Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help cannot update windows plus browser opens new window with work at home ads


  • Please log in to reply
7 replies to this topic

#1 falcone

falcone

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:51 AM

Posted 08 September 2010 - 05:29 PM

I am having a proble with my computer I cannot do Windows updates when I try I get "Internet Explore cannot display this website." I can get to other pages with internet explorer infact when I opened http://www.bleepingcomputer.com I did get there. I also got another browser window that opened to "http://newsdaily7.com/income/index2.html" which is some ads for work at home offers. I don't know if the two problems are related. I have also noticed that when I leave my mouse alone that every 10 seconds or so the curser goes from normal to busy right back to normal not sure if it is normal.

I am running Windows XP Home Edition Service Pack 3
Version 5.1 (build 2600.xpsr_sp3_gdr.100216-1514: Service Pack 3)

Internet Explorer
Version 8.0.6001.18702 Update Version: 0

I am running CA Security Suite:
CA Anti-Virus
CA Anti-Spyware
CA Personal Firewall

I have mbam installed and I update it before I run it every once in a while. I ran it last on 9/3/2010 here is the log file from then:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4539

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/3/2010 7:38:24 PM
mbam-log-2010-09-03 (19-38-24).txt

Scan type: Full scan (C:\|D:\|F:\|G:\|)
Objects scanned: 323028
Time elapsed: 1 hour(s), 23 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\SolutionAV (Rogue.AntivirSolutionPro) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


I hope you can help me.
Thanks,
George

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:51 AM

Posted 08 September 2010 - 07:45 PM

Hi George, these are usually caused by malware.

Let's do these scans also.
Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.




Rerun MBAM (MalwareBytes) like this,needs an update:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 falcone

falcone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:51 AM

Posted 10 September 2010 - 05:23 PM

Hello boopme,

Thank you for your quick responce. I downloaded ATF Cleaner and SUPERAntiSpyware and ran them per your instructions. I ran both ATF-Cleaner and SUPER in safe mode. I did update SUPER and set the scanner options as directed before booting in safe mode.
I then ran ATF-Cleaner in safe mode following your instructions.

I then ran SUPPER in safe mode following your instructions and here is the Log file from SUPER:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/09/2010 at 10:34 PM

Application Version : 4.42.1000

Core Rules Database Version : 5481
Trace Rules Database Version: 3293

Scan type : Complete Scan
Total Scan Time : 03:11:27

Memory items scanned : 242
Memory threats detected : 0
Registry items scanned : 9203
Registry threats detected : 1
File items scanned : 110546
File threats detected : 46

Disabled.SecurityCenterOption
HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#ANTIVIRUSDISABLENOTIFY

Adware.Tracking Cookie
banners.securedataimages.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
cdn4.specificclick.net [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
core.insightexpressai.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
googleads.g.doubleclick.net [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
interclick.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
m1.2mdn.net [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
media.kyte.tv [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
media.myfoxny.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
media.tattomedia.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
media1.break.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
media2.myfoxny.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
naiadsystems.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
objects.tremormedia.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
pornotube.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
spe.atdmt.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
static.2mdn.net [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
static.xxxbunker.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
static.xxxmatch.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
sussexhonda.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
udn.specificclick.net [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
vidii.hardsextube.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.4porno.tv [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.fishsexmovies.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.homesexdaily.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.naiadsystems.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.petsex.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.porncy.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.pornhub.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.realhomemadesexmovies.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
www.sussexhonda.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
wwwstatic.megaporn.com [ C:\Documents and Settings\George\Application Data\Macromedia\Flash Player\#SharedObjects\P6E53NTT ]
cdn4.specificclick.net [ C:\Documents and Settings\Heather\Application Data\Macromedia\Flash Player\#SharedObjects\SEKVWABF ]
udn.specificclick.net [ C:\Documents and Settings\Heather\Application Data\Macromedia\Flash Player\#SharedObjects\SEKVWABF ]
cdn4.specificclick.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
core.insightexpressai.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
media.mtvnservices.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
media.onsugar.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]
spe.atdmt.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\43WG7BQG ]

Trojan.Unclassified/Loader-Suspicious
C:\TEMP\AZUREUS DOWNLOADS\DVD X COPY PLATINUM + CRACK\DVD X COPY PLATINUM 3.1.1 FIX!\PLATINUM FIX\LOADER.EXE

