnl.exe [unknown section] SSDT ZwRollbackTransaction fffff80070779620 ntoskrnl.exe [unknown section] SSDT ZwRollforwardTransactionManager fffff80070779894 ntoskrnl.exe [unknown section] SSDT ZwSaveKey fffff80070d02e0c ntoskrnl.exe [unknown section] SSDT ZwSaveKeyEx fffff80070d02e28 ntoskrnl.exe [unknown section] SSDT ZwSaveMergedKeys fffff80070d030c4 ntoskrnl.exe [unknown section] SSDT ZwSecureConnectPort fffff80070b44f0c ntoskrnl.exe [unknown section] SSDT ZwSerializeBoot fffff80070c5e5c4 ntoskrnl.exe [unknown section] SSDT ZwSetBootEntryOrder fffff80070dda2ec ntoskrnl.exe [unknown section] SSDT ZwSetBootOptions fffff80070dda4f0 ntoskrnl.exe [unknown section] SSDT ZwSetCachedSigningLevel fffff80070a9f280 ntoskrnl.exe [unknown section] SSDT ZwSetCachedSigningLevel2 fffff80070a9f2a4 ntoskrnl.exe [unknown section] SSDT ZwSetContextThread fffff80070bc11f4 ntoskrnl.exe [unknown section] SSDT ZwSetDebugFilterState fffff80070c28558 ntoskrnl.exe [unknown section] SSDT ZwSetDefaultHardErrorPort fffff80070c5e054 ntoskrnl.exe [unknown section] SSDT ZwSetDefaultLocale fffff80070c19640 ntoskrnl.exe [unknown section] SSDT ZwSetDefaultUILanguage fffff80070c19848 ntoskrnl.exe [unknown section] SSDT ZwSetDriverEntryOrder fffff80070dda6f4 ntoskrnl.exe [unknown section] SSDT ZwSetEaFile fffff80070d33aa0 ntoskrnl.exe [unknown section] SSDT ZwSetEvent fffff80070ae1ca0 ntoskrnl.exe [unknown section] SSDT ZwSetEventBoostPriority fffff80070dd4aac ntoskrnl.exe [unknown section] SSDT ZwSetHighEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwSetHighWaitLowEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwSetIRTimer fffff80070733458 ntoskrnl.exe [unknown section] SSDT ZwSetInformationDebugObject fffff80070d25b24 ntoskrnl.exe [unknown section] SSDT ZwSetInformationEnlistment fffff80070779630 ntoskrnl.exe [unknown section] SSDT ZwSetInformationFile fffff80070698c20 ntoskrnl.exe [unknown section] SSDT ZwSetInformationJobObject fffff80070b54058 ntoskrnl.exe [unknown section] SSDT ZwSetInformationKey fffff80070b93b50 ntoskrnl.exe [unknown section] SSDT ZwSetInformationObject fffff80070aa0290 ntoskrnl.exe [unknown section] SSDT ZwSetInformationProcess fffff80070acc610 ntoskrnl.exe [unknown section] SSDT ZwSetInformationResourceManager fffff80070779640 ntoskrnl.exe [unknown section] SSDT ZwSetInformationSymbolicLink fffff80070d6ea4c ntoskrnl.exe [unknown section] SSDT ZwSetInformationThread fffff80070acea60 ntoskrnl.exe [unknown section] SSDT ZwSetInformationToken fffff80070b245a0 ntoskrnl.exe [unknown section] SSDT ZwSetInformationTransaction fffff80070779650 ntoskrnl.exe [unknown section] SSDT ZwSetInformationTransactionManager fffff800707798a0 ntoskrnl.exe [unknown section] SSDT ZwSetInformationVirtualMemory fffff80070b70010 ntoskrnl.exe [unknown section] SSDT ZwSetInformationWorkerFactory fffff800706bd2e0 ntoskrnl.exe [unknown section] SSDT ZwSetIntervalProfile fffff80070bcfd78 ntoskrnl.exe [unknown section] SSDT ZwSetIoCompletion fffff80070b642ec ntoskrnl.exe [unknown section] SSDT ZwSetIoCompletionEx fffff80070b643a0 ntoskrnl.exe [unknown section] SSDT ZwSetLdtEntries fffff80070779190 ntoskrnl.exe [unknown section] SSDT ZwSetLowEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwSetLowWaitHighEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwSetQuotaInformationFile fffff80070d34830 ntoskrnl.exe [unknown section] SSDT ZwSetSecurityObject fffff80070bc67d0 ntoskrnl.exe [unknown section] SSDT ZwSetSystemEnvironmentValue fffff80070dda8f8 ntoskrnl.exe [unknown section] SSDT ZwSetSystemEnvironmentValueEx fffff80070ddac30 ntoskrnl.exe [unknown section] SSDT ZwSetSystemInformation fffff80070b23b08 ntoskrnl.exe [unknown section] SSDT ZwSetSystemPowerState fffff80070a8afa0 ntoskrnl.exe [unknown section] SSDT ZwSetSystemTime fffff80070dd2cfc ntoskrnl.exe [unknown section] SSDT ZwSetThreadExecutionState fffff80070aa0fc4 ntoskrnl.exe [unknown section] SSDT ZwSetTimer fffff8007073d99c ntoskrnl.exe [unknown section] SSDT ZwSetTimer2 fffff80070692e4c ntoskrnl.exe [unknown section] SSDT ZwSetTimerEx fffff800706f79a0 ntoskrnl.exe [unknown section] SSDT ZwSetTimerResolution fffff80070a9fe80 ntoskrnl.exe [unknown section] SSDT ZwSetUuidSeed fffff80070c55b54 ntoskrnl.exe [unknown section] SSDT ZwSetValueKey fffff80070b12b50 ntoskrnl.exe [unknown section] SSDT ZwSetVolumeInformationFile fffff80070bf0b30 ntoskrnl.exe [unknown section] SSDT ZwSetWnfProcessNotificationEvent fffff80070bacaf4 ntoskrnl.exe [unknown section] SSDT ZwShutdownSystem fffff80070dd2bd0 ntoskrnl.exe [unknown section] SSDT ZwShutdownWorkerFactory fffff800706bd0e4 ntoskrnl.exe [unknown section] SSDT ZwSignalAndWaitForSingleObject fffff80070881ae0 ntoskrnl.exe [unknown section] SSDT ZwSinglePhaseReject fffff800707798ac ntoskrnl.exe [unknown section] SSDT ZwStartProfile fffff80070ddd9fc ntoskrnl.exe [unknown section] SSDT ZwStopProfile fffff80070dddc5c ntoskrnl.exe [unknown section] SSDT ZwSubscribeWnfStateChange fffff80070b4c92c