Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Hijack which I cannot fix


  • This topic is locked This topic is locked
16 replies to this topic

#1 BallisticBrian

BallisticBrian

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 15 June 2010 - 06:47 AM

Hi all, 2nd time to type this as I lost it all due to having the wrong version of Hijack this...

ANyway, Windows XP SP3, IE ver 8...

Cannot perfrom Windows Update, checked hosts file is blank. Windows update at http://www.update.microsoft.com/microsoftu...microsoftupdate results in error code [Error number: 0x80072EFF] "The website has encountered a problem and cannot display the page you are trying to view. The options provided below might help you solve the problem." The windows update icon doesn't work, the scheduled windows update program runs but it does not appear to be running updates.

2ndly, browser search engine results from at least Google and Bing are hijacked taking me to random sites, other search engines such as Ask.com, sites which are no longer there (500 error) or even worse, sites with other malware, "your PC needs a scan" scams.

Adaware cannot find the problem, nor can the BT Internet version of McAfee, nor the online free scan from Norton, nor Malwarebytes anti malware, although it did find 2 other trojans and 2 other problems.

Any help appreciated,

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 12:39:37, on 15/06/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Creative\SBAudigy2\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2\DVDAudio\CTDVDDet.EXE
C:\WINDOWS\system32\CTHELPER.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\OpenOffice.org 3\program\soffice.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\OpenOffice.org 3\program\soffice.bin
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
c:\PROGRA~1\mcafee\SITEAD~1\mcsacore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\MICROS~2\OFFICE11\OUTLOOK.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [CTSysVol] C:\Program Files\Creative\SBAudigy2\Surround Mixer\CTSysVol.exe /r
O4 - HKLM\..\Run: [CTDVDDET] C:\Program Files\Creative\SBAudigy2\DVDAudio\CTDVDDet.EXE
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [SBDrvDet] C:\Program Files\Creative\SB Drive Det\SBDrvDet.exe /r
O4 - HKLM\..\Run: [UpdReg] C:\WINDOWS\UpdReg.EXE
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil10e.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: OpenOffice.org 3.1.lnk = C:\Program Files\OpenOffice.org 3\program\quickstart.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab
O16 - DPF: {32C3FEAE-0877-4767-8C20-62A5829A0945} (FBootloaderAX) - http://static.ak.facebook.com/fbplugin/win...fbootloader.cab
O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/vers...vex-2.2.5.0.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1275145123906
O16 - DPF: {A9CF3378-D60E-40A8-927D-7EA0D5B0AA98} (Bonusprint Image Uploader Version 6.x Control) - http://webalbum.bonusprint.com/ukipc01/dow...geUploader6.cab
O16 - DPF: {BF985246-09BF-11D2-BE62-006097DF57F6} (SimCityX Control) - http://simcity.ea.com/play/classic/SimCityX.cab
O16 - DPF: {C1FDEE68-98D5-4F42-A4DD-D0BECF5077EB} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/eB...l_v1-0-31-0.cab
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: McAfee SiteAdvisor Service - McAfee, Inc. - c:\PROGRA~1\mcafee\SITEAD~1\mcsacore.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe

--
End of file - 8794 bytes

Hi, while waiting for responses, I also tried this mbr thingy and it came up with this:

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A60FD01]<<
kernel: MBR read successfully
user & kernel MBR OK



does this help?

Here is my output from virus total for user32.dll

File user32.bad received on 2010.06.17 21:52:51 (UTC)
Current status: finished

Result: 1/41 (2.44%)
Compact Print results Antivirus Version Last Update Result
a-squared 5.0.0.26 2010.06.17 -
AhnLab-V3 2010.06.17.02 2010.06.17 -
AntiVir 8.2.2.6 2010.06.17 -
Antiy-AVL 2.0.3.7 2010.06.17 -
Authentium 5.2.0.5 2010.06.17 -
Avast 4.8.1351.0 2010.06.17 -
Avast5 5.0.332.0 2010.06.17 -
AVG 9.0.0.787 2010.06.17 -
BitDefender 7.2 2010.06.17 -
CAT-QuickHeal 10.00 2010.06.17 -
ClamAV 0.96.0.3-git 2010.06.17 -
Comodo 5136 2010.06.17 -
DrWeb 5.0.2.03300 2010.06.17 -
eSafe 7.0.17.0 2010.06.17 Win32.Banker
eTrust-Vet 36.1.7642 2010.06.17 -
F-Prot 4.6.1.107 2010.06.17 -
F-Secure 9.0.15370.0 2010.06.17 -
Fortinet 4.1.133.0 2010.06.17 -
GData 21 2010.06.17 -
Ikarus T3.1.1.84.0 2010.06.17 -
Jiangmin 13.0.900 2010.06.15 -
Kaspersky 7.0.0.125 2010.06.17 -
McAfee 5.400.0.1158 2010.06.17 -
McAfee-GW-Edition 2010.1 2010.06.16 -
Microsoft 1.5902 2010.06.17 -
NOD32 5205 2010.06.17 -
Norman 6.05.06 2010.06.17 -
nProtect 2010-06-17.01 2010.06.17 -
Panda 10.0.2.7 2010.06.17 -
PCTools 7.0.3.5 2010.06.17 -
Prevx 3.0 2010.06.17 -
Rising 22.52.03.04 2010.06.17 -
Sophos 4.54.0 2010.06.17 -
Sunbelt 6463 2010.06.17 -
Symantec 20101.1.0.89 2010.06.17 -
TheHacker 6.5.2.0.299 2010.06.17 -
TrendMicro 9.120.0.1004 2010.06.17 -
TrendMicro-HouseCall 9.120.0.1004 2010.06.17 -
VBA32 3.12.12.5 2010.06.17 -
ViRobot 2010.6.14.3884 2010.06.17 -
VirusBuster 5.0.27.0 2010.06.17 -
Additional information
File size: 578560 bytes
MD5 : b26b135ff1b9f60c9388b4a7d16f600b
SHA1 : 08fe9ff1fe9b8fd237adedb10d65fb0447b91fe5
SHA256: acd0ae7b4d5f871e148276c6cc4ae3a216e33f67fc78d827c16986e1f945438c
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0xB217
timedatestamp.....: 0x4802A11B (Mon Apr 14 02:11:07 2008)
machinetype.......: 0x14C (Intel I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x5F283 0x5F400 6.65 25051dc5344bd71f517de4813f1397ed
.data 0x61000 0x1180 0xC00 2.38 28fc1d764bf4ed37bb349bca5991a1ff
.rsrc 0x63000 0x2A088 0x2A200 4.97 818c69d1407c2f66058a8171086b2fba
.reloc 0x8E000 0x2DE4 0x2E00 6.77 68ebe5a2d822be0663a3e935b39d0bae

( 0 imports )


( 0 exports )

TrID : File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
ThreatExpert: http://www.threatexpert.com/report.aspx?md...388b4a7d16f600b
ssdeep: 6144:Q7ML7NoIlCGJPY2Z2AlptXbgz0+Q4odCGfTnpbEdd/fudqsa0jucQgBMacCGNoEd:foHEHblpWz0jPLhEfgP6WMDoEJY
sigcheck: publisher....: Microsoft Corporation
copyright....: Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: Windows XP USER API Client DLL
original name: user32
internal name: user32
file version.: 5.1.2600.5512 (xpsp.080413-2105)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned

PEiD : -
RDS : NSRL Reference Data Set




Anyone know what to try next? Anyone? Anyone? bueller? bueller? bueller? bueller? ANyone?