Unclassified.Unknown Origin
C:\TEMP\AZUREUS DOWNLOADS\THE.BEST.DVD.COPY.SOFTWARE.2007.30IN1[SNAFFI]\SUPER DVD RIPPER 239\SUPERDVDRIPPERV2.39PATCHHS\KEYGEN.NFO
C:\TEMP\DVDXCOPY\KEYGEN.NFO

Trojan.Agent/Gen-Faldesc
C:\WINDOWS\SYSTEM32\IGFXSRRC.OCX

When SUPER was finished I was asked to reboot so I rebooted normally.
I then shut down the machine for the night.
I booted the machine in normal mode today.
I then opened MBAM ran the updates and then ran a Quick scan as directed. Below is the log file from MBAM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4591

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/10/2010 5:50:12 PM
mbam-log-2010-09-10 (17-50-12).txt

Scan type: Quick scan
Objects scanned: 186314
Time elapsed: 10 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

It looks like my problem of having new browser windows popping up with work at home ads might be fixed.
I still can not do Windows update. It still comes back with Internet Explorer cannot display the page


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:51 AM

Posted 10 September 2010 - 06:14 PM

Hello again George,Things look much better. Looks like a Crack/keygen was used on here. So far we have been lucky and not come across a Virut infection,in which we'd have to reformat.
Cracking and keygen tools are often obtained via peer-to-peer (P2P) or file sharing programs which too are a security risk. The reason for this is that file sharing relies on its members giving and gaining unfettered access to computers across the P2P network. This practice can make you vulnerable to data and identity theft, system infection and remote access exploit by attackers who can take control of your computer without your knowledge. Even if you change the risky default settings to a safer configuration, downloading files from an anonymous source increases your exposure to infection because the files you are downloading may actually contain a disguised threat. Many malicious worms and Trojans, such as the Storm Worm, target and spread across P2P files sharing networks because of their known vulnerabilities. In some instances the infection may cause so much damage to your system that recovery is not possible and a Repair Install will NOT help!. In those cases, the only option is to wipe your drive, reformat and reinstall the OS.

Even the safest P2P file sharing programs that do not contain bundled spyware, still expose you to risks because of the very nature of the P2P file sharing process. By default, most P2P file sharing programs are configured to automatically launch at startup. They are also configured to allow other P2P users on the same network open access to a shared directory on your computer. The best way to eliminate these risks is to avoid using P2P applications. Read P2P Software User Advisories, Risks of File-Sharing Technology and P2P file sharing: Anticipate the risks....


That said we must still have something here as the Update wont work. Let's see if we have a TDDS rootkit.
Please run the tool here How to remove Google Redirects

When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here.

Follow with an online ESET scan:
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Export to text file... to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Eset Smart Installer icon on your desktop.
  • Check the "YES, I accept the Terms of Use"
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push "List of found threats"
  • Push "Export to text file", and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the "<<Back" button.
  • Push Finish
In your next reply, please include the following:
  • Eset Scan Log


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 falcone

falcone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:51 AM

Posted 11 September 2010 - 04:03 PM

Thank you boopme, I Ran the TDDS rootkit following the directions at the link How to remove Google Redirects.
It found one problem and fixed it.
Here is the logfile:

2010/09/10 21:03:03.0890 TDSS rootkit removing tool 2.4.2.1 Sep 7 2010 14:43:44
2010/09/10 21:03:03.0890 ================================================================================
2010/09/10 21:03:03.0890 SystemInfo:
2010/09/10 21:03:03.0890
2010/09/10 21:03:03.0890 OS Version: 5.1.2600 ServicePack: 3.0
2010/09/10 21:03:03.0890 Product type: Workstation
2010/09/10 21:03:03.0890 ComputerName: CNS-2
2010/09/10 21:03:03.0890 UserName: George
2010/09/10 21:03:03.0890 Windows directory: C:\WINDOWS
2010/09/10 21:03:03.0890 System windows directory: C:\WINDOWS
2010/09/10 21:03:03.0890 Processor architecture: Intel x86
2010/09/10 21:03:03.0890 Number of processors: 2
2010/09/10 21:03:03.0890 Page size: 0x1000
2010/09/10 21:03:03.0890 Boot type: Normal boot
2010/09/10 21:03:03.0890 ================================================================================
2010/09/10 21:03:07.0390 Initialize success
2010/09/10 21:03:49.0750 ================================================================================
2010/09/10 21:03:49.0750 Scan started
2010/09/10 21:03:49.0750 Mode: Manual;
2010/09/10 21:03:49.0750 ================================================================================
2010/09/10 21:03:51.0312 A3AB (b5f0db0a8f1c656302e42d180c461fee) C:\WINDOWS\system32\DRIVERS\A3AB.sys
2010/09/10 21:03:51.0453 abp480n5 (6abb91494fe6c59089b9336452ab2ea3) C:\WINDOWS\system32\DRIVERS\ABP480N5.SYS
2010/09/10 21:03:51.0531 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2010/09/10 21:03:51.0625 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2010/09/10 21:03:51.0703 adpu160m (9a11864873da202c996558b2106b0bbc) C:\WINDOWS\system32\DRIVERS\adpu160m.sys
2010/09/10 21:03:51.0796 aeaudio (11c04b17ed2abbb4833694bcd644ac90) C:\WINDOWS\system32\drivers\aeaudio.sys
2010/09/10 21:03:51.0875 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2010/09/10 21:03:51.0953 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2010/09/10 21:03:52.0062 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\WINDOWS\system32\DRIVERS\agp440.sys
2010/09/10 21:03:52.0109 agpCPQ (03a7e0922acfe1b07d5db2eeb0773063) C:\WINDOWS\system32\DRIVERS\agpCPQ.sys
2010/09/10 21:03:52.0171 Aha154x (c23ea9b5f46c7f7910db3eab648ff013) C:\WINDOWS\system32\DRIVERS\aha154x.sys
2010/09/10 21:03:52.0218 aic78u2 (19dd0fb48b0c18892f70e2e7d61a1529) C:\WINDOWS\system32\DRIVERS\aic78u2.sys
2010/09/10 21:03:52.0296 aic78xx (b7fe594a7468aa0132deb03fb8e34326) C:\WINDOWS\system32\DRIVERS\aic78xx.sys
2010/09/10 21:03:52.0359 AliIde (1140ab9938809700b46bb88e46d72a96) C:\WINDOWS\system32\DRIVERS\aliide.sys
2010/09/10 21:03:52.0421 alim1541 (cb08aed0de2dd889a8a820cd8082d83c) C:\WINDOWS\system32\DRIVERS\alim1541.sys
2010/09/10 21:03:52.0484 amdagp (95b4fb835e28aa1336ceeb07fd5b9398) C:\WINDOWS\system32\DRIVERS\amdagp.sys
2010/09/10 21:03:52.0546 amsint (79f5add8d24bd6893f2903a3e2f3fad6) C:\WINDOWS\system32\DRIVERS\amsint.sys
2010/09/10 21:03:52.0625 ASAPIW2k (4f9cbbf95e8f7a0d4c0edcfe3b78102e) C:\WINDOWS\system32\drivers\ASAPIW2k.sys
2010/09/10 21:03:52.0687 asc (62d318e9a0c8fc9b780008e724283707) C:\WINDOWS\system32\DRIVERS\asc.sys
2010/09/10 21:03:52.0734 asc3350p (69eb0cc7714b32896ccbfd5edcbea447) C:\WINDOWS\system32\DRIVERS\asc3350p.sys
2010/09/10 21:03:52.0796 asc3550 (5d8de112aa0254b907861e9e9c31d597) C:\WINDOWS\system32\DRIVERS\asc3550.sys
2010/09/10 21:03:52.0890 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2010/09/10 21:03:52.0968 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2010/09/10 21:03:53.0093 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2010/09/10 21:03:53.0171 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2010/09/10 21:03:53.0234 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2010/09/10 21:03:53.0359 cbidf (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\DRIVERS\cbidf2k.sys
2010/09/10 21:03:53.0421 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2010/09/10 21:03:53.0500 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2010/09/10 21:03:53.0562 cd20xrnt (f3ec03299634490e97bbce94cd2954c7) C:\WINDOWS\system32\DRIVERS\cd20xrnt.sys
2010/09/10 21:03:53.0640 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2010/09/10 21:03:53.0703 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2010/09/10 21:03:53.0765 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2010/09/10 21:03:53.0890 CmdIde (e5dcb56c533014ecbc556a8357c929d5) C:\WINDOWS\system32\DRIVERS\cmdide.sys