ntoskrnl.exe [unknown section] SSDT ZwSuspendProcess fffff80070d943c4 ntoskrnl.exe [unknown section] SSDT ZwSuspendThread fffff80070b6c308 ntoskrnl.exe [unknown section] SSDT ZwSystemDebugControl fffff80070ddf6d8 ntoskrnl.exe [unknown section] SSDT ZwTerminateEnclave fffff80070d6976c ntoskrnl.exe [unknown section] SSDT ZwTerminateJobObject fffff80070bb7c20 ntoskrnl.exe [unknown section] SSDT ZwTerminateProcess fffff80070b6ee5c ntoskrnl.exe [unknown section] SSDT ZwTerminateThread fffff80070baa6e8 ntoskrnl.exe [unknown section] SSDT ZwTestAlert fffff80070baeabc ntoskrnl.exe [unknown section] SSDT ZwThawRegistry fffff80070d032f0 ntoskrnl.exe [unknown section] SSDT ZwThawTransactions fffff80070779660 ntoskrnl.exe [unknown section] SSDT ZwTraceControl fffff80070ae57b0 ntoskrnl.exe [unknown section] SSDT ZwTraceEvent fffff8007065e000 ntoskrnl.exe [unknown section] SSDT ZwTranslateFilePath fffff80070ddaec4 ntoskrnl.exe [unknown section] SSDT ZwUmsThreadYield fffff80070d58efc ntoskrnl.exe [unknown section] SSDT ZwUnloadDriver fffff80070bff304 ntoskrnl.exe [unknown section] SSDT ZwUnloadKey fffff80070bf5284 ntoskrnl.exe [unknown section] SSDT ZwUnloadKey2 fffff80070c1f62c ntoskrnl.exe [unknown section] SSDT ZwUnloadKeyEx fffff80070b86de4 ntoskrnl.exe [unknown section] SSDT ZwUnlockFile fffff80070b979f0 ntoskrnl.exe [unknown section] SSDT ZwUnlockVirtualMemory fffff800706cd1c0 ntoskrnl.exe [unknown section] SSDT ZwUnmapViewOfSection fffff80070b46f04 ntoskrnl.exe [unknown section] SSDT ZwUnmapViewOfSectionEx fffff80070b46f20 ntoskrnl.exe [unknown section] SSDT ZwUnsubscribeWnfStateChange fffff80070b9b670 ntoskrnl.exe [unknown section] SSDT ZwUpdateWnfStateData fffff80070b4ca00 ntoskrnl.exe [unknown section] SSDT ZwVdmControl fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwWaitForAlertByThreadId fffff80070b10940 ntoskrnl.exe [unknown section] SSDT ZwWaitForDebugEvent fffff80070d25ca0 ntoskrnl.exe [unknown section] SSDT ZwWaitForKeyedEvent fffff80070bb9000 ntoskrnl.exe [unknown section] SSDT ZwWaitForMultipleObjects fffff80070ae07a0 ntoskrnl.exe [unknown section] SSDT ZwWaitForMultipleObjects32 fffff80070b93f50 ntoskrnl.exe [unknown section] SSDT ZwWaitForSingleObject fffff80070ae16c0 ntoskrnl.exe [unknown section] SSDT ZwWaitForWorkViaWorkerFactory fffff80070639aa0 ntoskrnl.exe [unknown section] SSDT ZwWaitHighEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwWaitLowEventPair fffff80070bca540 ntoskrnl.exe [unknown section] SSDT ZwWorkerFactoryWorkerReady fffff8007071d670 ntoskrnl.exe [unknown section] SSDT ZwWriteFile fffff80070b03790 ntoskrnl.exe [unknown section] SSDT ZwWriteFileGather fffff80070b89cac ntoskrnl.exe [unknown section] SSDT ZwWriteRequestData fffff80070d5ce30 ntoskrnl.exe [unknown section] SSDT ZwWriteVirtualMemory fffff80070bb5664 ntoskrnl.exe [unknown section] SSDT ZwYieldExecution fffff8007070c630 ntoskrnl.exe [unknown section] ---- Threads - GMER 2.2 ---- Thread C:\Windows\system32\csrss.exe [844:1240] fffffd86a3446840 Thread c:\windows\system32\svchost.exe [9372:9760] 00007ffd67897be0 ---- Services - GMER 2.2 ---- Service C:\Windows\system32\DRIVERS\atc.sys (*** hidden *** ) [BOOT] atc <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] BcastDVRUserService_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] BluetoothUserService_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [AUTO] CDPUserSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] DevicePickerUserSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] DevicesFlowUserSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] MessagingService_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [AUTO] OneSyncSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] PimIndexMaintenanceSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] PrintWorkflowUserSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\System32\svchost.exe (*** hidden *** ) [MANUAL] UnistoreSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [MANUAL] UserDataSvc_488e6 <-- ROOTKIT !!! Service C:\Windows\system32\svchost.exe (*** hidden *** ) [AUTO] WpnUserService_488e6 <-- ROOTKIT !!! ---- EOF - GMER 2.2 ----
  2. Hello: Sorry if this has been asked before. I've already searched but since I don't know the name of this malware, I can't find it. There's a possible rootkit that keeps reinstalling programs on my Windows 7. These programs are "Safe finder" "Butler" and some others. When I uninstall these programs, they appear againg shortly after, and they keep opening by themselves and my browsers keep opening new tabs that lead to spam. I've tried using Malwarebytes and it removes these programs really fast. But when the computer restarts after the cleaning, the programs appear again. I've found the icon displayed on the photos on the toolbar and when I shut down the computer. And it seems to be running on the backround installing something. My guess is those programs. Anyone knows what it is and/or how to remove it? Thank you!