Merged 3 posts. ~ OB

Edited by Orange Blossom, 18 June 2010 - 12:35 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 20 June 2010 - 12:52 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  1. Do not run any other tool untill instructed to do so!
  2. Do not Attach logs unless I ask you to.
  3. Tell me about any problems that have occurred during the fix.
  4. Tell me of any other symptoms you may be having as these can help also.
  5. Do not run anything while running a fix.
  6. Do not run any other tool untill instructed to do so!


In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

Note** If you are having problems posting the complete log into this thread upload them here http://www.rapidshare.com/ and post the links in this thread

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

I would like to get a better look at your system, please do the following so I can get some more detailed logs.


DeFogger:
    Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
    • The application window will appear
    • Click the Disable button to disable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger may ask you to reboot the machine, if it does - click OK
    Do not re-enable these drivers until otherwise instructed.
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.

Download DDS:
    Please download DDS by sUBs from one of the links below and save it to your desktop:


    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.
    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
      • DDS.txt
      • Attach.txt
    • A window will open instructing you save & post the logs
    • Save the logs to a convenient place such as your desktop
    • Copy the contents of both logs & post in your next reply

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


information and logs:
    In your next post I need the following
      1.logs from DDS
      2.RKUnHooker
      3.let me know of any problems you may have had

Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 21 June 2010 - 04:49 AM

Hi Gringo, thanks for your help.

I had no problems running the files.... here are all the logs requested...




DDS (Ver_10-03-17.01) - NTFSx86
Run by Ballistic at 10:38:00.45 on 21/06/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.2047.1169 [GMT 1:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
svchost.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Creative\SBAudigy2\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2\DVDAudio\CTDVDDet.EXE
C:\WINDOWS\system32\CTHELPER.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\OpenOffice.org 3\program\soffice.exe
C:\Program Files\OpenOffice.org 3\program\soffice.bin
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
c:\PROGRA~1\mcafee\SITEAD~1\mcsacore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
c:\PROGRA~1\mcafee\msc\mcshell.exe
C:\Documents and Settings\Ballistic\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 5.0\reader\activex\AcroIEHelper.ocx
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
mRun: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [CTSysVol] c:\program files\creative\sbaudigy2\surround mixer\CTSysVol.exe /r
mRun: [CTDVDDET] c:\program files\creative\sbaudigy2\dvdaudio\CTDVDDet.EXE
mRun: [CTHelper] CTHELPER.EXE
mRun: [SBDrvDet] c:\program files\creative\sb drive det\SBDrvDet.exe /r
mRun: [UpdReg] c:\windows\UpdReg.EXE
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [ATICCC] "c:\program files\ati technologies\ati.ace\CLIStart.exe"
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\docume~1\ballis~1\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 3\program\quickstart.exe
uPolicies-explorer: NoActiveDesktop = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} - hxxp://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
DPF: {32C3FEAE-0877-4767-8C20-62A5829A0945} - hxxp://static.ak.facebook.com/fbplugin/win32/axfbootloader.cab
DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.0.cab
DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} - hxxp://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1275145123906
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {A9CF3378-D60E-40A8-927D-7EA0D5B0AA98} - hxxp://webalbum.bonusprint.com/ukipc01/downloads//ImageUploader6.cab
DPF: {BF985246-09BF-11D2-BE62-006097DF57F6} - hxxp://simcity.ea.com/play/classic/SimCityX.cab
DPF: {C1FDEE68-98D5-4F42-A4DD-D0BECF5077EB} - hxxp://tools.ebayimg.com/eps/wl/activex/eBay_Enhanced_Picture_Control_v1-0-31-0.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-5-21 64288]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2010-1-5 214664]
R2 BjsPort;Canon BJ Scanner Port Driver;c:\windows\system32\drivers\BjsPort.sys [2010-4-28 14656]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-2-4 1352832]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\progra~1\mcafee\sitead~1\mcsacore.exe [2010-2-19 93320]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2010-2-19 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2010-2-19 144704]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2010-2-19 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2010-2-19 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2010-2-19 35272]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2010-2-19 40552]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-5-12 135664]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2010-2-19 34248]

=============== Created Last 30 ================

2010-06-21 09:32:06 0 ----a-w- c:\documents and settings\ballistic\defogger_reenable
2010-06-15 13:15:12 77312 ----a-w- c:\windows\mbr.exe
2010-06-15 10:51:30 0 d-----w- c:\program files\common files\xing shared
2010-06-15 10:50:43 0 d-----w- c:\program files\common files\Real
2010-06-10 15:20:37 0 d-----w- c:\docume~1\ballis~1\applic~1\Malwarebytes
2010-06-10 15:20:28 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-06-10 15:20:27 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-06-10 15:20:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-06-10 15:20:26 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-29 15:10:12 0 d-----w- c:\program files\Trend Micro
2010-05-26 13:58:08 0 d-----w- c:\docume~1\ballis~1\applic~1\Facebook
2010-05-25 13:24:26 614314 ----a-w- c:\windows\umcat_01.db
2010-05-25 11:49:59 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-25 11:45:54 0 d-----w- c:\program files\common files\Symantec Shared
2010-05-25 11:42:58 0 d-----w- c:\windows\system32\drivers\NSS
2010-05-25 11:42:57 0 d-----w- c:\program files\Norton Security Scan
2010-05-25 11:42:57 0 d-----w- c:\docume~1\alluse~1\applic~1\Symantec
2010-05-25 11:42:57 0 d-----w- c:\docume~1\alluse~1\applic~1\Norton
2010-05-25 11:42:52 0 d-----w- c:\program files\NortonInstaller
2010-05-25 11:42:52 0 d-----w- c:\docume~1\alluse~1\applic~1\NortonInstaller
2010-05-25 09:51:16 664 ----a-w- c:\windows\system32\d3d9caps.dat

==================== Find3M ====================

2010-06-15 10:50:49 348160 ----a-w- c:\windows\system32\msvcr71.dll
2010-06-15 10:50:48 499712 ----a-w- c:\windows\system32\msvcp71.dll
2010-06-11 14:53:38 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-05-21 14:53:17 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-21 14:53:15 15880 ----a-w- c:\windows\system32\lsdelete.exe

============= FINISH: 10:39:18.18 ===============








============================================================================================================================


RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0xBFAB3000 C:\WINDOWS\System32\ati3duag.dll 2678784 bytes (ATI Technologies Inc. , ati3duag.dll)
0xB9CA5000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 2125824 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2066816 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2066816 bytes
0x804D7000 RAW 2066816 bytes
0x804D7000 WMIxWDM 2066816 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xBFD41000 C:\WINDOWS\System32\ativvaxx.dll 1290240 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0x99CC6000 C:\WINDOWS\system32\drivers\ha10kx2k.sys 954368 bytes (Creative Technology Ltd, Creative EMU10KX HAL (WDM))
0xB9AC6000 C:\WINDOWS\System32\drivers\dmboot.sys 802816 bytes (Microsoft Corp., Veritas Software, NT Disk Manager Startup Driver)
0x99BE6000 C:\WINDOWS\system32\drivers\ctac32k.sys 647168 bytes (Creative Technology Ltd, Creative AC3 SW Decoder Device Driver (WDM))
0xBA635000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0x99A4E000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xB0A02000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xB9BDA000 C:\WINDOWS\system32\drivers\ctaud2k.sys 376832 bytes (Creative Technology Ltd, Creative WDM Audio Device Driver)
0x99B5A000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0x97396000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xBFA1A000 C:\WINDOWS\System32\ati2cqag.dll 315392 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xBFA67000 C:\WINDOWS\System32\atikvmag.dll 311296 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xBF9D6000 C:\WINDOWS\System32\ati2dvag.dll 278528 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0x99A1B000 C:\WINDOWS\system32\drivers\mfehidk.sys 208896 bytes (McAfee, Inc., Host Intrusion Detection Link Driver)
0xB0A60000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xBA779000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0x9757D000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xBA608000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB9B8A000 C:\WINDOWS\system32\drivers\ctoss2k.sys 180224 bytes (Creative Technology Ltd., Creative OS Services Driver (WDM))
0x965A3000 C:\WINDOWS\system32\drivers\kmixer.sys 176128 bytes (Microsoft Corporation, Kernel Mode Audio Mixer)
0x99ABE000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x99B0B000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0x99B33000 C:\WINDOWS\System32\Drivers\Mpfp.sys 159744 bytes (McAfee, Inc., McAfee Personal Firewall Plus Driver)
0xBA723000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0x999F5000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0x99DAF000 C:\WINDOWS\system32\drivers\hap17v2k.sys 147456 bytes (Creative Technology Ltd, Creative EMU10KX-P17v HAL (WDM))
0xB9BB6000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB9C36000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB9C5A000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0x99AE9000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x99CA4000 C:\WINDOWS\system32\drivers\emupia2k.sys 139264 bytes (Creative Technology Ltd, E-mu Plug-in Architecture Driver (WDM))
0x806D0000 ACPI_HAL 131840 bytes
0x806D0000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0x99C84000 C:\WINDOWS\system32\drivers\ctsfm2k.sys 131072 bytes (Creative Technology Ltd, SoundFont® Manager (WDM))
0xBA6EB000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xBA749000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xBA5EE000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xBA70B000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xBA6C2000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB0AA1000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x97768000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xB9C7D000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xB9C91000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0x99BB3000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF9C4000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0x96BE9000 C:\WINDOWS\system32\drivers\mfeavfk.sys 73728 bytes (McAfee, Inc., Anti-Virus File System Filter Driver)
0xBA6D9000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xBA768000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xB0A90000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0x9A01D000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xBAAC8000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xBAAF8000 C:\WINDOWS\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xBA8B8000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0x9A820000 C:\WINDOWS\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xBAB08000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xBA918000 Lbd.sys 61440 bytes (Lavasoft AB, Boot Driver)
0xBAAD8000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xB9EFC000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0x9ACD8000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xBA8C8000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xBA908000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xBAAA8000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xB220B000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xBA8E8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xBA928000 gagp30kx.sys 49152 bytes (Microsoft Corporation, MS Generic AGPv3.0 Filter for K8/9 Processor Platforms)
0xB21EB000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x9AC98000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xBAAB8000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xBA8D8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xB21FB000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xBAAE8000 C:\WINDOWS\system32\DRIVERS\SiSGbeXP.sys 45056 bytes (Silicon Integrated Systems Corp., NDIS 5.1 Miniport Driver for SiS191/SiS190 Ethernet Device)
0xBA8A8000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xB219B000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xB21CB000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xBA8F8000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0x9ACB8000 C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys 36864 bytes (Microsoft Corporation, IP FILTER DRIVER)
0x96899000 C:\WINDOWS\system32\drivers\mfesmfk.sys 36864 bytes (McAfee, Inc., System Monitor Filter Driver)
0xB21DB000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0x9ACA8000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0x964C3000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xB221B000 C:\WINDOWS\system32\DRIVERS\processr.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0x9A830000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x9AAE0000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xBACA8000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xBAC98000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0x9A6D1000 C:\WINDOWS\system32\drivers\mfebopk.sys 28672 bytes (McAfee, Inc., Buffer Overflow Protection Driver)
0xBAB28000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xBAC88000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xBAC90000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0x9AAF0000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x9AB00000 C:\WINDOWS\system32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0x9AAE8000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xBAB30000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xB22CE000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xB22C6000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0x9AAD8000 C:\WINDOWS\system32\DRIVERS\srvkp.sys 20480 bytes (Silicon Integrated Systems Corporation, SiS VGA Driver Manager)
0xB22D6000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xBACA0000 C:\WINDOWS\system32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0x9A6D9000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xB4433000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xB0D9D000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0x9719E000 C:\WINDOWS\system32\drivers\PfModNT.sys 16384 bytes (Creative Technology Ltd., PCI/ISA Device Info. Service)
0x97579000 C:\WINDOWS\system32\drivers\BjsPort.SYS 12288 bytes
0xBACB8000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xBADA4000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xB4FC1000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x9A8ED000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0x9C5AA000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xBAE52000 C:\WINDOWS\system32\drivers\ctprxy2k.sys 8192 bytes (Creative Technology Ltd, Creative Proxy Device Driver (WDM))
0xBADAC000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0x9C5AC000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xBADA8000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0x9C04B000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0x9C039000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0x9C049000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xBAE54000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x9C5AE000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xBADAA000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xB0ED5000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0x99ECC000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0x9AB67000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xBAE70000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
!!!!!!!!!!!Hidden driver: 0x8A60FAEA ?_empty_? 1302 bytes
0x8A60FD01 unknown_irp_handler 767 bytes
!!!!!!!!!!!Hidden driver: 0x8A5EAE30 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xBA70B000 WARNING: suspicious driver modification [atapi.sys::0x8A60FAEA]
0x05320000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 1052672 bytes
0x059A0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 1183744 bytes
0x03DE0000 Hidden Image-->CLI.Aspect.Welcome.Local.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 118784 bytes
0x03AD0000 Hidden Image-->CLI.Component.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 1200128 bytes
0x04EF0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 1249280 bytes
0x04C70000 Hidden Image-->CLI.Aspect.DeviceTV2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 1265664 bytes
0x061C0000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 151552 bytes
0x06220000 Hidden Image-->CLI.Aspect.WorkstationConfig.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 176128 bytes
0x04170000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 192512 bytes
0x05D80000 Hidden Image-->CLI.Aspect.VideoOverlay.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 2797568 bytes
0x06080000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 282624 bytes
0x03670000 Hidden Image-->LOG.Foundation.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x039F0000 Hidden Image-->ATICCCom.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x03C20000 Hidden Image-->DEM.Foundation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05310000 Hidden Image-->ACE.Graphics.VideoOverlay.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x058F0000 Hidden Image-->CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05950000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05970000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05A30000 Hidden Image-->DEM.Graphics.I0600.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05B00000 Hidden Image-->CLI.Aspect.DeviceProperty2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05AA0000 Hidden Image-->DEM.Graphics.I0602.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05AE0000 Hidden Image-->CLI.Aspect.DeviceProperty2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05AC0000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05C40000 Hidden Image-->CLI.Aspect.OverDrive2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x05C90000 Hidden Image-->CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 28672 bytes
0x03670000 Hidden Image-->LOG.Foundation.Shared.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 28672 bytes
0x03B10000 Hidden Image-->ATICCCom.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 28672 bytes
0x03670000 Hidden Image-->LOG.Foundation.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x03CB0000 Hidden Image-->ATICCCom.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x03D30000 Hidden Image-->CLI.Caste.Local.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x03DA0000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x06860000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x06A00000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x06A70000 Hidden Image-->CLI.Aspect.DeviceProperty2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x06F30000 Hidden Image-->CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x06F10000 Hidden Image-->CLI.Aspect.OverDrive2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 28672 bytes
0x036B0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 307200 bytes
0x03BA0000 Hidden Image-->CLI.Caste.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 307200 bytes
