Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

trojan horse Sheur3.BCYW detected and then super slow internet


  • Please log in to reply
4 replies to this topic

#1 onieyez

onieyez

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 PM

Posted 02 October 2010 - 01:31 AM

AVG detected Trojan horse SHeur3.BCYW
and after that internet speed went from 3.0 mbs to 0.3 mbs

I've done cut cleaner
virus scans and found nothing unusual other than the regular cookie warnings

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,176 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:55 PM

Posted 02 October 2010 - 08:56 PM

Hello. I guess you have XP here.

Let's run FakeAlert Stinger.

Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.Download Link 1
Download Link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.



Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 onieyez

onieyez
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 PM

Posted 03 October 2010 - 04:08 PM

I have vista
Done all the scans
did them again to make sure there's nothing else
now i keep getting a message from internet explorer saying adobe flash player is being opened outside of internet explorer protected mode.

did a speedtest and internet speed isn't still at where it should be



Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4734

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

10/2/2010 2:19:21 PM
mbam-log-2010-10-02 (14-19-21).txt

Scan type: Quick scan
Objects scanned: 152509
Time elapsed: 11 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\yeng\AppData\Roaming\jsdfgs.bat (Malware.Trace) -> Quarantined and deleted successfully.


------------------------------------------------------

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/02/2010 at 10:59 AM

Application Version : 4.44.1000

Core Rules Database Version : 5610
Trace Rules Database Version: 3422

Scan type : Quick Scan
Total Scan Time : 00:32:52

Memory items scanned : 688
Memory threats detected : 1
Registry items scanned : 2573
Registry threats detected : 24
File items scanned : 12597
File threats detected : 142

Adware.MyWebSearch/FunWebProducts
C:\PROGRAM FILES\WINDOWS LIVE\MESSENGER\MSIMG32.DLL
C:\PROGRAM FILES\WINDOWS LIVE\MESSENGER\MSIMG32.DLL
HKCR\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0
HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0\FLAGS
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib
HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib#Version
HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\ProxyStubClsid
HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\ProxyStubClsid32
HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\TypeLib
HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\TypeLib#Version

Adware.MyWebSearch
HKU\S-1-5-21-194111970-4142398892-3514385119-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
HKCR\CLSID\{00A6FAF1-072E-44CF-8957-5838F569A31D}
HKU\S-1-5-21-194111970-4142398892-3514385119-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
HKCR\CLSID\{07B18EA1-A523-4961-B6BB-170DE4475CCA}

Adware.Tracking Cookie
C:\Users\yeng\AppData\Roaming\Microsoft\Windows\Cookies\yeng@atdmt[2].txt
.imrworldwide.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.imrworldwide.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.doubleclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.questionmarket.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.lfstmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.lfstmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.lfstmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.media6degrees.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.apmebf.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.mediaplex.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.mediaplex.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adecn.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.advertising.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.yieldmanager.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ads.pointroll.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.media6degrees.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.media6degrees.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.www.burstnet.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
www.burstbeacon.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.burstnet.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.burstnet.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.fastclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.fastclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.fastclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
www.mangahentaixxx.com.ar [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.statcounter.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
movies.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
movies.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
movies.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
dvdcovers.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
dvdcovers.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
dvdcovers.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
www.burstnet.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
user.lucidmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ru4.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ru4.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
movies.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
dvdcovers.spacash.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
ads.crakmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.burstbeacon.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.content.yieldmanager.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.fastclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.bs.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.serving-sys.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adserver.adtechus.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adxpose.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
view.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.insightexpressai.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
view.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
www.socialtrack.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.estat.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.tradedoubler.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.tradedoubler.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.tradedoubler.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.tradedoubler.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.xiti.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.lucidmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.invitemedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.myroitracking.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.clicksor.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.clicksor.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.clicksor.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.clicksor.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.clicksor.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.bleepbookdating.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.bleepbookdating.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adbrite.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adultadworld.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adultadworld.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adultadworld.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.adultadworld.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
view.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
view.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.specificclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.specificclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
view.atdmt.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ordie.adbureau.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.electronicarts.112.2o7.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.doubleclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.fastclick.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.ordie.adbureau.net [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.247realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.oasn04.247realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.eyewonder.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.network.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.realmedia.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.questionmarket.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.content.yieldmanager.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
tracking.hostgator.com [ C:\Users\yeng\AppData\Roaming\Mozilla\Firefox\Profiles\n2t9f9z2.default\cookies.sqlite ]
.statcounter.com [ C:\Users\yeng\AppData\Roaming\MozillaControl\profiles\MozillaControl\khx6homx.slt\cookies.txt ]
.doubleclick.net [ C:\Users\yeng\AppData\Roaming\MozillaControl\profiles\MozillaControl\khx6homx.slt\cookies.txt ]