  3. I downloaded a program from a third party website and now I have what I believe is a rootkit that I can't delete from my computer. I've uninstalled everything possible, scanned with Malwarebytes and Norton and they remove everything except a file called wmcagent.exe and some folders with weird names like snoteku. It is in my User/Appdata/Local folder. I cannot delete it or a few folders I believe are associated with it. It only says access is denied. I've used the Malwarebytes AdwCleaner and Anti-rootkit and the Norton variants and it can't remove it, or don't detect it. There are two programs running in task manager called "client" and I can't end them, or they just restart later. I even reinstalled Chrome and double checked all my browsers to make sure it's not an extension. I followed some of the steps from this because I believe this is the same problem. However I am not sure and would rather not go through some of the complicated steps toward the end if I don't have to. Towards the end of the guide, they use the FRST executable, and paste the text inside and click fix. His does not work and mine does, the rest of the guide is dedicated to finishing his problem; however it is not clear if they ever fixed the problem. Any advice? Attached is a few files from the guide that might be helpful to look at. FRST.txt Addition.txt Fixlog.txt
  4. Hi so i got a pretty crappy virus, normally i am pretty good with manual removal myself however this one is realllllly a pain and malwarebytes hasnt worked for it nor detected it...i am attaching my frst scan to this post in hopes of some solution i saw you helped another guy remove the same thing people need to watch out this thing is coming bundled with software that seems legit make sure you take my advice and download only from official links if you can otherwise you will be in the same boat possibly or worse. FRST.txt Addition.txt
  5. Hello, Im new to this forum and I would be extremely grateful if anyone here could give me some advice on how to remove encrypted syswow64, (possibly zero access rootkit), from several usbs that I got that have been infected when they where inserted in windows computers that I got that were attacked by hackers. The hackers installed a system administration server on my network and attacked my computers with some kind of synzcronization worm/virus that synced and even infected offline devices, (that contained Bluetooth and smartcard etc), like Television, digital TV box, dvd, printer and phones. Programs that I detected on my computers that they were using were among others, syswow64, bluetoothshare, various installation hooks, svchost, microsoft synchronization feeds, keyloggers, infrared, remote Control programs, malicious code and code changer programs etc. When I scan the usbs with regular virus Scans like Kaspersky or Norton they all comes out Clean and no names shows up during the scan but when I scan the usbs with microsoft forefront scanner it also comes out as Clean but during the scan all the rootkit names show up though. The names that comes up includes for example syswow64, catroot, system root: nearby devices, hkmmodule installation hook, netframework installation hook, microsoft feeds synchronization, subsystem spooler system, mobilesynch.exe, tablet/pcsynch.exe, rundll.32.exe and many more. I have run the scan on all photos separately that is stored on the usbs and the same rootkit names shows up during the scan on every single photo and also, when I did a test and removed all files from one usb, so that it was empty, all the names still showed up when I scanned it and I could also see that the rootkit, (although I cant see it as it is encrypted), took up 0,8 gb of space on the usb since there was only 7,2 gb left for me to use although the size of the usb is 8 gb so if the usb were really empty there should be 8 gb space left for me to use, not 7.2 gb. What I would like to know is if anyone here knows if theese types of encrypted rootkits is possible to remove at all fro usbs so that I can get my photos, and if so how? Is there any antivirus website where I can upload the photos that can Clean the rootkit completely out of the usb and photos or should I go visit some computer specialist store instead, or is it enough if I just burn the photos over to a dvd and then the rootkit will dissapear byitself, or is there nothing that can be done at all? Anyone that knows the answer to theese questions please feel free to send me messages either in this thread or you can send me private messages to my profile here on this forum aswell if you like. All answers are extremely appreciated
  6. Hi, I had issues with my laptop and after running Malware bytes it located 4 rootkit.fileless.MTGen and 2 Trojan.Fileless.MTGen instances. I have quarantined them but how can I be sure that this has removed everything? Also how concerned should I be that these things were on my computer? What other steps are recommended to ensure the issues are resolved? Appreciate any guidance provided