0x036B0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 307200 bytes
0x040F0000 Hidden Image-->CLI.Aspect.VeryLargeDesktop.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 307200 bytes
0x036B0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 307200 bytes
0x04A50000 Hidden Image-->ATIDEMGR.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 315392 bytes
0x065C0000 Hidden Image-->CLI.Aspect.IntegratedUMAFrameBuffer.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 315392 bytes
0x03E60000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 356352 bytes
0x06130000 Hidden Image-->CLI.Aspect.SmartGart.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 364544 bytes
0x05A50000 Hidden Image-->CLI.Aspect.SmartGart.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x058B0000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x03690000 Hidden Image-->CLI.Foundation.XManifestation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x03A10000 Hidden Image-->AEM.Foundation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x03C60000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05140000 Hidden Image-->CLI.Aspect.MultiVPU.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x04EB0000 Hidden Image-->CLI.Aspect.MultiVPU3.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x04EF0000 Hidden Image-->CLI.Aspect.MultiVPU2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05180000 Hidden Image-->CLI.Aspect.VeryLargeDesktop.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05260000 Hidden Image-->CLI.Aspect.DisplaysColour.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05220000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05330000 Hidden Image-->CLI.Aspect.SmartGart.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x052F0000 Hidden Image-->CLI.Aspect.VideoOverlay.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05370000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05350000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x054B0000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05490000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x054F0000 Hidden Image-->CLI.Aspect.DeviceLCD2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x054D0000 Hidden Image-->CLI.Aspect.DeviceLCD2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05570000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05840000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05860000 Hidden Image-->CLI.Aspect.OverDrive2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05930000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05C70000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x05CC0000 Hidden Image-->APM.Foundation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 36864 bytes
0x03690000 Hidden Image-->CLI.Foundation.XManifestation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 36864 bytes
0x03B70000 Hidden Image-->APM.Foundation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 36864 bytes
0x03B30000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 36864 bytes
0x03B50000 Hidden Image-->AEM.Foundation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 36864 bytes
0x06E30000 Hidden Image-->CLI.Aspect.VideoOverlay.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06AA0000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x069A0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x03690000 Hidden Image-->CLI.Foundation.XManifestation.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x03C30000 Hidden Image-->CLI.Component.Dashboard.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x03CF0000 Hidden Image-->AEM.Foundation.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x03D10000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06840000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06880000 Hidden Image-->CLI.Aspect.VeryLargeDesktop.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06AC0000 Hidden Image-->CLI.Aspect.DeviceLCD2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06B30000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06DD0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06DF0000 Hidden Image-->CLI.Aspect.DisplaysColour.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06EA0000 Hidden Image-->CLI.Aspect.VPURecover.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06E60000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06E80000 Hidden Image-->CLI.Aspect.SmartGart.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06EF0000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06F70000 Hidden Image-->CLI.Aspect.MultiVPU2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06F50000 Hidden Image-->CLI.Aspect.MultiVPU3.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x06F90000 Hidden Image-->CLI.Aspect.MultiVPU.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 36864 bytes
0x04AA0000 Hidden Image-->System.Management.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 380928 bytes
0x03A10000 Hidden Image-->CLI.Component.Systemtray.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 438272 bytes
0x050A0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 438272 bytes
0x044C0000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 446464 bytes
0x010E0000 Hidden Image-->CLI.Implementation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x015E0000 Hidden Image-->LOG.Foundation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x03C00000 Hidden Image-->CLI.Component.Runtime.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x04E90000 Hidden Image-->CLI.Aspect.MultiVPU3.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x04ED0000 Hidden Image-->CLI.Aspect.MultiVPU2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x04F10000 Hidden Image-->CLI.Aspect.MultiVPU.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05160000 Hidden Image-->CLI.Aspect.VeryLargeDesktop.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x052D0000 Hidden Image-->CLI.Aspect.VideoOverlay.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x052A0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05390000 Hidden Image-->CLI.Aspect.WorkstationConfig.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05420000 Hidden Image-->CLI.Aspect.DeviceCRT2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x053C0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05550000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05910000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x058D0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x05A80000 Hidden Image-->CLI.Aspect.WorkstationConfig.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 45056 bytes
0x010E0000 Hidden Image-->CLI.Implementation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 45056 bytes
0x015E0000 Hidden Image-->LOG.Foundation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 45056 bytes
0x010E0000 Hidden Image-->CLI.Implementation.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 45056 bytes
0x015E0000 Hidden Image-->LOG.Foundation.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 45056 bytes
0x06AF0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 45056 bytes
0x06E10000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 45056 bytes
0x06ED0000 Hidden Image-->CLI.Aspect.WorkstationConfig.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 45056 bytes
0x045A0000 Hidden Image-->CLI.Aspect.DeviceLCD2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 454656 bytes
0x054A0000 Hidden Image-->CLI.Aspect.Radeon3DLegacy.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 454656 bytes
0xBA928000 WARNING: Virus alike driver modification [gagp30kx.sys], 49152 bytes
0x05190000 Hidden Image-->CLI.Aspect.DeviceDFP2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 503808 bytes
0x06890000 Hidden Image-->CLI.Aspect.MultiVPU.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 512000 bytes
0x06790000 Hidden Image-->CLI.Aspect.MultiVPU2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 512000 bytes
0x06690000 Hidden Image-->CLI.Aspect.MultiVPU3.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 520192 bytes
0x055D0000 Hidden Image-->CLI.Aspect.DeviceCV2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x05200000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x01640000 Hidden Image-->LOG.Foundation.Service.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x03C40000 Hidden Image-->DEM.Graphics.I0601.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x051E0000 Hidden Image-->CLI.Aspect.Radeon3DLegacy.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x05240000 Hidden Image-->CLI.Aspect.DisplaysColour.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x05280000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x056E0000 Hidden Image-->CLI.Aspect.DeviceDFP2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x056A0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x05680000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x056C0000 Hidden Image-->CLI.Aspect.DeviceDFP2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 53248 bytes
0x01640000 Hidden Image-->LOG.Foundation.Service.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 53248 bytes
0x01640000 Hidden Image-->LOG.Foundation.Service.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 53248 bytes
0x03C10000 Hidden Image-->CLI.Foundation.Clients.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 53248 bytes
0x06B10000 Hidden Image-->CLI.Aspect.DeviceCV2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 53248 bytes
0x06D20000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 53248 bytes
0x06D50000 Hidden Image-->CLI.Aspect.DeviceDFP2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 53248 bytes
0x03B30000 Hidden Image-->CLI.Caste.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 61440 bytes
0x05890000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 61440 bytes
0x05A00000 Hidden Image-->CLI.Aspect.Radeon3DLegacy.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 61440 bytes
0x03A90000 Hidden Image-->CLI.Caste.Graphics.Shared.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 61440 bytes
0x03CD0000 Hidden Image-->CLI.Caste.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 61440 bytes
0x06DB0000 Hidden Image-->CLI.Aspect.Radeon3DLegacy.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 61440 bytes
0x04240000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 626688 bytes
0x04380000 Hidden Image-->CLI.Aspect.DeviceCRT2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 634880 bytes
0x051B0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x053F0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05460000 Hidden Image-->CLI.Aspect.DeviceCRT2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05520000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x055A0000 Hidden Image-->CLI.Aspect.DeviceCV2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05650000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05610000 Hidden Image-->CLI.Aspect.DeviceTV2.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x059B0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05B70000 Hidden Image-->CLI.Aspect.DeviceTV2.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x05BB0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 69632 bytes
0x03D60000 Hidden Image-->CLI.Caste.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x06A40000 Hidden Image-->CLI.Aspect.DeviceCRT2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x069D0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x06CA0000 Hidden Image-->CLI.Aspect.DeviceTV2.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x06CF0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x06D80000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 69632 bytes
0x064C0000 Hidden Image-->CLI.Aspect.OverDrive2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 708608 bytes
0x04870000 Hidden Image-->CLI.Aspect.DeviceCV2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 749568 bytes
0x01610000 Hidden Image-->CLI.Foundation.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 77824 bytes
0x01610000 Hidden Image-->CLI.Foundation.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 77824 bytes
0x01610000 Hidden Image-->CLI.Foundation.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 77824 bytes
0x046E0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 806912 bytes
0x055E0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 823296 bytes
0x05810000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 86016 bytes
0x05790000 Hidden Image-->CLI.Aspect.DisplaysColour.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 880640 bytes
0x06330000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 905216 bytes
0x03FB0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 937984 bytes
0x039C0000 Hidden Image-->CLI.Component.Runtime.dll [ EPROCESS 0x8A0B1788 ] PID: 1384, 94208 bytes
0x03AE0000 Hidden Image-->CLI.Component.Runtime.dll [ EPROCESS 0x8856EB88 ] PID: 3752, 94208 bytes
0x03C80000 Hidden Image-->CLI.Component.Runtime.dll [ EPROCESS 0x8A5BBDA0 ] PID: 3760, 94208 bytes