2010/09/10 21:03:53.0968 Cpqarray (3ee529119eed34cd212a215e8c40d4b6) C:\WINDOWS\system32\DRIVERS\cpqarray.sys
2010/09/10 21:03:54.0140 dac2w2k (e550e7418984b65a78299d248f0a7f36) C:\WINDOWS\system32\DRIVERS\dac2w2k.sys
2010/09/10 21:03:54.0234 dac960nt (683789caa3864eb46125ae86ff677d34) C:\WINDOWS\system32\DRIVERS\dac960nt.sys
2010/09/10 21:03:54.0359 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2010/09/10 21:03:54.0468 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2010/09/10 21:03:54.0578 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2010/09/10 21:03:54.0656 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2010/09/10 21:03:54.0734 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2010/09/10 21:03:54.0812 dpti2o (40f3b93b4e5b0126f2f5c0a7a5e22660) C:\WINDOWS\system32\DRIVERS\dpti2o.sys
2010/09/10 21:03:54.0875 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2010/09/10 21:03:54.0968 drvmcdb (e807f83e239c734173c14740787045f5) C:\WINDOWS\system32\drivers\drvmcdb.sys
2010/09/10 21:03:55.0046 drvnddm (1baa922d627a59a6542acfa6fd7dc40a) C:\WINDOWS\system32\drivers\drvnddm.sys
2010/09/10 21:03:55.0156 E100B (d57a8fc800b501ac05b10d00f66d127a) C:\WINDOWS\system32\DRIVERS\e100b325.sys
2010/09/10 21:03:55.0265 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2010/09/10 21:03:55.0328 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2010/09/10 21:03:55.0390 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2010/09/10 21:03:55.0484 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2010/09/10 21:03:55.0562 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2010/09/10 21:03:55.0656 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2010/09/10 21:03:55.0781 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2010/09/10 21:03:55.0906 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2010/09/10 21:03:56.0000 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2010/09/10 21:03:56.0078 hpn (b028377dea0546a5fcfba928a8aefae0) C:\WINDOWS\system32\DRIVERS\hpn.sys
2010/09/10 21:03:56.0187 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2010/09/10 21:03:56.0250 i2omgmt (9368670bd426ebea5e8b18a62416ec28) C:\WINDOWS\system32\drivers\i2omgmt.sys
2010/09/10 21:03:56.0312 i2omp (f10863bf1ccc290babd1a09188ae49e0) C:\WINDOWS\system32\DRIVERS\i2omp.sys
2010/09/10 21:03:56.0375 i8042prt (dccf1fb555df5adfe999783bb0ca6e8f) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/09/10 21:03:56.0375 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\i8042prt.sys. Real md5: dccf1fb555df5adfe999783bb0ca6e8f, Fake md5: 4a0b06aa8943c1e332520f7440c0aa30
2010/09/10 21:03:56.0390 i8042prt - detected Rootkit.Win32.TDSS.tdl3 (0)
2010/09/10 21:03:56.0500 ialm (5a8e05f1d5c36abd58cffa111eb325ea) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
2010/09/10 21:03:56.0578 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2010/09/10 21:03:56.0656 ini910u (4a40e045faee58631fd8d91afc620719) C:\WINDOWS\system32\DRIVERS\ini910u.sys
2010/09/10 21:03:56.0750 IntelC51 (7509c548400f4c9e0211e3f6e66abbe6) C:\WINDOWS\system32\DRIVERS\IntelC51.sys
2010/09/10 21:03:56.0828 IntelC52 (9584ffdd41d37f2c239681d0dac2513e) C:\WINDOWS\system32\DRIVERS\IntelC52.sys
2010/09/10 21:03:56.0890 IntelC53 (cf0b937710cec6ef39416edecd803cbb) C:\WINDOWS\system32\DRIVERS\IntelC53.sys
2010/09/10 21:03:56.0953 IntelIde (b5466a9250342a7aa0cd1fba13420678) C:\WINDOWS\system32\DRIVERS\intelide.sys
2010/09/10 21:03:57.0062 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2010/09/10 21:03:57.0156 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2010/09/10 21:03:57.0250 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2010/09/10 21:03:57.0312 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2010/09/10 21:03:57.0375 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2010/09/10 21:03:57.0437 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2010/09/10 21:03:57.0515 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2010/09/10 21:03:57.0578 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2010/09/10 21:03:57.0640 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2010/09/10 21:03:57.0703 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2010/09/10 21:03:57.0765 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2010/09/10 21:03:57.0859 KmxAgent (f4ffca2de8290de6118583bf74962243) C:\WINDOWS\system32\DRIVERS\kmxagent.sys
