Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with malware.trace and brower redirects


  • This topic is locked This topic is locked
34 replies to this topic

#1 bensy

bensy

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 11 October 2010 - 03:00 PM

Last week, I got hit with a ton of malware, including AntiMalware Doctor. I got rid most of it using MalwareBytes, SuperAntiSpyware, and MacAfee. As of today, when I run all this stuff, I will get to the point where MB/SAS/Mac show no infections. But then, usually on reboot, sometimes just after a period of hours, I rescan and they detect Malware.trace. Fix the problems and they all report no infection. But then malware.trace reappears.

I also have a browser redirect issue. When I enter a search in my Google box in Firefox, I get redirected to: search.fast-find.net, which displays Google search results. Also, when I try to click on certain sites (usually concerning malware removal), I get redirected to random other sites. Whoever coded this redirect wasn't very good, b/c all I have to do is click the "cached" page to see what I want smile.gif.

I have attached the DDS information. However, when I ran GMER, it scanned for awhile, then I got a BSOD. I didn't write down the error code, unfortunately. And when I rebooted, I was fine. But I'm scared to try again.

Thank you for your help in advance!


DDS (Ver_10-10-10.03) - NTFSx86
Run by Ben at 15:25:59.03 on Mon 10/11/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_18
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.310 [GMT -4:00]

AV: McAfee VirusScan Enterprise *On-access scanning disabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}

============== Running Processes ===============

C:\WINDOWS\system32\ibmpmsvc.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
svchost.exe
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\Google\Update\1.2.183.29\GoogleCrashHandler.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\WINDOWS\system32\mfevtps.exe
C:\Program Files\Macrium\Reflect\ReflectService.exe
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\Microsoft IntelliType Pro\itype.exe
C:\Program Files\Siber Systems\GoodSync\GoodSync.exe
C:\Documents and Settings\Ben\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Thunderbird\thunderbird.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Ben\Desktop\dds.scr

============== Pseudo HJT Report ===============

BHO: Google Gears Helper: {e0fefe40-fbf9-42ae-ba58-794ca7e3fb53} - c:\program files\google\google gears\internet explorer\0.5.36.0\gears.dll
uRun: [GoodSync] "c:\program files\siber systems\goodsync\GoodSync.exe" /min
uRun: [Google Update] "c:\documents and settings\ben\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [itype] "c:\program files\microsoft intellitype pro\itype.exe"
mRun: [MSConfig] c:\windows\pchealth\helpctr\binaries\MSConfig.exe /auto
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - {0B4350D1-055F-47A3-B112-5F2F2B0D6F08} - c:\program files\google\google gears\internet explorer\0.5.36.0\gears.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\ben\applic~1\mozilla\firefox\profiles\nmr8w7cr.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=
FF - component: c:\documents and settings\ben\application data\mozilla\firefox\profiles\nmr8w7cr.default\extensions\{340c2bbc-ce74-4362-90b5-7c26312808ef}\platform\winnt_x86-msvc\components\WeaveCrypto.dll
FF - component: c:\program files\google\google gears\firefox\lib\ff36\gears.dll
FF - component: c:\program files\mozilla firefox\extensions\{ab2ce124-6272-4b12-94a9-7303c7397bd1}\components\SkypeFfComponent.dll
FF - plugin: c:\documents and settings\ben\local settings\application data\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.17\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: browser.search.selectedEngine - Google
FF - user.js: browser.search.order.1 - Google
FF - user.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

============= SERVICES / DRIVERS ===============

P2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\Mcshield.exe [2008-9-29 143088]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-10-26 340592]
R0 pssnap;Paramount Software Snapshot Filter;c:\windows\system32\drivers\pssnap.sy@ [2010-10-8 15328]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\SASDIFSV.SYS [2009-10-12 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 67656]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\EngineServer.exe [2008-9-29 19456]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2008-3-14 103744]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2008-9-29 62800]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2009-10-26 67904]
R2 ReflectService;Macrium Reflect Image Mounting Service;c:\program files\macrium\reflect\ReflectService.exe [2010-1-28 220128]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-10-26 90360]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-10-26 42424]
S0 zteccc;zteccc; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-11-13 135664]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\7.tmp --> c:\windows\system32\7.tmp [?]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2009-10-26 64432]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 12872]