Malware.Trace
HKU\S-1-5-21-194111970-4142398892-3514385119-1001\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL

Trojan.Agent/CDesc[Generic]
C:\USERS\YENG\DESKTOP\EPSXE.V1.6.0\PLUGINS\SPUIORI.DLL

Edited by onieyez, 03 October 2010 - 04:25 PM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,176 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:55 PM

Posted 03 October 2010 - 07:13 PM

It seems something within this malware,jsdfgs.bat , is attempting to connect to a high risk domain that may pose a security risk.

Please run an online and rootkit scan.

First run FakeAlert Stinger.

ESET
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Export to text file... to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Eset Smart Installer icon on your desktop.
  • Check the "YES, I accept the Terms of Use"
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push "List of found threats"
  • Push "Export to text file", and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the "<<Back" button.
  • Push Finish
In your next reply, please include the following:
  • Eset Scan Log


NOTE: In some instances if no malware is found there will be no log produced.


Please run the following scan.

Please download Rootkit Unhooker and save it to your Desktop
  • Double-click on RKUnhookerLE to run it
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth, and uncheck the rest
  • Click OK
  • Wait until it's finished and then go to File > Save Report
  • Save the report to your Desktop
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 onieyez

onieyez
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 PM

Posted 05 October 2010 - 05:38 AM

C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\3a9c5000-6f0564e0 probably a variant of Win32/Agent.FPEXZHL trojan deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\653a8b4a-676d220b probably a variant of Win32/Agent.FPEXZHL trojan deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\3c61e454-7d53229e multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\160ba957-626e1461 multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\16646899-2f75805b multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\68a9cc5c-150a2d70 multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\68eb4adc-5ec94b64 multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\41e8aee3-2fa11408 probably a variant of Win32/Agent.HRYTTOE trojan deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\170f8765-50e4a58e probably a variant of Win32/Agent.HRYTTOE trojan deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\23ea3369-4b4554d2 multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\4084a7b0-3f8080aa multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\6a183b45-191bc893 probably a variant of Win32/Agent.HRYTTOE trojan deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\509c4cb5-2c225e37 multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\6c5ad939-7507c2db multiple threats deleted - quarantined
C:\Users\yeng\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\d552d7a-570f463f probably a variant of Win32/Agent.FPEXZHL trojan deleted - quarantined






RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows Vista
Version 6.0.6002 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0x8CC00000 C:\Windows\system32\DRIVERS\nvlddmkm.sys 9506816 bytes (NVIDIA Corporation, NVIDIA Windows Kernel Mode Driver, Version 191.07 )
0x82634000 C:\Windows\system32\ntkrnlpa.exe 3903488 bytes (Microsoft Corporation, NT Kernel & System)
0x82634000 PnpManager 3903488 bytes
0x82634000 RAW 3903488 bytes
0x82634000 WMIxWDM 3903488 bytes
0x968A0000 Win32k 2109440 bytes
0x968A0000 C:\Windows\System32\win32k.sys 2109440 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0x8DA00000 C:\Windows\system32\drivers\RTKVHDA.sys 2043904 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0x8E20B000 C:\Windows\system32\DRIVERS\VX3000.sys 1957888 bytes (Microsoft Corporation, Microsoft LifeCam VX3000 Device Driver)
0x88A09000 C:\Windows\System32\Drivers\Ntfs.sys 1114112 bytes (Microsoft Corporation, NT File System Driver)
0x8860F000 C:\Windows\system32\drivers\ndis.sys 1093632 bytes (Microsoft Corporation, NDIS 6.0 wrapper driver)
0x8C809000 C:\Windows\system32\DRIVERS\HSX_DP.sys 1056768 bytes (Conexant Systems, Inc., HSF_DP driver)
0x88294000 PCI_PNP0346 995328 bytes
0x88294000 C:\Windows\System32\Drivers\sprv.sys 995328 bytes
0x88294000 sptd 995328 bytes
0x8880C000 C:\Windows\System32\drivers\tcpip.sys 958464 bytes (Microsoft Corporation, TCP/IP Driver)
0x806D8000 C:\Windows\system32\CI.dll 917504 bytes (Microsoft Corporation, Code Integrity Module)
0x9F50E000 C:\Windows\system32\drivers\peauth.sys 909312 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver)
0x8C90B000 C:\Windows\system32\DRIVERS\HSX_CNXT.sys 741376 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0x8E4A3000 C:\Windows\system32\drivers\spsys.sys 720896 bytes (Microsoft Corporation, security processor)
0x8D513000 C:\Windows\System32\drivers\dxgkrnl.sys 659456 bytes (Microsoft Corporation, DirectX Graphics Kernel)
0x8895E000 C:\Windows\system32\DRIVERS\HDAudBus.sys 577536 bytes (Microsoft Corporation, High Definition Audio Bus Driver)
0x8820B000 C:\Windows\system32\drivers\Wdf01000.sys 507904 bytes (Microsoft Corporation, WDF Dynamic)
0x884F4000 C:\Windows\System32\Drivers\ksecdd.sys 462848 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0x8060E000 C:\Windows\system32\mcupdate_GenuineIntel.dll 458752 bytes (Microsoft Corporation, Intel Microcode Update Library)
0x8E576000 C:\Windows\system32\drivers\HTTP.sys 446464 bytes (Microsoft Corporation, HTTP Protocol Stack)
0x8E409000 C:\Windows\System32\Drivers\avgldx86.sys 331776 bytes (AVG Technologies CZ, s.r.o., AVG AVI Loader Driver)
0x9F4BC000 C:\Windows\System32\DRIVERS\srv.sys 319488 bytes (Microsoft Corporation, Server driver)
0x88780000 C:\Windows\system32\DRIVERS\HSXHWBS2.sys 311296 bytes (Conexant Systems, Inc., HSF_HWB2 WDM driver)
0x8840D000 C:\Windows\System32\drivers\volmgrx.sys 303104 bytes (Microsoft Corporation, Volume Manager Extension Driver)
0x8E10E000 C:\Windows\system32\drivers\afd.sys 294912 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x883B6000 C:\Windows\system32\drivers\acpi.sys 286720 bytes (Microsoft Corporation, ACPI Driver for NT)
0x80697000 C:\Windows\system32\CLFS.SYS 266240 bytes (Microsoft Corporation, Common Log File System Driver)
0x8D80C000 C:\Windows\system32\DRIVERS\storport.sys 266240 bytes (Microsoft Corporation, Microsoft Storage Port Driver)
0x88911000 C:\Windows\system32\DRIVERS\USBPORT.SYS 253952 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0x8E1B5000 C:\Windows\system32\DRIVERS\rdbss.sys 245760 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x8D5C0000 C:\Windows\system32\DRIVERS\e1e6032.sys 241664 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 6 deserialized driver)
0x88745000 C:\Windows\system32\drivers\NETIO.SYS 241664 bytes (Microsoft Corporation, Network I/O Subsystem)
0x8857D000 C:\Windows\System32\Drivers\a18b3e3q.SYS 233472 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x9F444000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 233472 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr)