Attached Files



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 21 June 2010 - 04:57 AM

Greetings

One or more of the identified infections is a Backdoor Trojan. - TDSS rootkit

This could allow hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC could be compromised and there is no way to be sure that your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. "If you would like to continue, then follow the steps below, otherwise please let me know"

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:
    Please visit this webpage for download links, and instructions for running the tool:

    http://www.bleepingcomputer.com/combofix/how-to-use-combofix

    Please ensure you read this guide carefully and install the Recovery Console first.

    The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode.
    This allows us to more easily help you should your computer have a problem after an attempted removal of malware.
    It is a simple procedure that will only take a few moments of your time.


    Once installed, you should see a blue screen prompt that says:
      The Recovery Console was successfully installed.
    Please continue as follows:
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Click Yes to allow ComboFix to continue scanning for malware.

    When the tool is finished, it will produce a report for you.

    Please include the report in your next post:

    C:\ComboFix.txt

"information and logs"
    In your next post I need the following
    1. Log from Combofix
    2. let me know of any problems you may have had
    3. How is the computer doing now?

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 21 June 2010 - 08:18 AM

OK, combofix starts to run ok but before it reaches the point of changing the clock, the PC instantly reboots without warning. I have tried this 7 or 8 times and it does the same thing each time. This is even with Macafee disabled.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 21 June 2010 - 04:48 PM

after it reboots what happens? does combofix continue or is it stopped.


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 22 June 2010 - 03:02 AM

No - combofix doesn't continue, I have to start it again from the beginning and the same thing happens.

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 22 June 2010 - 04:41 AM

greetings

I would like you to try and run this for me


TDSSKiller:
  • Please Download TDSSKiller.zip and save it on your desktop.
  • extract (unzip) its contents to your Desktop.
  • double-click the TDSSKiller Folder on your desktop.
  • right-click on TDSSKiller.exe and click Copy then Paste it directly on to your Desktop.
  • Highlight and copy the text in the codebox below.
CODE
"%userprofile%\desktop\tdsskiller.exe" -l "%userprofile%\desktop\tdsskiller.txt"
  • Click Start, click Run... and paste the text above into the Open: line and click OK.
  • If malicious services or files have been detected, the utility will prompt to reboot the PC in order to complete the disinfection procedure. Please reboot when prompted.
  • After reboot, the driver will delete malicious registry keys and files as well as remove itself from the services list.
  • a log file should be created on your C: drive named something like TDSSKiller 2.1.1 Dec 20 2009 02:40:02
  • To find the log click Start then Computer then Vista ( C:).
  • Please post the contents of that log in your next reply



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 22 June 2010 - 08:11 AM

Hi ya, an interesting thing happened, I was lgged into the computer with an admin account copying my data in case it lost or I have to reinstall Windows when 3 or 4 icons including combofix dissappeared from my desktop of my usual account. So unless combofix installs something to remove itself after so long, something strange is going on.

Having said that I did then run nbtstat and there were no internet connections to or from my computer as far as I could tell although this was 20 mins later.

ANyway, that aside, the tdsskiller you posted worked good and my browser is no longer re directing. Is there anyway to make sure it's gone? many thanks.