2010/09/10 21:03:57.0953 KmxCF (9cb6ae1a28c0a5b70afc208f068bc24f) C:\WINDOWS\system32\DRIVERS\KmxCF.sys
2010/09/10 21:03:58.0031 KmxCfg (df0de1110162e761a7f60c392ad177dd) C:\WINDOWS\system32\DRIVERS\kmxcfg.sys
2010/09/10 21:03:58.0078 KmxFile (28c7643d33ed066622e93260f818adfd) C:\WINDOWS\system32\DRIVERS\KmxFile.sys
2010/09/10 21:03:58.0156 KmxFw (6db409366cb3325a67a01308ce23ae1a) C:\WINDOWS\system32\DRIVERS\kmxfw.sys
2010/09/10 21:03:58.0218 KmxSbx (2df089f8594ae18d5c1a1bfbdd967eab) C:\WINDOWS\system32\DRIVERS\KmxSbx.sys
2010/09/10 21:03:58.0281 KmxStart (f68a8118c1e26967533cc06206154784) C:\WINDOWS\system32\DRIVERS\kmxstart.sys
2010/09/10 21:03:58.0359 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2010/09/10 21:03:58.0484 Lavasoft Kernexplorer (32da3fde01f1bb080c2e69521dd8881e) C:\Program Files\Lavasoft\Ad-Aware\KernExplorer.sys
2010/09/10 21:03:58.0593 Lbd (b7c19ec8b0dd7efa58ad41ffeb8b8cda) C:\WINDOWS\system32\DRIVERS\Lbd.sys
2010/09/10 21:03:58.0984 LuIPSec (84487df0b0768ed431de4792ba4ebc36) C:\WINDOWS\system32\DRIVERS\luipsec.sys
2010/09/10 21:03:59.0234 MarvinBus (7584ffb07305d2e9e3823059a9310b0f) C:\WINDOWS\system32\DRIVERS\MarvinBus.sys
2010/09/10 21:03:59.0328 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2010/09/10 21:03:59.0406 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2010/09/10 21:03:59.0484 MODEMCSA (1992e0d143b09653ab0f9c5e04b0fd65) C:\WINDOWS\system32\drivers\MODEMCSA.sys
2010/09/10 21:03:59.0531 mohfilt (59b8b11ff70728eec60e72131c58b716) C:\WINDOWS\system32\DRIVERS\mohfilt.sys
2010/09/10 21:03:59.0593 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2010/09/10 21:03:59.0656 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2010/09/10 21:03:59.0703 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2010/09/10 21:03:59.0781 mraid35x (3f4bb95e5a44f3be34824e8e7caf0737) C:\WINDOWS\system32\DRIVERS\mraid35x.sys
2010/09/10 21:03:59.0828 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2010/09/10 21:03:59.0953 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2010/09/10 21:04:00.0046 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2010/09/10 21:04:00.0109 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2010/09/10 21:04:00.0203 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2010/09/10 21:04:00.0250 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2010/09/10 21:04:00.0343 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2010/09/10 21:04:00.0406 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2010/09/10 21:04:00.0453 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2010/09/10 21:04:00.0531 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2010/09/10 21:04:00.0609 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2010/09/10 21:04:00.0687 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2010/09/10 21:04:00.0750 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2010/09/10 21:04:00.0875 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2010/09/10 21:04:00.0921 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2010/09/10 21:04:01.0000 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2010/09/10 21:04:01.0062 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2010/09/10 21:04:01.0140 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2010/09/10 21:04:01.0234 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2010/09/10 21:04:01.0328 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2010/09/10 21:04:01.0421 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2010/09/10 21:04:01.0546 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2010/09/10 21:04:01.0625 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2010/09/10 21:04:01.0687 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2010/09/10 21:04:01.0750 omci (53d5f1278d9edb21689bbbcecc09108d) C:\WINDOWS\system32\DRIVERS\omci.sys
2010/09/10 21:04:01.0828 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2010/09/10 21:04:01.0890 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2010/09/10 21:04:01.0968 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2010/09/10 21:04:02.0031 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2010/09/10 21:04:02.0109 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2010/09/10 21:04:02.0203 PCLEPCI (1bebe7de8508a02650cdce45c664c2a2) C:\WINDOWS\system32\drivers\pclepci.sys