=============== Created Last 30 ================

2010-10-09 22:29:13 -------- d-----w- c:\program files\Sophos
2010-10-08 22:32:46 -------- d--h--w- c:\windows\PIF
2010-10-08 18:20:35 -------- d-----w- c:\docume~1\ben\applic~1\Genieo
2010-10-08 18:20:08 -------- d-----w- c:\docume~1\alluse~1\applic~1\Update
2010-10-08 18:19:41 104960 --sha-r- c:\windows\system32\ati2cqag2.dll

==================== Find3M ====================

2010-08-17 13:17:06 58880 ----a-w- c:\windows\system32\spoolsv.exe
2010-07-22 15:49:15 590848 ----a-w- c:\windows\system32\rpcrt4.dll
2010-07-22 05:57:20 5120 ----a-w- c:\windows\system32\xpsp4res.dll

============= FINISH: 15:26:24.70 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 19 October 2010 - 01:33 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Shannon

#3 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 19 October 2010 - 05:44 PM

Hi. I am still having problems. But some things have changed since I last posted.

Malware Bytes, SuperAntispyware, and Macafee all turn up nothing. I have also run them in safe mode, they still turn up nothing.

However, I am still having problems. My Google Box still redirects to the fast-find.net site I mentioned in my previous post. Sometimes, I get random popups and new tabs. Sometimes, I will type in a URL and get redirected to some random website. Sometimes IE will not run. Sometimes Chrome will fail to run or to connect. Firefox always seems to work, except for the redirects.

Worse, I had a huge crash a couple days ago. I got an error message that read "Generic Host Process for Win32 Services has closed." My computer froze, and when I rebooted, I got a BSOD that said something about "new hardware or virus." The computer would then restart, and I'd get the same message again. I tried booting into Last Known Good, and it didn't work. Tried booting into SafeMode and it didn't work. Then I ran what I thought was a rescue program from Macrium. Turns out it was just image reinstallation software. So I closed it. But when I closed it, it said something about a "wrong controller" and tried to fix it. Lo and behold I could then boot into Safe Mode. I ran all my scans, they turned up clean, and booted into normal. My computer was back. But I've gotten that error message since -- and in fact it just popped up as I was typing this -- but it hasn't resulted in a serious crash.

I've posted my new DDS logs here and in the attachment.

I tried to run the GMER scan again (I ran DeFogger first), but as before, it scanned for 15 minutes or so, then froze and crashed my computer.

Thanks for your help!!!




DDS (Ver_10-10-10.03) - NTFSx86
Run by Ben at 18:09:25.35 on Tue 10/19/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_18
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.526 [GMT -4:00]

AV: McAfee VirusScan Enterprise *On-access scanning disabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}

============== Running Processes ===============

C:\WINDOWS\system32\ibmpmsvc.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Google\Update\1.2.183.39\GoogleCrashHandler.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Microsoft IntelliType Pro\itype.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Siber Systems\GoodSync\GoodSync.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
svchost.exe
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\WINDOWS\system32\mfevtps.exe
C:\Program Files\Macrium\Reflect\ReflectService.exe
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Ben\Desktop\cleanup stuff\dds(2).scr