  7. My virus is pretty much exactly the same as the one experienced by another user in this thread. I've attached my fixlog to this post, thanks in advance for the help! Fixlog.txt
  8. My laptop (Windows 8.1, 64-bit) recently was infected with what I believe is the smartservice rootkit/virus. I somehow disabled its ability to prevent MBAR/Malwarebytes from opening, so I can (and have) scanned with them to no avail. The infection seems to be in two folders located at AppData\Local\pwdacnz and AppData\Local\cwaitrx. It manifests itself as a multiple Windows Process Manager (32 bit) entries which are all named pshlxct.exe I have also used Roguekiller, Adwcleaner, FRST, GMER, TDSSkiller (didn't work) and Rkill. Roguekiller was able to detect and (I think) delete pwdacnz and cwaitrx at first but when I restated my computer the folders re-appeared. I recently ran windows update and my windows security should be updated, if that matters at all. Here are my FRST logs. Here's my mbar log as well. I have access to a USB drive and clean computer. FRST.txt Addition.txt mbar-log-2018-05-06 (19-33-45).txt
  9. Malwarebytes rootkit beta problem
  10. I had ran a rootkit scan got 3 winzips. I removed these and after doing so malwarebytes has been having problems contacting the license server, it asks me to check my network settings. I could restore them but i have read their are no necessary rootkits for malwarebytes to run and this only happens on one of the two computers i have malwarebytes installed on.
  11. First off- using a vm machine, host OS is ubuntu linux- the logs attached are from Virtual Box of a Window 10 machine. I have to use a linux machine because; - can not reinstall any Windows without the infection hijacking the install, I've tried installing WinXP, 8.1, 7, 7 pro, WinUltimate, -during reinstall, at the cd/rom loads, then at a point the install instructions are taken over, and a similiar gui appears to complete install. -infects any device attached physical of network, usb will be formatted automatically (fake warning posted gui) -registry is infected -possible firmware exploited, usb and pci seem to be used as alternate devices, -system32 files are unusual -unable to flash bios -appears as hidden sector or directory, hijacks the mbr, -has the ability to replicate if deleted or core files, registry is changed -suspected WMI Shell running with TRUSTED INSTALLER -Possible ChipSec related? I think I've tried everthing as far as scans, rkhunter, Hirens Boot Cd, Process Monitor, msconfig, BIOS settings, hdd replacement. All my machines at home are down/infected. Only way to get back was Linux, and using VM to start Windows 10. This is from a enterprise PC Tech Level 2 working at home. FRST.txt Addition.txt mbt first scan.txt
  12. Hi, I've been having ongoing issues with my PCs and network. Despite me having an active Internet connection my ISPs Tech's are unable to connect using LMIR. This problem has been ongoing now since approximately the middle of last year. I'm running Windows 10 x64 (should be fully updated,) however, I'm using a Linux Shell (ESET SysRescue) disc to make this post. I'm relatively familiar with malware removal, having assisted others many times on forums. I need fresh eyes to look at my problem please. I've run AdwCleaner. I have also run: JRT, FRST64, MBAR 10, TDSSKiller, ESET Online Scan, ESET SysRescue, SVRT, plus quite a few more tools, all to no avail. I have a fully licensed version of Malwarebytes Installed & up to date. I am unable to have GMER or ASWMbr complete a scan without ending up at a BSOD. Error is: IRQ Less than or not equal. FRST64 scans show ADS coming from zipped tools on my Desktop. FRST64 will not update despite it advising that an update has been found. The Desktop is Shared to Public. The first warning I received that something was amiss was a mass (hundreds) of WMI or WMIC warnings over a few seconds courtesy of Kaspersky Total Security. I have re-partitioned and reformatted my drives (SSD+HDD) multiple times along with multiple re-installs of Windows. Windows Defender updates show as downloading and installing, however, as you will see from The FRST logs they do not actually seem to be being applied. Malwarebytes Active Protection intermittently disables itself and I am unable to restart it without a reboot. I have also re-flashed the BIOS and updated the Firmware. The initial Spectre/Meltdown Patches have been applied. Still waiting for the latest patches. I strongly suspect a Rootkit\Backdoor of some description, especially given the inability to scan fully with GMER and ASWMbr. (Note: The initial "Quick Scan on startup of GMER does complete.) Other symptoms include: Cursor movement with no local user interaction. Documents closing for no reason. The HDD has vanished on