2010/09/10 21:04:02.0265 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2010/09/10 21:04:02.0343 Pcouffin (5b6c11de7e839c05248ced8825470fef) C:\WINDOWS\system32\Drivers\Pcouffin.sys
2010/09/10 21:04:02.0531 perc2 (6c14b9c19ba84f73d3a86dba11133101) C:\WINDOWS\system32\DRIVERS\perc2.sys
2010/09/10 21:04:02.0593 perc2hib (f50f7c27f131afe7beba13e14a3b9416) C:\WINDOWS\system32\DRIVERS\perc2hib.sys
2010/09/10 21:04:02.0703 pfc (da86016f0672ada925f589ede715f185) C:\WINDOWS\system32\drivers\pfc.sys
2010/09/10 21:04:02.0781 PinnacleMarvinUsb (f819a50abe001f5c43b9bcd426013ae0) C:\WINDOWS\system32\DRIVERS\MarvinUsb.sys
2010/09/10 21:04:02.0875 Pnp680r (a1d7a9214b71ebbb6f31cb84aac15525) C:\WINDOWS\system32\DRIVERS\pnp680r.sys
2010/09/10 21:04:02.0953 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2010/09/10 21:04:03.0031 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2010/09/10 21:04:03.0078 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2010/09/10 21:04:03.0125 PxHelp20 (153d02480a0a2f45785522e814c634b6) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2010/09/10 21:04:03.0203 ql1080 (0a63fb54039eb5662433caba3b26dba7) C:\WINDOWS\system32\DRIVERS\ql1080.sys
2010/09/10 21:04:03.0234 Ql10wnt (6503449e1d43a0ff0201ad5cb1b8c706) C:\WINDOWS\system32\DRIVERS\ql10wnt.sys
2010/09/10 21:04:03.0296 ql12160 (156ed0ef20c15114ca097a34a30d8a01) C:\WINDOWS\system32\DRIVERS\ql12160.sys
2010/09/10 21:04:03.0343 ql1240 (70f016bebde6d29e864c1230a07cc5e6) C:\WINDOWS\system32\DRIVERS\ql1240.sys
2010/09/10 21:04:03.0390 ql1280 (907f0aeea6bc451011611e732bd31fcf) C:\WINDOWS\system32\DRIVERS\ql1280.sys
2010/09/10 21:04:03.0468 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2010/09/10 21:04:03.0515 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2010/09/10 21:04:03.0703 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2010/09/10 21:04:03.0859 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2010/09/10 21:04:03.0937 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2010/09/10 21:04:04.0015 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2010/09/10 21:04:04.0187 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2010/09/10 21:04:04.0406 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2010/09/10 21:04:04.0484 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2010/09/10 21:04:04.0656 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
2010/09/10 21:04:04.0703 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
2010/09/10 21:04:04.0796 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2010/09/10 21:04:04.0906 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2010/09/10 21:04:04.0953 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2010/09/10 21:04:05.0031 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2010/09/10 21:04:05.0187 sisagp (6b33d0ebd30db32e27d1d78fe946a754) C:\WINDOWS\system32\DRIVERS\sisagp.sys
2010/09/10 21:04:05.0281 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2010/09/10 21:04:05.0375 smwdm (4aa922332433cdeb8b82c072c212e32e) C:\WINDOWS\system32\drivers\smwdm.sys
2010/09/10 21:04:05.0468 Sparrow (83c0f71f86d3bdaf915685f3d568b20e) C:\WINDOWS\system32\DRIVERS\sparrow.sys
2010/09/10 21:04:05.0546 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2010/09/10 21:04:05.0609 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2010/09/10 21:04:05.0750 Srv (89220b427890aa1dffd1a02648ae51c3) C:\WINDOWS\system32\DRIVERS\srv.sys
2010/09/10 21:04:05.0828 sscdbhk5 (3d1ce2231937376e3f5e1ac644357d8f) C:\WINDOWS\system32\drivers\sscdbhk5.sys
2010/09/10 21:04:05.0906 ssrtln (4e85dc934d3430427420c0e568727529) C:\WINDOWS\system32\drivers\ssrtln.sys
2010/09/10 21:04:06.0000 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2010/09/10 21:04:06.0062 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2010/09/10 21:04:06.0156 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2010/09/10 21:04:06.0203 symc810 (1ff3217614018630d0a6758630fc698c) C:\WINDOWS\system32\DRIVERS\symc810.sys
2010/09/10 21:04:06.0250 symc8xx (070e001d95cf725186ef8b20335f933c) C:\WINDOWS\system32\DRIVERS\symc8xx.sys
2010/09/10 21:04:06.0312 sym_hi (80ac1c4abbe2df3b738bf15517a51f2c) C:\WINDOWS\system32\DRIVERS\sym_hi.sys
2010/09/10 21:04:06.0390 sym_u3 (bf4fab949a382a8e105f46ebb4937058) C:\WINDOWS\system32\DRIVERS\sym_u3.sys