============== Pseudo HJT Report ===============

BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Google Gears Helper: {e0fefe40-fbf9-42ae-ba58-794ca7e3fb53} - c:\program files\google\google gears\internet explorer\0.5.36.0\gears.dll
uRun: [GoodSync] "c:\program files\siber systems\goodsync\GoodSync.exe" /min
uRun: [Google Update] "c:\documents and settings\ben\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [itype] "c:\program files\microsoft intellitype pro\itype.exe"
mRun: [MSConfig] c:\windows\pchealth\helpctr\binaries\MSConfig.exe /auto
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {09C04DA7-5B76-4EBC-BBEE-B25EAC5965F5} - {0B4350D1-055F-47A3-B112-5F2F2B0D6F08} - c:\program files\google\google gears\internet explorer\0.5.36.0\gears.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\ben\applic~1\mozilla\firefox\profiles\nmr8w7cr.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=
FF - component: c:\documents and settings\ben\application data\mozilla\firefox\profiles\nmr8w7cr.default\extensions\{340c2bbc-ce74-4362-90b5-7c26312808ef}\platform\winnt_x86-msvc\components\WeaveCrypto.dll
FF - component: c:\program files\google\google gears\firefox\lib\ff36\gears.dll
FF - component: c:\program files\mozilla firefox\extensions\{ab2ce124-6272-4b12-94a9-7303c7397bd1}\components\SkypeFfComponent.dll
FF - plugin: c:\documents and settings\ben\local settings\application data\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.17\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: browser.search.selectedEngine - Google
FF - user.js: browser.search.order.1 - Google
FF - user.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

============= SERVICES / DRIVERS ===============

P2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\Mcshield.exe [2008-9-29 143088]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-10-26 340592]
R0 pssnap;Paramount Software Snapshot Filter;c:\windows\system32\drivers\pssnap.sy@ [2010-10-8 15328]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\SASDIFSV.SYS [2009-10-12 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 67656]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\EngineServer.exe [2008-9-29 19456]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2008-3-14 103744]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2008-9-29 62800]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2009-10-26 67904]
R2 ReflectService;Macrium Reflect Image Mounting Service;c:\program files\macrium\reflect\ReflectService.exe [2010-1-28 220128]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-10-26 90360]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-10-26 42424]
S0 zteccc;zteccc; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-11-13 135664]
S3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\2.tmp [2010-10-18 6144]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2009-10-26 64432]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 12872]

=============== Created Last 30 ================

2010-10-18 20:06:07 6144 ------w- c:\windows\system32\2.tmp
2010-10-18 20:05:58 6144 ------w- c:\windows\system32\1.tmp
2010-10-15 02:41:39 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-10-09 22:29:13 -------- d-----w- c:\program files\Sophos
2010-10-08 22:32:46 -------- d--h--w- c:\windows\PIF
2010-10-08 18:20:35 -------- d-----w- c:\docume~1\ben\applic~1\Genieo
2010-10-08 18:20:08 -------- d-----w- c:\docume~1\alluse~1\applic~1\Update
2010-10-08 18:19:41 104960 --sha-r- c:\windows\system32\ati2cqag2.dll
2010-09-22 22:10:52 103864 ----a-w- c:\program files\mozilla firefox\plugins\nppdf32.dll

==================== Find3M ====================

2010-09-18 16:23:26 974848 ----a-w- c:\windows\system32\mfc42u.dll
2010-09-18 06:53:25 974848 ----a-w- c:\windows\system32\mfc42.dll
2010-09-18 06:53:25 954368 ----a-w- c:\windows\system32\mfc40.dll
2010-09-18 06:53:25 953856 ----a-w- c:\windows\system32\mfc40u.dll
2010-09-10 05:58:08 916480 ----a-w- c:\windows\system32\wininet.dll
2010-09-10 05:58:06 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-09-10 05:58:06 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-09-01 11:51:14 285824 ----a-w- c:\windows\system32\atmfd.dll
2010-08-31 13:42:52 1852800 ----a-w- c:\windows\system32\win32k.sys
2010-08-27 08:02:29 119808 ----a-w- c:\windows\system32\t2embed.dll
2010-08-27 05:57:43 99840 ----a-w- c:\windows\system32\srvsvc.dll
2010-08-26 12:52:45 5120 ----a-w- c:\windows\system32\xpsp4res.dll
2010-08-23 16:12:04 617472 ----a-w- c:\windows\system32\comctl32.dll
2010-08-17 13:17:06 58880 ----a-w- c:\windows\system32\spoolsv.exe
2010-08-16 08:45:00 590848 ----a-w- c:\windows\system32\rpcrt4.dll

============= FINISH: 18:10:58.50 ===============

Attached Files


Edited by bensy, 19 October 2010 - 05:50 PM.