several occasions, requiring me to re-partition and re-format it via Linux Shell. Inability to obtain and maintain a VPN connection. Several "Unknown User" accounts on some files when viewing the Security Tab in Windows. What seem to be intermittent DDoS attacks. Changes in Router Settings without any action by me (or any other local user.) Evidence of an Apparent work around for DEP (possibly ASLR) by utilizing Compatibility Mode. DLL Files located in various folders with the text reading Right to Left rather than Left to Right. Presence of an inordinate number of Windows XP and Vista files. On booting to Windows a text file opens from C:\Programdata\Startup called errorlog.txt which has always been blank. Incredibly slow Internet connections on a very fast network. Despite deliberately disabling OneDrive, connections being established to multiple OneDrive and SkyDrive accounts which are not known. Files disappearing for no valid reason. Anti-Virus appears to be working, however, on checking with Kaspersky following submitting diagnostics & receiving emails stating no problem was found, they tell me the submitted data was "Unreadable." Complete loss of Internet functionality at times, for no apparent reason. I have also found what appears to be a Ransomware Demand embedded in Fontcache when using Adlice PE Viewer. The payment amount was 0.37 Bitcoin. Also found in this file was the text string "This Dynasty." When using TCPView, upon starting there may be many tens of connections that rapidly drop off after a few seconds. Autoruns shows an IE Image Hijack. The version of IE reported by most diagnostic software shows as 5.0. Changes in location of the cursor whilst typing without palm interaction with the touchpad. There are probably more pointers that I've forgotten. I did locate the Malwarebytes reports, however, I am unable to attach them in their native *.json format. I've converted a JSON to TXT and attached that. I also noted that in C:\programdata I have the subdirectories "Malwarebytes" and "Malwarebytes' Anti-Malware (Portable)" Thanks in advance for your time. It's much appreciated! Thanks, Mal FRST.txt Addition.txt Last_MWB_Scan_JSON_Renamed_TXT.txt
  13. Hi, i'm going to do a windows clean install and i have already analiced my pc with my antivirus and with malwarebytes, i have also used a couple of cleaners. malwarebytes found a couple o malwares but i have already removed they. ir order to be completely sure that there aren't any malware in my computer i was thinking in use a bootable antivirus (i think that a low level format will be to much time for the hdd of 1 tb, how much time do you think that it will need? its a good idea to do it?) i have never had a really bad malware in my computer and i have used antivirus from the first day but my question is: do you think that is a good idea to use a bootable antivirus? because since i'm going to format i wanted to be sure that my pc is totally clean. i know that there are rootkits that are almost invisible for the common security software. although i have my pc scanned and nothing was found, do you thing that a bootable antivirus could remove something that have not been found yet? or the only thing i can do is a low level format?
  14. I have tried many different antivirus programs to try to get rid of a trojan called Win32/Nevoros.B!Rakr. Its main file is one called isowebi.exe The main problem is the file folder and all files in it are protected. There is no way to change the name, edit, delete. Taskkill cannot stop, or cancel the operations this application does. Because the folder and all contents are protected my one trick was to lock out new programs or folders it created so it couldn't find them again yet that means leaving them on the system. The program loads grenades, touchy, other svc's for the net, and even bit coin mining programs. Used malware bytes rootkit beta didn't work either. The only thing I can think to do is to create a new window boot file, or edit the one I have, but not really sure if that will work.
  15. Have good reason to believe that current laptop is infected, my phone and other laptop have been infected and I have had to send the other laptop to repair, and my phone to be flashed. Current laptop is windows 8 Lenovo z50, have done Lenovo reset from the Lenovo button, when running the laptop a large amount of GB is already used, battery life is terrible and does not charge past 58%, and then drops to 5% in a few minutes after unplugging (however the laptop is 3 years old), I have tried installing Mbam anti Rootkit, it installed successfully but doesn’t update (failed to resolve host) and the internet connection is working. Have also installed GMER and it starts to scan, but then crashes. I would just like help in detecting if there is a Rootkit, and possible ways to remove it or would I have to get the bios flashed? Any help would be greatly appreciated! Thank you.
