hi,
i ran aswmbr because my comp has been hacked. thought there may be a rootkit keylogger or something of the like.
22:53:43.574 OS Version: Windows 6.0.6002 Service Pack 2
22:53:43.574 Number of processors: 2 586 0x403
22:53:43.575 ComputerName: xxxxxxx UserName: xxxx
22:53:44.919 Initialize success
22:53:54.973 Disk 0 (boot) \Device\Harddisk0\DR0 → \Device\Ide\IdeDeviceP2T0L0-2
22:53:54.977 Disk 0 Vendor: WDC_WD2500KS-00MJB0 02.01C03 Size: 238475MB BusType: 3
22:53:55.001 Disk 0 MBR read successfully
22:53:55.005 Disk 0 MBR scan
22:53:55.009 Disk 0 Windows VISTA default MBR code
22:53:55.016 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 125 MB offset 63
22:53:55.020 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238348 MB offset 258048
22:53:55.027 Disk 0 scanning sectors +488394752
22:53:55.083 Disk 0 scanning C:\Windows\system32\drivers
22:54:02.331 Service scanning
22:54:18.986 Modules scanning
22:54:45.161 Disk 0 trace - called modules:
22:54:45.186 ntoskrnl.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x8405b1f8]<<
22:54:45.187 1 nt!IofCallDriver → \Device\Harddisk0\DR0[0x850a1200]
22:54:45.189 3 CLASSPNP.SYS[885a68b3] → nt!IofCallDriver → [0x84a15a70]
22:54:45.190 5 acpi.sys[87f6c6bc] → nt!IofCallDriver → \Device\Ide\IdeDeviceP2T0L0-2[0x84a1b030]
22:54:45.191 \Driver\atapi[0x84a00470] → IRP_MJ_CREATE → 0x8405b1f8
22:54:45.191 Scan finished successfully
22:56:51.519 Disk 0 MBR has been saved successfully to “C:\Users\xxxx\Desktop\MBR.dat”
22:56:51.529 The log file has been saved successfully to “C:\Users\xxxx\Desktop\aswMBR.txt”
are these entries malicious?
the hackers initially gathered info from google chrome’s appdata database files… after i disabled chome’s storing of history (+ start in incognito mode), they have moved on to other avenues to gather information. i assume a keylogger is involved because some have been quoting my search history… though they may have found another way to get search history.
i use windows firewall and a router firewall (although some ports have been opened for the use of various applications) as well as spybot’s teatimer