2010/09/10 21:04:06.0453 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2010/09/10 21:04:06.0546 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2010/09/10 21:04:06.0625 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2010/09/10 21:04:06.0703 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2010/09/10 21:04:06.0796 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2010/09/10 21:04:06.0890 tfsnboio (001a671ee7bcfb424fcc2aae4c0c853f) C:\WINDOWS\system32\dla\tfsnboio.sys
2010/09/10 21:04:06.0953 tfsncofs (d7631678d85d2ae8820a14551a747a64) C:\WINDOWS\system32\dla\tfsncofs.sys
2010/09/10 21:04:06.0984 tfsndrct (8af02bae5438adfcbe34088e624289fc) C:\WINDOWS\system32\dla\tfsndrct.sys
2010/09/10 21:04:07.0062 tfsndres (65786cc08eb5cb599009ba442738eecb) C:\WINDOWS\system32\dla\tfsndres.sys
2010/09/10 21:04:07.0109 tfsnifs (d6036a8994b5a8bc9a2d60d32b963283) C:\WINDOWS\system32\dla\tfsnifs.sys
2010/09/10 21:04:07.0156 tfsnopio (43f14396a859efb949f5d48590095cd4) C:\WINDOWS\system32\dla\tfsnopio.sys
2010/09/10 21:04:07.0203 tfsnpool (aa159467b8b5d023284d34dfe49a2b7a) C:\WINDOWS\system32\dla\tfsnpool.sys
2010/09/10 21:04:07.0250 tfsnudf (de13f5b63c37308171e8b6df0ee0793f) C:\WINDOWS\system32\dla\tfsnudf.sys
2010/09/10 21:04:07.0312 tfsnudfa (eb9df39d87308903aa321315db52522b) C:\WINDOWS\system32\dla\tfsnudfa.sys
2010/09/10 21:04:07.0421 TosIde (f2790f6af01321b172aa62f8e1e187d9) C:\WINDOWS\system32\DRIVERS\toside.sys
2010/09/10 21:04:07.0484 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2010/09/10 21:04:07.0562 ultra (1b698a51cd528d8da4ffaed66dfc51b9) C:\WINDOWS\system32\DRIVERS\ultra.sys
2010/09/10 21:04:07.0671 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2010/09/10 21:04:07.0765 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2010/09/10 21:04:07.0843 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2010/09/10 21:04:07.0906 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2010/09/10 21:04:07.0984 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2010/09/10 21:04:08.0015 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2010/09/10 21:04:08.0109 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2010/09/10 21:04:08.0156 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2010/09/10 21:04:08.0218 VET-FILT (e6287f6c77e71adfc6badb106cd30e7d) C:\WINDOWS\system32\drivers\VET-FILT.sys
2010/09/10 21:04:08.0281 VET-REC (cb98d6c1ade8a891cbbfd9beb1774f48) C:\WINDOWS\system32\drivers\VET-REC.sys
2010/09/10 21:04:08.0343 VETEBOOT (c079f80582c31728029f3efcdfeaf221) C:\WINDOWS\system32\drivers\VETEBOOT.sys
2010/09/10 21:04:08.0453 VETEFILE (31bab965e7af8295c22f641401d622b3) C:\WINDOWS\system32\drivers\VETEFILE.sys
2010/09/10 21:04:08.0515 VETFDDNT (05bdabe6664f48c54a6d3c538c8f2cc1) C:\WINDOWS\system32\drivers\VETFDDNT.sys
2010/09/10 21:04:08.0578 VETMONNT (f5897ff7eb733670f92e798ef5358b88) C:\WINDOWS\system32\drivers\VETMONNT.sys
2010/09/10 21:04:08.0640 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2010/09/10 21:04:08.0750 viaagp (754292ce5848b3738281b4f3607eaef4) C:\WINDOWS\system32\DRIVERS\viaagp.sys
2010/09/10 21:04:08.0796 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
2010/09/10 21:04:08.0859 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2010/09/10 21:04:09.0093 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2010/09/10 21:04:09.0515 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2010/09/10 21:04:09.0625 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
2010/09/10 21:04:09.0718 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2010/09/10 21:04:09.0812 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2010/09/10 21:04:09.0890 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2010/09/10 21:04:09.0968 ================================================================================
2010/09/10 21:04:09.0968 Scan finished
2010/09/10 21:04:09.0968 ================================================================================
2010/09/10 21:04:09.0984 Detected object count: 1
2010/09/10 21:04:43.0187 i8042prt (dccf1fb555df5adfe999783bb0ca6e8f) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/09/10 21:04:43.0187 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\i8042prt.sys. Real md5: dccf1fb555df5adfe999783bb0ca6e8f, Fake md5: 4a0b06aa8943c1e332520f7440c0aa30
2010/09/10 21:04:45.0703 Backup copy found, using it..
2010/09/10 21:04:45.0750 C:\WINDOWS\system32\DRIVERS\i8042prt.sys - will be cured after reboot
2010/09/10 21:04:45.0750 Rootkit.Win32.TDSS.tdl3(i8042prt) - User select action: Cure
2010/09/10 21:05:34.0062 Deinitialize success