13:59:32:062 1892 TDSS rootkit removing tool 2.3.2.0 May 31 2010 10:39:48
13:59:32:062 1892 ================================================================================
13:59:32:062 1892 SystemInfo:

13:59:32:062 1892 OS Version: 5.1.2600 ServicePack: 3.0
13:59:32:062 1892 Product type: Workstation
13:59:32:062 1892 ComputerName: COMBOBULATOR
13:59:32:062 1892 UserName: Ballistic
13:59:32:062 1892 Windows directory: C:\WINDOWS
13:59:32:062 1892 Processor architecture: Intel x86
13:59:32:062 1892 Number of processors: 1
13:59:32:062 1892 Page size: 0x1000
13:59:32:062 1892 Boot type: Normal boot
13:59:32:062 1892 ================================================================================
13:59:32:578 1892 Initialize success
13:59:32:578 1892
13:59:32:578 1892 Scanning Services ...
13:59:33:031 1892 Raw services enum returned 334 services
13:59:33:046 1892
13:59:33:046 1892 Scanning Drivers ...
13:59:34:343 1892 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
13:59:34:390 1892 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
13:59:34:453 1892 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
13:59:34:515 1892 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
13:59:34:625 1892 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
13:59:34:718 1892 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
13:59:34:765 1892 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
13:59:34:890 1892 ati2mtag (633d22a45283762dc05989751cc1397c) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
13:59:34:984 1892 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
13:59:35:046 1892 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
13:59:35:109 1892 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
13:59:35:156 1892 BjsPort (7b5bee91c1c5e1ae3eb93ed167e2ddcf) C:\WINDOWS\system32\drivers\BjsPort.SYS
13:59:35:359 1892 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
13:59:35:421 1892 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
13:59:35:484 1892 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
13:59:35:515 1892 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
13:59:35:640 1892 ctac32k (e62b77c441269fb00fb279522c5c49c6) C:\WINDOWS\system32\drivers\ctac32k.sys
13:59:35:765 1892 ctaud2k (89df07bb61fa2adfa75ccf276b11d045) C:\WINDOWS\system32\drivers\ctaud2k.sys
13:59:35:828 1892 ctdvda2k (66ef58271d42414cec5f7bef471b5107) C:\WINDOWS\system32\drivers\ctdvda2k.sys
13:59:36:250 1892 ctprxy2k (7f1dfd52ee2be6bc1ab15d04de958cf8) C:\WINDOWS\system32\drivers\ctprxy2k.sys
13:59:36:312 1892 ctsfm2k (499e69bd99543569bf212b93142220e9) C:\WINDOWS\system32\drivers\ctsfm2k.sys
13:59:36:468 1892 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
13:59:36:515 1892 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
13:59:36:578 1892 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
13:59:36:609 1892 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
13:59:36:640 1892 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
13:59:36:703 1892 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
13:59:36:734 1892 emupia (fa6d34236dea7a5f64265a949553281e) C:\WINDOWS\system32\drivers\emupia2k.sys
13:59:36:812 1892 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
13:59:36:859 1892 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
13:59:36:906 1892 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
13:59:36:937 1892 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
13:59:37:015 1892 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
13:59:37:046 1892 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
13:59:37:078 1892 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
13:59:37:093 1892 gagp30kx (5f0d58e4ad837ed2835493e0ae88c824) C:\WINDOWS\system32\DRIVERS\gagp30kx.sys
13:59:37:093 1892 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\gagp30kx.sys. Real md5: 5f0d58e4ad837ed2835493e0ae88c824, Fake md5: 3a74c423cf6bcca6982715878f450a3b
13:59:37:093 1892 File "C:\WINDOWS\system32\DRIVERS\gagp30kx.sys" infected by TDSS rootkit ... 13:59:38:625 1892 Backup copy found, using it..
13:59:38:625 1892 will be cured on next reboot
13:59:38:703 1892 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
13:59:38:796 1892 ha10kx2k (d7005f18c97df71a7dc798016bd26990) C:\WINDOWS\system32\drivers\ha10kx2k.sys
13:59:38:984 1892 hap16v2k (bcaba45cbf92267f7a2bc2f4f1fb4ec7) C:\WINDOWS\system32\drivers\hap16v2k.sys
13:59:39:062 1892 hap17v2k (9b7ad7329a1f9cf1baa07c1cdf8c7a78) C:\WINDOWS\system32\drivers\hap17v2k.sys
13:59:39:187 1892 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
13:59:39:250 1892 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
13:59:39:281 1892 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
13:59:39:406 1892 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
13:59:39:484 1892 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
13:59:39:531 1892 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
13:59:39:578 1892 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
13:59:39:609 1892 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
13:59:39:656 1892 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
13:59:39:687 1892 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
13:59:39:718 1892 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
13:59:39:765 1892 klmd23 (67e1faa88fb397b3d56909d7e04f4dd3) C:\WINDOWS\system32\drivers\klmd.sys
13:59:39:812 1892 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
13:59:39:843 1892 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
13:59:39:953 1892 mfeavfk (bafdd5e28baea99d7f4772af2f5ec7ee) C:\WINDOWS\system32\drivers\mfeavfk.sys
13:59:40:031 1892 mfebopk (1d003e3056a43d881597d6763e83b943) C:\WINDOWS\system32\drivers\mfebopk.sys
13:59:40:171 1892 mfehidk (3f138a1c8a0659f329f242d1e389b2cf) C:\WINDOWS\system32\drivers\mfehidk.sys
13:59:40:296 1892 mferkdk (41fe2f288e05a6c8ab85dd56770ffbad) C:\WINDOWS\system32\drivers\mferkdk.sys
13:59:40:593 1892 mfesmfk (096b52ea918aa909ba5903d79e129005) C:\WINDOWS\system32\drivers\mfesmfk.sys
13:59:40:703 1892 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
13:59:40:765 1892 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
13:59:40:812 1892 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
13:59:40:843 1892 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
13:59:40:906 1892 MPFP (136157e79849b9e5316ba4008d6075a8) C:\WINDOWS\system32\Drivers\Mpfp.sys
13:59:41:078 1892 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
13:59:41:156 1892 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
13:59:41:234 1892 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
13:59:41:265 1892 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
13:59:41:312 1892 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
13:59:41:375 1892 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
13:59:41:437 1892 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
13:59:41:453 1892 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
13:59:41:484 1892 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
13:59:41:515 1892 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
13:59:41:546 1892 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
13:59:41:562 1892 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
13:59:41:593 1892 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
13:59:41:625 1892 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
13:59:41:656 1892 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
13:59:41:687 1892 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
13:59:41:718 1892 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
13:59:41:765 1892 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
13:59:41:843 1892 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
13:59:41:890 1892 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
13:59:41:921 1892 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
13:59:41:953 1892 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
13:59:42:031 1892 ossrv (d3353dd62853631aa67cb6c73406ec78) C:\WINDOWS\system32\drivers\ctoss2k.sys
13:59:42:093 1892 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
13:59:42:156 1892 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
13:59:42:203 1892 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
13:59:42:234 1892 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
13:59:42:296 1892 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
13:59:42:343 1892 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
13:59:42:515 1892 PfModNT (c8a2d6ff660ac601b7bb9a9b16a5c25e) C:\WINDOWS\system32\drivers\PfModNT.sys
13:59:42:562 1892 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
13:59:42:578 1892 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
13:59:42:609 1892 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
13:59:42:640 1892 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
13:59:42:750 1892 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
13:59:42:781 1892 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
13:59:42:828 1892 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
13:59:42:875 1892 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
13:59:42:906 1892 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
13:59:42:937 1892 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
13:59:42:968 1892 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
13:59:43:046 1892 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
13:59:43:093 1892 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
13:59:43:125 1892 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
13:59:43:187 1892 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
13:59:43:218 1892 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
13:59:43:296 1892 SiS315 (c14863dece98b65195429df2dcc038bc) C:\WINDOWS\system32\DRIVERS\sisgrp.sys
13:59:43:437 1892 SiSGbeXP (ded793c377fa132912b4381043a4d554) C:\WINDOWS\system32\DRIVERS\SiSGbeXP.sys
13:59:43:531 1892 SiSkp (c29363d5855c4b55012a31ef6436013c) C:\WINDOWS\system32\DRIVERS\srvkp.sys
13:59:43:625 1892 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
13:59:43:906 1892 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
13:59:44:234 1892 Srv (89220b427890aa1dffd1a02648ae51c3) C:\WINDOWS\system32\DRIVERS\srv.sys
13:59:44:625 1892 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
13:59:44:906 1892 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
13:59:45:000 1892 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
13:59:45:062 1892 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
13:59:45:109 1892 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
13:59:45:171 1892 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
13:59:45:203 1892 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
13:59:45:265 1892 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
13:59:45:343 1892 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
13:59:45:406 1892 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
13:59:45:437 1892 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
13:59:45:453 1892 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
13:59:45:500 1892 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
13:59:45:531 1892 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
13:59:45:578 1892 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
13:59:45:609 1892 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
13:59:45:656 1892 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
13:59:45:703 1892 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
13:59:45:765 1892 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
13:59:45:765 1892 Reboot required for cure complete..
13:59:46:234 1892 Cure on reboot scheduled successfully
13:59:46:234 1892
13:59:46:234 1892 Completed
13:59:46:234 1892
13:59:46:234 1892 Results:
13:59:46:234 1892 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
13:59:46:234 1892 File objects infected / cured / cured on reboot: 1 / 0 / 1
13:59:46:234 1892
13:59:46:234 1892 KLMD(ARK) unloaded successfully