#4 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 20 October 2010 - 02:58 PM

Hi. I didn't know if I was supposed to use the "add reply" button rather than the "reply" button. In case you needed the former to notify you, I've clicked on it. You can see my reply with DDS logs in the previous reply. Thanks again.

#5 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 20 October 2010 - 07:31 PM

Hi, Bensy-

Welcome to Bleeping Computer.

My name is Shannon and I will be working with you to remove the malware that is on your machine.

I apologize for the delay in replying to your post, but this forum is extremely busy.

There may be a delay in my response to your posts as I am still currently in training. I will be helping you with supervision of the teachers and they will approve every posts before I present them to you.

Please don't make any further changes or run any other tools unless instructed to. Additional changes may hinder the cleaning of your machine.

When asked to copy logs or reports into your reply, please copy them directly into your reply. Do not include them in quotes. Do not attach them unless asked to do so. In Notepad, please turn off Word Wrap under the Format menu.

Please Track this topic - On the top right on this tread, click on the Option button, and, in the drop-down list, click on 'Track this topic'. Under Subscription Information, click on 'Immediate Email Notification' and then click on the Proceed button at the bottom.

Please give me some time to look over your log. I will post the reply as soon as possible.
Shannon

#6 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 21 October 2010 - 06:55 PM

Hi-

Thanks for the logs.

Since GMER will not do the job for us, let's use another program-

  • Please download Rootkit Unhooker (RKU)and save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.

    Copy the entire contents of the report and paste it in your reply.
Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


In your reply, please copy in the RKU report. Also, tell me how you computer is running.
Shannon

#7 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 21 October 2010 - 07:06 PM

Hi Shannon. Thanks for your help.

I've posted the log below. My computer is not running well. I continue to have the brower redirects and pop-ups, Chrome seems to be broken, and I continue to get the "Generic Host Process for Win32 Services has closed" error, which freezes my computer. Every once in awhile, rebooting from this freeze gets me a BSOD with a "stop 0x000000007b" error message (not sure exactly how many zeroes, as the message goes by very quickly). If I fiddle with rebooting long enough, I'll get into safe mode, then I can normally boot. Turning off my internet connection seems to radically reduce the frequency of these Win32 errors, though I may just be imagining that.

I have kept scanning with Malware, SuperAntispyware, and Macafee, and all come out clean.