  16. Good afternoon and Happy New Year! I *just* got a new laptop from Dell - Inspirion 7370 as my previous laptop was aging and seemed to have it's own infections. As soon as I signed into my Microsoft account to install everything, files that synced from prior computer appear to have installed on my new one. I can tell because the packages such as Microsoft Photos, Edge, etc. are named the same as my prior computer and they have dates all prior to when this my current laptop was even created. I've already gone through resetting, clean install, etc, but nothing thus far has worked. I have the option of sending this back to Dell for them to try to repair, but I'd be without my laptop for 12 days. I'm hoping that by posting here, if it is a malware issue, the fine experts might be able to save the time, money, and agony over sending this thing to Dell. I may end up trying to just send it back entirely if we don't make any headway here. So, I tried re-installing Malware Bytes (I have a premium account) but it could not connect and so I ran the MB-Clean which seems to not have been able to get uninstall it. I've pasted that log, as well as the FRST Log and Addition log. I look forward to working with an expert helper closely and will follow all instructions you provide - I know your time is valuable and I sincerely appreciate in advance any help I may receive. Thank you!! PhxGuy FRST.txt Addition.txt mb-clean-results.txt
  17. Hello there, One of my machines using running on Windows Vista SP2 has a semi-serious problems, even i cannot name it. This is the final chance for me to figure out whether i'm safe or not. Here is the issue. I came across a malware a few years ago which is infected my machine through a non-secure JAVA web applet. After this infection, i immediately took some actions and tried neutralizing malware and cleaning as well, i also used Malwarebytes 1.x and 2.x series. After some years have passed, i still noticed that the nasty and non-existent registry entry of this malware is still visible by regedit, and GMER. I had no abnormal activity since then, and tried numerous rootkit removers listed below with following results: - GMER: Shows hidden driver service highlighted red but unable to remove / disable because it's not existed in fact (IMHO). - Sophos Anti-Rootkit: No malware is found, system is clean. - BitDefender Anti-Rootkit: No malware is found, system is clean (scan took very short though, not sure why). - Kaspersky TDSS Remover: No malware is found, system is clean. - Rootkit Hook Analyzer: No malware is found, system is clean. - Symantec TDSS Fix Tool: No malware is found, system is clean. -...and finally Malwarebytes Anti-Rootkit BETA along with Malwarebytes Premium (3.3.1) edition: System is clean, no malware is found. Although almost all of major removers say that the system is clean, i'm so picky that i have no idea why regedit and GMER display the presence of malware (PragmaXXXXX - random numbers), especially regedit shows error immediately when i click on this key as if it does NOT exist, but i can't do anything even i try a lot of methods including running regedit under SYSTEM account, running offline registry editor using recovery disc, and using command prompt. It seems a kind of very strange glitch in registry file, and it cannot be removed there eventhough the entry (PramaXXXXX) is shown. I'm attaching all the screenshots that would help on describing the issue, along with FRST log, addition.txt log and MBAM Anti-Rootkit log file. I'd be so grateful if there is any additional steps to take other than formatting the whole drive, as i have a lot of documents and installations with senstive configurations. Thanks in advance! Addition.txt FRST.txt system-log.txt
  18. Hello I seem to have an infection on my windows 8.1 with at least a ((Rootkit.Smartservice)) and a (Trojan). I'd appreciate your help. Multi (Windows Process Manager) tasks used to appear in Task Manager, but not anymore after I changed their permissions. However, everytime I start my Windows I find in Task Manger a process called (msdpguvsrv.exe), sometimes being the first task for CPU and Disk. It is Located in C:\windows/Temp, I managed to stop it with a program but it won't get deleted or quarantined. I also find in C:\windows/Temp, a folder called (msidntfs), within it are 2 files (cert.db, SecureTrust Network Root CA 2.cer). I don't know if that is related. Within the Windows folder I found The Malware (AutoKMS_VL_ALL) Folder, and The (autokms_vl_all.exe) Malware File, and deleted them. My current situation is.. - EmsisoftEmergencyKit: Rootkit.SmartService : C:\Windows\System32\Drivers\vmrgknqt.sys Gen:Variant.Razy.227680 : C:\Windows\System32\config\systemprofile\AppData\Local\vmtdnlh\vmtdnlh.exe Android.Trojan.Downloader.KZ : C:\Users\USER\AppData\Local\utcomdl\download\PornoHub.3gp.apk - Avast anti rootkit: Service rtkoep C:\Windows\system32\drivers\vmrgknqt.sys **LOCKED** 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xffffcf8006880770] 3 CLASSPNP.SYS[fffff8000094cabb] -> nt!IofCallDriver -> [0xffffcf800686eb20] 5 hpdskflt.sys[fffff80000e9542b] -> nt!IofCallDriver -> [0xffffcf80061b4e50] 7 ACPI.sys[fffff800004025f1] -> nt!IofCallDriver -> \Device\0000002e[0xffffcf80061987f0] - Malwarebytes: now doesn't detect any problem - AdwCleaner: now doesn't detect any problem - Zemana AntiMalware: now doesn't detect any problem - hitmanpro: now doesn't detect any problem, but _except one time_ it hangs on 99% or sometimes less - mbar: doesn't start - gmer: doesn't start - Kaspersky tdss killer: doesn't start - RogueKiller: doesn't start, and give a message "Windows cannot access the specified device, path, or file"
  19. I am unable to get the Rootkit Scan feature in Premium to stay ticked when I move the slider to ON. If I exit the program, when I go back, it is OFF again. Even if I do NOT exit the program and just click on another tab, when I go back to the PROTECTION tab, it is OFF again. Neither am I am to set STARTUP to delay by 15 seconds. Again, I turn Delay ON with the slider and enter 15 seconds, but same things happens, when I leave the tab, it turns OFF again. I have reinstalled this program, and it has NOT corrected the problem. Thanx for any help.