#10 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 22 June 2010 - 09:08 AM

Just to add that I was also able to perform a Windows update and COMBOFIX now runs succesfully (I have a log if you need it).

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 22 June 2010 - 01:48 PM

Yes let me have the log from combofix


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 22 June 2010 - 04:06 PM

ComboFix 10-06-21.03 - Ballistic 22/06/2010 14:59:30.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.2047.1492 [GMT 1:00]
Running from: c:\documents and settings\Ballistic\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\VDM87.tmp
C:\VDM88.tmp

.
((((((((((((((((((((((((( Files Created from 2010-05-22 to 2010-06-22 )))))))))))))))))))))))))))))))
.

2010-06-22 13:28 . 2010-05-06 10:41 743424 -c----w- c:\windows\system32\dllcache\iedvtool.dll
2010-06-22 09:51 . 2010-06-22 09:55 -------- d-----w- c:\windows\SxsCaPendDel
2010-06-22 09:40 . 2010-06-22 09:40 -------- d-----w- c:\program files\Runtime Software
2010-06-19 13:04 . 2010-06-19 13:04 -------- d-sh--w- c:\documents and settings\Ginger\IECompatCache
2010-06-15 10:52 . 2010-06-15 10:52 49152 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\Components\nprpffbrowserrecordext.dll
2010-06-15 10:52 . 2010-06-15 10:52 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimwmp.dll
2010-06-15 10:52 . 2010-06-15 10:52 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimswf.dll
2010-06-13 16:22 . 2010-06-13 16:22 503808 ----a-w- c:\documents and settings\Admin\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-75f55c12-n\msvcp71.dll
2010-06-13 16:22 . 2010-06-13 16:22 61440 ----a-w- c:\documents and settings\Admin\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-5ce69bf8-n\decora-sse.dll
2010-06-13 16:22 . 2010-06-13 16:22 499712 ----a-w- c:\documents and settings\Admin\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-75f55c12-n\jmc.dll
2010-06-13 16:22 . 2010-06-13 16:22 348160 ----a-w- c:\documents and settings\Admin\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-75f55c12-n\msvcr71.dll
2010-06-13 16:22 . 2010-06-13 16:22 12800 ----a-w- c:\documents and settings\Admin\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-5ce69bf8-n\decora-d3d.dll
2010-06-10 15:20 . 2010-06-10 15:20 -------- d-----w- c:\documents and settings\Ballistic\Application Data\Malwarebytes
2010-06-10 15:20 . 2010-04-29 14:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-06-10 15:20 . 2010-06-10 15:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-06-10 15:20 . 2010-06-10 15:20 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-06-10 15:20 . 2010-04-29 14:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-06-02 09:32 . 2010-06-02 09:32 -------- d-----w- c:\documents and settings\Ginger\Local Settings\Application Data\ATI
2010-06-02 09:32 . 2010-06-02 09:32 -------- d-----w- c:\documents and settings\Ginger\Application Data\ATI
2010-05-29 15:10 . 2010-05-29 15:10 -------- d-----w- c:\program files\Trend Micro
2010-05-27 08:01 . 2010-05-27 08:01 503808 ----a-w- c:\documents and settings\Ginger\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-5649b91c-n\msvcp71.dll
2010-05-27 08:01 . 2010-05-27 08:01 499712 ----a-w- c:\documents and settings\Ginger\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-5649b91c-n\jmc.dll
2010-05-27 08:01 . 2010-05-27 08:01 348160 ----a-w- c:\documents and settings\Ginger\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-5649b91c-n\msvcr71.dll
2010-05-27 08:01 . 2010-05-27 08:01 61440 ----a-w- c:\documents and settings\Ginger\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-634c1647-n\decora-sse.dll
2010-05-27 08:01 . 2010-05-27 08:01 12800 ----a-w- c:\documents and settings\Ginger\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-634c1647-n\decora-d3d.dll
2010-05-26 13:58 . 2010-05-26 13:58 50354 ----a-w- c:\documents and settings\Ballistic\Application Data\Facebook\uninstall.exe
2010-05-26 13:58 . 2010-05-26 13:58 -------- d-----w- c:\documents and settings\Ballistic\Application Data\Facebook
2010-05-25 11:50 . 2010-05-25 11:50 503808 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-54ac5cd5-n\msvcp71.dll
2010-05-25 11:50 . 2010-05-25 11:50 499712 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-54ac5cd5-n\jmc.dll
2010-05-25 11:50 . 2010-05-25 11:50 12800 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-331e8a03-n\decora-d3d.dll
2010-05-25 11:50 . 2010-05-25 11:50 61440 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-331e8a03-n\decora-sse.dll
2010-05-25 11:50 . 2010-05-25 11:50 348160 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-54ac5cd5-n\msvcr71.dll
2010-05-25 11:50 . 2010-05-25 11:50 -------- d-----w- c:\program files\Common Files\Java
2010-05-25 11:49 . 2010-04-12 16:29 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-25 11:45 . 2010-06-22 09:50 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-05-25 11:42 . 2010-06-22 09:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2010-05-25 11:42 . 2010-05-25 11:42 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2010-05-25 11:42 . 2010-05-25 11:42 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2010-05-25 09:51 . 2010-06-22 12:38 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-05-24 23:48 . 2010-05-24 23:48 -------- d-----w- c:\documents and settings\Ginger\Local Settings\Application Data\Google