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
>Drivers
==============================================
0xF5DF3000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 5304320 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xF5978000 C:\WINDOWS\system32\DRIVERS\NETw5x32.sys 4202496 bytes (Intel Corporation, Intel® Wireless WiFi Link Driver)
0xBF19B000 C:\WINDOWS\System32\ati3duag.dll 3932160 bytes (ATI Technologies Inc. , ati3duag.dll)
0xBF55B000 C:\WINDOWS\System32\ativvaxx.dll 2379776 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2150400 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2150400 bytes
0x804D7000 RAW 2150400 bytes
0x804D7000 WMIxWDM 2150400 bytes
0xBF800000 Win32k 1855488 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1855488 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF7265000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xBF062000 C:\WINDOWS\System32\ati2cqag.dll 561152 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xAC5FC000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xBF0EB000 C:\WINDOWS\System32\atikvmag.dll 446464 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xF0C6B000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xAC729000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xA30EE000 C:\WINDOWS\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xF71CC000 mfehidk.sys 335872 bytes (McAfee, Inc., McAfee Link Driver)
0xBF012000 C:\WINDOWS\System32\ati2dvag.dll 327680 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xBF158000 C:\WINDOWS\System32\atiok3x2.dll 274432 bytes (ATI Technologies Inc., Ring 0 x2 component)
0xA2B24000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF5D7A000 C:\WINDOWS\system32\DRIVERS\e1e5132.sys 249856 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 5.2 deserialized driver)
0xAE7CE000 C:\WINDOWS\system32\drivers\ADIHdAud.sys 196608 bytes (Analog Devices, Inc., High Definition Audio Function Driver(Release Candidate 1))
0xF0CC9000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF73A2000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xA3286000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF7238000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF5928000 C:\WINDOWS\system32\DRIVERS\SynTP.sys 180224 bytes (Synaptics, Inc., Synaptics Touchpad Driver)
0xAC66C000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF5DB7000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 163840 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xAC6DB000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xAC703000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xAE7AA000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF5954000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF5905000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xAC6B9000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xAC697000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806E4000 ACPI_HAL 134400 bytes
0x806E4000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF731C000 fltMgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF7354000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF7373000 pcmcia.sys 122880 bytes (Microsoft Corporation, PCMCIA Bus Driver)
0xF721E000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF733C000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xA59B4000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xAE793000 C:\WINDOWS\system32\drivers\AEAudio.sys 94208 bytes (Andrea Electronics Corporation, Audio Noise Filtering Driver (32-bit))
0xF7305000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF58EE000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xA379E000 C:\WINDOWS\system32\DRIVERS\irda.sys 90112 bytes (Microsoft Corporation, IRDA Protocol Driver)
0xA2AE7000 C:\WINDOWS\system32\drivers\mfeavfk.sys 86016 bytes (McAfee, Inc., Anti-Virus File System Filter Driver)
0xA3671000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF5DDF000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xAC782000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xF72F2000 WudfPf.sys 77824 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xA2C05000 C:\WINDOWS\system32\drivers\mfeapfk.sys 69632 bytes (McAfee, Inc., Access Protection Filter Driver)
0xF7391000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF58DD000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xA636C000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF7731000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF31F1000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF7741000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF76D1000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF23A2000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xACA6D000 C:\WINDOWS\system32\drivers\mfetdik.sys 57344 bytes (McAfee, Inc., Anti-Virus Mini-Firewall Driver)
0xF7511000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF7711000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF7541000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF74F1000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF7561000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xACA3D000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF7721000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF74E1000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF7551000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF74D1000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF3221000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF3231000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF7501000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xACA2D000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF7701000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xA2D06000 C:\WINDOWS\system32\drivers\mfebopk.sys 36864 bytes (McAfee, Inc., Buffer Overflow Protection Driver)
0xF7571000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xACA4D000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xA2C96000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xACA5D000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF7849000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xACB36000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xA629C000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xF7821000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xACB4E000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF7841000 C:\WINDOWS\system32\DRIVERS\ibmpmdrv.sys 28672 bytes (IBM Corp., IBM ThinkPad Power Management Driver)
0xF7839000 C:\WINDOWS\system32\DRIVERS\nscirda.sys 28672 bytes (National Semiconductor Corporation, NSC Fast Infrared Driver.)
0xF7751000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7761000 pssnap.sy@ 28672 bytes (Macrium Software, Backup image protection)
0xF2431000 C:\WINDOWS\system32\DRIVERS\RimSerial.sys 28672 bytes (Research in Motion Ltd, RIM Virtual Serial Driver)
0xA62A4000 C:\WINDOWS\system32\DRIVERS\usbprint.sys 28672 bytes (Microsoft Corporation, USB Printer driver)
0xF7829000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7831000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xACB2E000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xF7819000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xACB46000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xACB3E000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7759000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF2441000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7851000 C:\WINDOWS\system32\DRIVERS\rasirda.sys 20480 bytes (Microsoft Corporation, IrDA WAN Miniport Driver)
0xF2439000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7859000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xA628C000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF78ED000 C:\WINDOWS\system32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xF6B14000 C:\WINDOWS\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xA6A78000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF56F8000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xA6326000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF78F1000 ACPIEC.sys 12288 bytes (Microsoft Corporation, ACPI Embedded Controller Driver)
0xF78E5000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF78E9000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xA6336000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xAE74B000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF6B1C000 C:\WINDOWS\system32\DRIVERS\irenum.sys 12288 bytes (Microsoft Corporation, Infra-Red Bus Enumerator)
0x86EC5000 C:\WINDOWS\system32\KDCOM.DLL 12288 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7991000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF797D000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xAE76B000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xA631E000 C:\WINDOWS\system32\DRIVERS\s24trans.sys 12288 bytes (Intel Corporation, Intel WLAN Packet Driver)
0xF79E3000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7A01000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7A05000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A07000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7A0F000 C:\WINDOWS\System32\Drivers\RootMdm.sys 8192 bytes (Microsoft Corporation, Legacy Non-Pnp Modem Device Driver)
0xF79D3000 speedfan.sys 8192 bytes