0x88B19000 C:\Windows\system32\drivers\volsnap.sys 233472 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0x8D914000 C:\Windows\system32\DRIVERS\usbhub.sys 217088 bytes (Microsoft Corporation, Default Hub Driver for USB)
0x82601000 ACPI_HAL 208896 bytes
0x82601000 C:\Windows\system32\hal.dll 208896 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0x884A9000 C:\Windows\system32\drivers\fltmgr.sys 204800 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0x8E0C8000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver)
0x885B6000 C:\Windows\system32\DRIVERS\msiscsi.sys 192512 bytes (Microsoft Corporation, Microsoft iSCSI Initiator Driver)
0x8D95A000 C:\Windows\system32\drivers\portcls.sys 184320 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x8871A000 C:\Windows\system32\drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider)
0x887CC000 C:\Windows\system32\DRIVERS\ks.sys 172032 bytes (Microsoft Corporation, Kernel CSA Library)
0xA2A36000 C:\Windows\System32\Drivers\fastfat.SYS 163840 bytes (Microsoft Corporation, Fast FAT File System Driver)
0x88B69000 C:\Windows\System32\drivers\ecache.sys 159744 bytes (Microsoft Corporation, Special Memory Device Cache)
0x807B8000 C:\Windows\system32\drivers\pci.sys 159744 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0x9F495000 C:\Windows\System32\DRIVERS\srv2.sys 159744 bytes (Microsoft Corporation, Smb 2.0 Server driver)
0x88390000 C:\Windows\System32\Drivers\SCSIPORT.SYS 155648 bytes (Microsoft Corporation, SCSI Port Driver)
0x8D987000 C:\Windows\system32\drivers\drmk.sys 151552 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0x8D87A000 C:\Windows\system32\DRIVERS\ndiswan.sys 143360 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x8E18D000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x88BA1000 C:\Windows\system32\drivers\CLASSPNP.SYS 135168 bytes (Microsoft Corporation, SCSI Class System Dll)
0x9F404000 C:\Windows\system32\drivers\mrxdav.sys 135168 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0x8E006000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver)
0x9F425000 C:\Windows\system32\DRIVERS\mrxsmb.sys 126976 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0x8848B000 C:\Windows\system32\drivers\ataport.SYS 122880 bytes (Microsoft Corporation, ATAPI Driver Extension)
0x8E5E3000 C:\Windows\System32\DRIVERS\srvnet.sys 118784 bytes (Microsoft Corporation, Server Network driver)
0x888F6000 C:\Windows\System32\drivers\fwpkclnt.sys 110592 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API)
0x8E480000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA File Virtualization Filter Driver)
0x8D9BA000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver)
0x88565000 C:\Windows\system32\DRIVERS\cdrom.sys 98304 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0x9F47D000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 98304 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector)
0x8D9E9000 C:\Windows\System32\Drivers\dfsc.sys 94208 bytes (Microsoft Corporation, DFS Namespace Client Driver)
0x8D858000 C:\Windows\system32\DRIVERS\rasl2tp.sys 94208 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0x8E027000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xA2A16000 C:\Windows\system32\DRIVERS\cdfs.sys 90112 bytes (Microsoft Corporation, CD-ROM File System Driver)
0x8E156000 C:\Windows\system32\DRIVERS\pacer.sys 90112 bytes (Microsoft Corporation, QoS Packet Scheduler)
0x8E072000 C:\Windows\system32\DRIVERS\tdx.sys 90112 bytes (Microsoft Corporation, TDI Translation Driver)
0x889EB000 C:\Windows\System32\drivers\mpsdrv.sys 86016 bytes (Microsoft Corporation, Microsoft Protection Service Driver)
0x8D8C0000 C:\Windows\system32\DRIVERS\rassstp.sys 86016 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager)
0x8E0AA000 C:\Windows\system32\DRIVERS\USBSTOR.SYS 86016 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0x885E5000 C:\Windows\system32\DRIVERS\WUDFRd.sys 86016 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Reflector)