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-06-22 13:01 . 2010-02-19 17:32 46464 ----a-w- c:\windows\system32\drivers\gagp30kx.sys
2010-06-22 09:52 . 2010-05-21 14:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-06-21 14:06 . 2010-02-23 10:27 1 ----a-w- c:\documents and settings\Ballistic\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys
2010-06-21 08:12 . 2010-02-19 23:07 -------- d-----w- c:\documents and settings\Ballistic\Application Data\uTorrent
2010-06-15 10:52 . 2010-06-15 10:52 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimrp.dll
2010-06-15 10:52 . 2010-06-15 10:52 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimqt.dll
2010-06-15 10:52 . 2010-06-15 10:52 40960 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Chrome\Hook\rpchromebrowserrecordhelper.dll
2010-06-15 10:52 . 2010-06-15 10:52 308808 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Common\rpmainbrowserrecordplugin.dll
2010-06-15 10:52 . 2010-06-15 10:52 14848 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
2010-06-15 10:52 . 2010-06-15 10:52 341600 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
2010-06-15 10:52 . 2010-06-15 10:50 -------- d-----w- c:\program files\Common Files\Real
2010-06-15 10:51 . 2010-06-15 10:50 -------- d-----w- c:\program files\Real
2010-06-15 10:51 . 2010-06-15 10:51 -------- d-----w- c:\program files\Common Files\xing shared
2010-06-15 10:50 . 2010-04-29 09:47 348160 ----a-w- c:\windows\system32\msvcr71.dll
2010-06-15 10:50 . 2010-04-29 09:47 499712 ----a-w- c:\windows\system32\msvcp71.dll
2010-06-14 22:14 . 2010-02-19 18:24 -------- d-----w- c:\program files\McAfee
2010-06-09 07:23 . 2010-05-12 11:35 -------- d-----w- c:\program files\Google
2010-05-25 11:49 . 2010-02-19 20:16 -------- d-----w- c:\program files\Java
2010-05-23 07:18 . 2010-05-23 07:18 503808 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\cache\6.0\46\f84c6ae-224775e1-n\msvcp71.dll
2010-05-23 07:18 . 2010-05-23 07:18 499712 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\cache\6.0\46\f84c6ae-224775e1-n\jmc.dll
2010-05-23 07:18 . 2010-05-23 07:18 348160 ----a-w- c:\documents and settings\Ballistic\Application Data\Sun\Java\Deployment\cache\6.0\46\f84c6ae-224775e1-n\msvcr71.dll
2010-05-21 14:53 . 2010-05-21 14:53 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-06 10:41 . 2006-02-28 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-05-02 05:22 . 2006-02-28 12:00 1851264 ----a-w- c:\windows\system32\win32k.sys
2010-04-30 09:59 . 2010-03-09 10:17 21640 ----a-w- c:\documents and settings\Admin\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-30 09:31 . 2010-02-28 17:41 21640 ----a-w- c:\documents and settings\Ballistic\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-30 08:36 . 2010-02-19 17:42 86327 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-04-28 14:33 . 2010-04-28 14:33 -------- d-----w- c:\program files\Serif
2010-04-28 14:24 . 2010-03-04 16:45 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-28 13:47 . 2010-04-28 13:47 -------- d-----w- c:\program files\Canon
2010-04-28 13:47 . 2010-02-19 18:06 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-20 05:30 . 2006-02-28 12:00 285696 ----a-w- c:\windows\system32\atmfd.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SiSPower"="SiSPower.dll" [2007-04-10 53248]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2010-02-11 1218008]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"CTSysVol"="c:\program files\Creative\SBAudigy2\Surround Mixer\CTSysVol.exe" [2003-09-17 57344]
"CTDVDDET"="c:\program files\Creative\SBAudigy2\DVDAudio\CTDVDDet.EXE" [2003-06-18 45056]
"CTHelper"="CTHELPER.EXE" [2004-03-19 24576]
"SBDrvDet"="c:\program files\Creative\SB Drive Det\SBDrvDet.exe" [2002-12-03 45056]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-09-25 90112]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2010-06-15 202256]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\Ballistic\Start Menu\Programs\Startup\
OpenOffice.org 3.1.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-8-18 384000]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"c:\\Program Files\\UTorrent\\utorrent.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

R2 BjsPort;Canon BJ Scanner Port Driver;c:\windows\system32\drivers\BjsPort.sys [28/04/2010 14:47 14656]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\progra~1\mcafee\SITEAD~1\mcsacore.exe [19/02/2010 19:27 93320]
S0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys --> c:\windows\system32\DRIVERS\Lbd.sys [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [12/05/2010 17:41 135664]
.
Contents of the 'Scheduled Tasks' folder

2010-06-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-05-12 16:41]

2010-06-22 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-05-12 16:41]

2010-06-15 c:\windows\Tasks\McDefragTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2010-02-19 12:22]

2010-06-01 c:\windows\Tasks\McQcTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2010-02-19 12:22]

2010-06-22 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 14:07]

2010-06-22 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-602162358-179605362-839522115-1003.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 21:09]

2010-06-22 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-602162358-179605362-839522115-1003.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 21:09]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
DPF: {32C3FEAE-0877-4767-8C20-62A5829A0945} - hxxp://static.ak.facebook.com/fbplugin/win32/axfbootloader.cab
DPF: {A9CF3378-D60E-40A8-927D-7EA0D5B0AA98} - hxxp://webalbum.bonusprint.com/ukipc01/downloads//ImageUploader6.cab
.
- - - - ORPHANS REMOVED - - - -

Toolbar-Locked - (no file)
WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
SafeBoot-klmdb.sys



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-06-22 15:04
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(708)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-06-22 15:05:39
ComboFix-quarantined-files.txt 2010-06-22 14:05

Pre-Run: 29,520,240,640 bytes free
Post-Run: 30,682,324,992 bytes free

- - End Of File - - 0A49C74F7D0FDF0B6F4698C4D833D247


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 22 June 2010 - 07:16 PM

Greetings BallisticBrian

These logs look very good.

Clear your Java Cache
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
        Applications and Applets
        Trace and Log Files
    • Click OK on Delete Temporary Files Window
      Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
    • Click OK to leave the Temporary Files Window
    • Click OK to leave the Java Control Panel.


TFC(Temp File Cleaner):
  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :
    I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan

Go Eset web page to run an online scannner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
      Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

"information and logs"
    In your next post I need the following
    1. Log From MBAM
    2. Log From ESET Online Scanner
    3. let me know of any problems you may have had
    4. How is the computer doing now?

Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 BallisticBrian

BallisticBrian
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:27 AM

Posted 24 June 2010 - 10:07 AM

Hi Gringo, Ive been a bit busy so havent done ESET but I cleared Java and did TFC and here is the Malware log...

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4233

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

24/06/2010 16:01:56
mbam-log-2010-06-24 (16-01-56).txt

Scan type: Quick scan
Objects scanned: 137938
Time elapsed: 6 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:27 AM

Posted 24 June 2010 - 10:32 AM

that looks very good

let me have eset so we can complete this


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users