0xF7A85000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7A0D000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF79D1000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7B30000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xACE1E000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7A9B000 giveio.sys 4096 bytes
0xACE62000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7A9A000 C:\WINDOWS\system32\DRIVERS\OPRGHDLR.SYS 4096 bytes (Microsoft Corporation, ACPI Operation Registration Driver)
0xF7A99000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
!!!!!!!!!!!Hidden driver: 0x86EF0292 ?_empty_? 3438 bytes
==============================================
>Stealth
==============================================
0xF733C000 WARNING: suspicious driver modification [atapi.sys::0x86EF0292]
0x05AD0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 102400 bytes
0x063E0000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 1036288 bytes
0x06B70000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 110592 bytes
0x010B0000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 118784 bytes
0x03C80000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 118784 bytes
0x066D0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 126976 bytes
0x065F0000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 143360 bytes
0x060B0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 1699840 bytes
0x06B40000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 184320 bytes
0x06250000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 217088 bytes
0x06620000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 233472 bytes
0x04EA0000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 274432 bytes
0x01280000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 28672 bytes
0x014A0000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 28672 bytes
0x04690000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x01130000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x01160000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x03D10000 Hidden Image-->LOCALIZATION.Foundation.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x03DE0000 Hidden Image-->CLI.Component.Runtime.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x046E0000 Hidden Image-->AEM.Plugin.Hotkeys.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x046C0000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04710000 Hidden Image-->AEM.Plugin.WinMessages.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04850000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04840000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04900000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04F60000 Hidden Image-->AEM.Plugin.GD.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04EF0000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04F10000 Hidden Image-->DEM.Graphics.I0709.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04F40000 Hidden Image-->AEM.Actions.CCAA.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x04FB0000 Hidden Image-->DEM.Graphics.I0804.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05150000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05120000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05110000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x051B0000 Hidden Image-->DEM.Graphics.I0805.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x051D0000 Hidden Image-->DEM.Graphics.I0706.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x053D0000 Hidden Image-->DEM.Graphics.I0712.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05420000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05520000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x058A0000 Hidden Image-->CLI.Component.Runtime.Extension.EEU.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x058B0000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x058D0000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05A00000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05A10000 Hidden Image-->Branding.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05BD0000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x05DE0000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x06290000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x062D0000 Hidden Image-->atixclib.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x065E0000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 28672 bytes
0x014C0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x84EC3DA0 ] PID: 784, 307200 bytes
0x011A0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 307200 bytes
0x05B80000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 315392 bytes
0x06880000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 364544 bytes
0x03B90000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 36864 bytes
0x03BC0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 36864 bytes
0x05E00000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x05370000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x03E20000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x01100000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x03CB0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x03D30000 Hidden Image-->AxInterop.WBOCXLib.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x03F00000 Hidden Image-->Interop.WBOCXLib.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x04060000 Hidden Image-->LOCALIZATION.Foundation.Implementation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x04860000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x05180000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x05250000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x05290000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x053F0000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x054F0000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 36864 bytes
0x05D70000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 405504 bytes
0x05B10000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 413696 bytes
0x06770000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 413696 bytes
0x04910000 Hidden Image-->ATIDEMGX.dll [ EPROCESS 0x86D8E6D0 ] PID: 2236, 438272 bytes
0x066F0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 446464 bytes
0x06660000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 446464 bytes
0x010E0000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 45056 bytes
0x01150000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 45056 bytes
0x01120000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x01200000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x03DF0000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x051E0000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x05190000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x05280000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x05350000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 45056 bytes
0x067E0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 462848 bytes
0x05BF0000 Hidden Image-->CLI.Component.Systemtray.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 487424 bytes
0x05A30000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 495616 bytes
0x03DD0000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x03DC0000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x03E00000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x046A0000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x04830000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x05170000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x05240000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x05320000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x05870000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x059F0000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x05AC0000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 53248 bytes
0x068E0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 602112 bytes
0x03CA0000 Hidden Image-->CLI.Component.SkinFactory.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x048F0000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x05330000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x05380000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x05450000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x054C0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x054D0000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 61440 bytes
0x01160000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x84EC3DA0 ] PID: 784, 69632 bytes
0x01140000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 69632 bytes
0x01170000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 69632 bytes
0x053A0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 69632 bytes
0x05430000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 69632 bytes
0x05500000 Hidden Image-->APM.Server.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 69632 bytes
0x03DA0000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 77824 bytes
0x04F70000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 77824 bytes
0x05130000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 77824 bytes
0x05210000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 77824 bytes
0x06A50000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 823296 bytes
0x051F0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 86016 bytes
0x054A0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 86016 bytes
0x062B0000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x86D8E6D0 ] PID: 2236, 86016 bytes