  20. When I tried scanning for rootkits it seemed to have stopped even though the timer is still ticking. I tried once with full scan and the second time with just rootkit. Both scans seem to have stopped on the same file. I waited between 30 mins to an hour each attempt but the scan never moved past the item. I tried threat scanning and it worked perfectly. What can I do to solve the problem? mb-check-results.zip
  21. Threat scan results: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 1/14/18 Scan Time: 11:20 AM Log File: fc0fb9b6-f95f-11e7-88f2-1c1b0d63b3b0.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.262 Update Package Version: 1.0.3693 License: Premium -System Information- OS: Windows 10 (Build 16299.192) CPU: x64 File System: NTFS User: User-PC\User -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 313979 Threats Detected: 3 Threats Quarantined: 0 (No malicious items detected) Time Elapsed: 13 min, 35 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 3 PUP.Optional.BundleInstaller, C:\USERS\USER\APPDATA\LOCAL\TEMP\BIT8ED6.TMP.EXE, No Action By User, [19], [458026],1.0.3693 PUP.Optional.MailRu, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\SyncData.sqlite3, No Action By User, [611], [477962],1.0.3693 PUP.Optional.MailRu, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, No Action By User, [611], [477962],1.0.3693 Physical Sector: 0 (No malicious items detected) ------------------------------------------------ From what I can tell this malware is at Least a year old. (looking in public forums - i dont mean a year on my computer) I can't think of any reason why Malwarebytes (which i pay for) hasn't provided a fix for it within Multiple updates. Per forum its been mentioned to MB prior. I found a post in here somewhere from about a year ago providing a fix, but it's probably over 50 steps (beyond any malware fix I've seen, pretty absurd)...and since it was a year ago... I'd REeeeeeeally like to think the MB team has a better solution to remedy this...at least for paying customers. Please advise.
  22. I scanned my pc with Mwb and I had numerous infections popup, the first time it was able to clear all but two. Both were rootkit.agent and the object type was registry key and registry value. I rebooted and tried again and this time it worked. However, everytime i reboot both the malware come back and shows up when i rescan. Furthermore if i use my pc a little and scan, it comes with the 2 rootkits and additional viruses. I have tried several programs but some of them arent even able to identify the rootkits. Any help would be appreciated. Thanks
  23. So the last known programs installed, were on the 18 of this month. Im running windows 10, and i made the mistake of thinking it could handle me torrenting. As I've done it countless times before, on win7 ult and didnt encounter a thing wrong. Anyways, long story short, im infected with something. I've ran countless programs to remedy it to no avail. unhackme, malwarebytes, adw cleaner, roguekiller, and hitmanpro, all based on this websites recommendation. im still infected. upon going through, nearly every folder in my drive (fresh install of win10 so i dont have much)i came across 3 folders that i had no control over, and couldnt delete. dtmhnlx, igfxmtc,wmhtcir. my guess is mining programs, but FRST revealed it to be a trojan. Although im still needing help on what to do to erase this. I want to play my games again without my cpu and gpu hitting max load, for games that arent even modern....also i should note, windows reset, and restore wont work at all. ive put win8 iso on dvd and tried to run on pc but wont read it at all, even disable secure boiot and rearranged the boot order. nothing works. if this doesnt work then i'll have to resort to taking out the hdd and doing a complete partition wipe of it, which i dont want to do because im just lazy. someone please help?