0x8D8AC000 C:\Windows\system32\DRIVERS\raspptp.sys 81920 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x8E0FA000 C:\Windows\system32\DRIVERS\smb.sys 81920 bytes (Microsoft Corporation, SMB Transport driver)
0x8E563000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6)
0x8E17A000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x8E088000 C:\Windows\system32\drivers\usbaudio.sys 73728 bytes (Microsoft Corporation, USB Audio Class Driver)
0xA2A04000 C:\Windows\system32\DRIVERS\WUDFPf.sys 73728 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0x88B90000 C:\Windows\system32\drivers\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver)
0x8D949000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy)
0x8067E000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Platform Specific Hardware Error Driver)
0x884DB000 C:\Windows\system32\drivers\fileinfo.sys 65536 bytes (Microsoft Corporation, FileInfo Filter Driver)
0x8E09A000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 65536 bytes (Microsoft Corporation, Hid Class Library)
0x8E553000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver)
0x88473000 C:\Windows\System32\drivers\mountmgr.sys 65536 bytes (Microsoft Corporation, Mount Point Manager)
0x8C9CD000 C:\Windows\system32\DRIVERS\ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0x8D8D5000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Terminal Server Driver)
0x88BE1000 C:\Windows\system32\DRIVERS\intelppm.sys 61440 bytes (Microsoft Corporation, Processor Device Driver)
0x8E471000 C:\Windows\system32\DRIVERS\monitor.sys 61440 bytes (Microsoft Corporation, Monitor Driver)
0x88B5A000 C:\Windows\System32\Drivers\mup.sys 61440 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0x807DF000 C:\Windows\System32\drivers\partmgr.sys 61440 bytes (Microsoft Corporation, Partition Management Driver)
0x8D89D000 C:\Windows\system32\DRIVERS\raspppoe.sys 61440 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0x8894F000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0x807EE000 C:\Windows\system32\drivers\volmgr.sys 61440 bytes (Microsoft Corporation, Volume Manager Driver)
0x8C9DD000 C:\Windows\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0x96AE0000 C:\Windows\System32\cdd.dll 57344 bytes (Microsoft Corporation, Canonical Display Driver)
0x8E16C000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver)
0x8E05B000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver)
0x8845E000 C:\Windows\system32\DRIVERS\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0x8C9C0000 C:\Windows\system32\drivers\modem.sys 53248 bytes (Microsoft Corporation, Modem Device Driver)
0x8E3E9000 C:\Windows\system32\DRIVERS\STREAM.SYS 53248 bytes (Microsoft Corporation, WDM CODEC Class Device Driver 2.0)
0x8D907000 C:\Windows\system32\DRIVERS\umbus.sys 53248 bytes (Microsoft Corporation, User-Mode Bus Enumerator)
0x88287000 C:\Windows\system32\drivers\WDFLDR.SYS 53248 bytes (Microsoft Corporation, WDFLDR)
0x8E45A000 C:\Windows\System32\drivers\tcpipreg.sys 49152 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver)
0x8D9DD000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x8D5B4000 C:\Windows\System32\drivers\watchdog.sys 49152 bytes (Microsoft Corporation, Watchdog Driver)
0x8D8E5000 C:\Windows\system32\DRIVERS\kbdclass.sys 45056 bytes (Microsoft Corporation, Keyboard Class Driver)
0x8D8F0000 C:\Windows\system32\DRIVERS\mouclass.sys 45056 bytes (Microsoft Corporation, Mouse Class Driver)
0x8E050000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver)
0x8D86F000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x8D84D000 C:\Windows\system32\DRIVERS\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper)
0x88BF0000 C:\Windows\system32\DRIVERS\usbuhci.sys 45056 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0x8E467000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver)