I then ran the ESET onlinescan and while the ESET scan was running I notiecd that the little yellow icon showed up in the lower right corner saying that there were windows updates ready to install.
Here is the ESET scan LOG

C:\Program Files\Swat It v2.1\SwatIt.exe probably unknown NewHeur_PE virus deleted - quarantined

I want to thank you for your help. I belive that my problems are fixed I am now able in windows explorer to do windows updates and my Windows XP version is now update. I have also not been getting any more browser windows popping up with work at home ads. Unless you feel that there is anything else that I should do I would consider my problems fixed. Again Thank You :thumbsup:

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:51 AM

Posted 11 September 2010 - 05:03 PM

Looks good this was the key
2010/09/10 21:04:09.0984 Detected object count: 1
2010/09/10 21:04:43.0187 i8042prt (dccf1fb555df5adfe999783bb0ca6e8f) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/09/10 21:04:43.0187 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\i8042prt.sys. Real md5: dccf1fb555df5adfe999783bb0ca6e8f, Fake md5: 4a0b06aa8943c1e332520f7440c0aa30
2010/09/10 21:04:45.0703 Backup copy found, using it..
2010/09/10 21:04:45.0750 C:\WINDOWS\system32\DRIVERS\i8042prt.sys - will be cured after reboot
2010/09/10 21:04:45.0750 Rootkit.Win32.TDSS.tdl3(i8042prt) - User select action: Cure
2010/09/10 21:05:34.0062 Deinitialize success

This infection will have stiolen all passwords and credit/financial data on here. Be sure you change the passwords and contact any needed banks.

Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Tips to protect yourself against malware and reduce the potential for re-infection:Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
EDIT: You're welcome. :thumbsup:

Edited by boopme, 11 September 2010 - 05:03 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 falcone

falcone
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:04:51 AM

Posted 11 September 2010 - 09:35 PM

Thanks, I did the restore and removed the old ones. I don't do any banking on this machine I basicly use it for email. looking up information on the WEB, remote desktop through IPsec to connect to my work computers, and sometimes my kids will use it for home work. I also have a shared printer connected to this computer and my kids will sometimes print through it.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:51 AM

Posted 12 September 2010 - 02:04 PM

OK thats good. Irecommend you do the Please disable Autorun asap!. from above as kids will download every and anything. If they aren't put them on Limited user accounts. Ask in XP if youu are unsure of how.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users