  24. For the past 2 weeks I've been looking for help on removing this virus that I've obtained due to my stupidity. What this virus does is that an exe that has different names after resetting my computer every time will appear in task manager and in the system32 folder, at the moment, it's called wdesziusvc.exe; when i hover my cursor over it it, it says TOSHIBA CORPORATION. After that appears, I won't be able to make restore points, download certain anti-viruses, and go into a recovery environment the normal way (I'd have to tap Shift + F8 upon start up). if wdesziusvc has internet access, it'll use my computer's resources to bring forth another exe called igfxmtc, which will run in task manager and have it's own folder in Appdata/Local folder which i cannot access nor delete. In the task manager, igfxmtc doesn't seem to do anything; idk what it's for but after a few after that, wdesziusvc will use resources again to bring forth this thing called Windows Process Manager (32-bit) with multiple clients, which slows down my computer by A LOT and also has it's own folder, wibxtrg. If i reset my computer to factory settings, you know, wipe everything, They all just come back with with different names except for igfxmtc. I know all this stuff because of the 2 weeks i've had with this problem. Here are some pictures and a FRST and Addition txt attatched. If there's anyone willing to help me out it'll mean a lot to me. 1.) I do have a flash drive that's bigger than 4GB 2.) I do have access to a clean PC Addition.txt FRST.txt
  25. Hello, I have found on the task manager five windows process managers (32 bit) Every time I launch a game on steam, one or two of them would suddenly jump from 60% to 80% CPU usage. I have searched for a solution, scanned with malware-bytes free and adware cleaner, but nothing worked. Then I got mbar, but it just does not start. When I launch it, it would ask for administrator permission, and then nothing would happen. Malwarebytes log Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 12/22/17 Scan Time: 9:43 AM Log File: 6cf58efe-e726-11e7-901b-4ccc6a8170c6.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.262 Update Package Version: 1.0.3543 License: Free -System Information- OS: Windows 10 (Build 15063.786) CPU: x64 File System: NTFS User: MSI\Legitozone (H) -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 351463 Threats Detected: 5 Threats Quarantined: 3 Time Elapsed: 3 min, 52 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 5 PUP.Optional.RelevantKnowledge, C:\USERS\LEGITOZONE (H)\APPDATA\LOCAL\TEMP\~OSCD9C.TMP\RLXF.DLL, Removal Failed, [1136], [296186],1.0.3543 PUP.Optional.RelevantKnowledge, C:\USERS\LEGITOZONE (H)\APPDATA\LOCAL\TEMP\~OSCD9C.TMP\RLXG.DLL, Removal Failed, [1136], [296186],1.0.3543 PUP.Optional.Conduit, C:\USERS\LEGITOZONE (H)\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\SyncData.sqlite3, Replaced, [532], [454835],1.0.3543 PUP.Optional.Conduit, C:\USERS\LEGITOZONE (H)\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, Replaced, [532], [454835],1.0.3543 PUP.Optional.Trovi, C:\USERS\LEGITOZONE (H)\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, Replaced, [4703], [454808],1.0.3543 Physical Sector: 0 (No malicious items detected) (end) Adwarecleaner log # AdwCleaner 7.0.4.0 - Logfile created on Fri Dec 22 14:57:08 2017 # Updated on 2017/27/10 by Malwarebytes # Database: 12-21-2017.1 # Running on Windows 10 Home (X64) # Mode: scan # Support: https://www.malwarebytes.com/support ***** [ Services ] ***** No malicious services found. ***** [ Folders ] ***** PUP.Optional.Legacy, C:\ProgramData\Tencent PUP.Optional.Legacy, C:\ProgramData\Application Data\Tencent PUP.Optional.Legacy, C:\Users\All Users\Tencent ***** [ Files ] ***** No malicious files found. ***** [ DLL ] ***** No malicious DLLs found. ***** [ WMI ] ***** No malicious WMI found. ***** [ Shortcuts ] ***** No malicious shortcuts found. ***** [ Tasks ] ***** No malicious tasks found. ***** [ Registry ] ***** No malicious registry entries found. ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries. ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries. ************************* C:/AdwCleaner/AdwCleaner[C0].txt - [2112 B] - [2017/11/2 23:13:50] C:/AdwCleaner/AdwCleaner[C1].txt - [1556 B] - [2017/11/26 5:31:49] C:/AdwCleaner/AdwCleaner[C2].txt - [1564 B] - [2017/11/27 15:30:46] C:/AdwCleaner/AdwCleaner[S0].txt - [2059 B] - [2017/11/2 23:13:30] C:/AdwCleaner/AdwCleaner[S1].txt - [1590 B] - [2017/11/26 5:25:15] C:/AdwCleaner/AdwCleaner[S2].txt - [1449 B] - [2017/11/26 5:28:29] C:/AdwCleaner/AdwCleaner[S3].txt - [1414 B] - [2017/11/27 15:29:53] C:/AdwCleaner/AdwCleaner[S4].txt - [1423 B] - [2017/12/1 21:59:41] C:/AdwCleaner/AdwCleaner[S5].txt - [1491 B] - [2017/12/2 15:42:21] C:/AdwCleaner/AdwCleaner[S6].txt - [1559 B] - [2017/12/6 19:20:20] C:/AdwCleaner/AdwCleaner[S7].txt - [1627 B] - [2017/12/10 2:8:35] C:/AdwCleaner/AdwCleaner[S8].txt - [1823 B] - [2017/12/22 14:35:53] ########## EOF - C:\AdwCleaner\AdwCleaner[S9].txt ##########
×

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.