0x8C9EB000 C:\Windows\System32\Drivers\GEARAspiWDM.sys 40960 bytes (GEAR Software Inc., CD DVD Filter)
0x8D8FD000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver)
0x8E1F1000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy)
0x9F5EC000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0x88BC2000 C:\Windows\system32\drivers\crcdisk.sys 36864 bytes (Microsoft Corporation, Disk Block Verification Filter Driver)
0x8DBF3000 C:\Windows\System32\Drivers\Fs_Rec.SYS 36864 bytes (Microsoft Corporation, File System Recognizer Driver)
0x8E3F6000 C:\Windows\system32\DRIVERS\hidusb.sys 36864 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0x8E0BF000 C:\Windows\system32\DRIVERS\kbdhid.sys 36864 bytes (Microsoft Corporation, HID Keyboard Filter Driver)
0xA2A5E000 C:\Windows\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0x884EB000 C:\Windows\System32\Drivers\PxHelp20.sys 36864 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0x8E069000 C:\Windows\System32\DRIVERS\rasacd.sys 36864 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0x96AC0000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver)
0x88BD8000 C:\Windows\system32\DRIVERS\tunmp.sys 36864 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x88387000 C:\Windows\System32\Drivers\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0x88483000 C:\Windows\system32\drivers\atapi.sys 32768 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x8068F000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver)
0x8E200000 C:\Windows\system32\DRIVERS\mouhid.sys 32768 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0x88200000 C:\Windows\system32\drivers\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver)
0x8E040000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8E048000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x88B52000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor)
0x9F5F6000 C:\Windows\system32\DRIVERS\xaudio.sys 32768 bytes (Conexant Systems, Inc., Modem Audio Device Driver)
0x8D9B3000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver)
0x8D9D6000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0x88457000 C:\Windows\system32\DRIVERS\intelide.sys 28672 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0x80607000 C:\Windows\system32\kdcom.dll 28672 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0x8D9AC000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver)
0x8846C000 C:\Windows\system32\drivers\pciide.sys 28672 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x8E000000 C:\Windows\System32\Drivers\avgmfx86.sys 24576 bytes (AVG Technologies CZ, s.r.o., AVG Resident Shield Minifilter Driver)
0x8E1AF000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0x9F50A000 C:\Windows\system32\DRIVERS\mdmxsdk.sys 16384 bytes (Conexant, Diagnostic Interface x86 Driver)
0x8D511000 C:\Windows\system32\DRIVERS\nvBridge.kmd 8192 bytes (NVIDIA Corporation, NVIDIA Compatible Windows Vista Kernel Mode Driver, Version 191.07 )
0x8D8FB000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x8E03E000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0x8521D1F8 unknown_irp_handler 3592 bytes
0x85A151F8 unknown_irp_handler 3592 bytes
0x8521C1F8 unknown_irp_handler 3592 bytes
0x8676E1F8 unknown_irp_handler 3592 bytes
0x867791F8 unknown_irp_handler 3592 bytes
0x863B41F8 unknown_irp_handler 3592 bytes
0x870541F8 unknown_irp_handler 3592 bytes
0x867A51F8 unknown_irp_handler 3592 bytes
0x8488A1F8 unknown_irp_handler 3592 bytes
0x863A71F8 unknown_irp_handler 3592 bytes
0x876581F8 unknown_irp_handler 3592 bytes
0x871221F8 unknown_irp_handler 3592 bytes
0x86E4E500 unknown_irp_handler 2816 bytes
0x87015500 unknown_irp_handler 2816 bytes
==============================================
>Stealth
==============================================
WARNING: File locked for read access [C:\Windows\system32\drivers\sptd.sys]
0x003F0000 Hidden Image-->HP.ActiveSupportLibrary.dll [ EPROCESS 0x84AA9898 ] PID: 3464, 86016 bytes




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users