Hi-

Thanks for the logs.

Since GMER will not do the job for us, let's use another program-

  • Please download Rootkit Unhooker (RKU)and save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.

    Copy the entire contents of the report and paste it in your reply.
Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


In your reply, please copy in the RKU report. Also, tell me how you computer is running.



#8 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 22 October 2010 - 03:14 PM

Hi-

The RKU report confirms that you have one or more infections, and one is a backdoor trojan. A backdoor trojan allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

If you decide to continue with the cleaning -

Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.
  • Double click TDSSKiller.exe
  • Press Start Scan
  • If Malicious objects are found then ensure Cure is selected
  • Click Continue > Reboot now
  • Copy and paste the log in your next reply
    Note:A copy of the log will be saved automatically to the root of the drive (typically C:\)
In your reply, please copy in the TDSSKiller report.

Thanks,
Shannon

#9 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 22 October 2010 - 03:59 PM

Hi Shannon,

Thanks for your help. TDSS killer did find something, and I have enclosed the log. I don't know if this is useful information but I ran TDSS killer a couple weeks ago, right after I was infected, and it didn't find anything.

I ran TDSS killer after it cleaned and rebooted, and the scan comes out clean.

Just so I know -- is it hard to tell if I'm still infected? Is that why people recommend and format and reinstall?

2010/10/22 16:50:56.0046 TDSS rootkit removing tool 2.4.4.0 Oct 4 2010 09:06:59
2010/10/22 16:50:56.0046 ================================================================================
2010/10/22 16:50:56.0046 SystemInfo:
2010/10/22 16:50:56.0046
2010/10/22 16:50:56.0046 OS Version: 5.1.2600 ServicePack: 3.0
2010/10/22 16:50:56.0046 Product type: Workstation
2010/10/22 16:50:56.0046 ComputerName: YOST-8D27AA7C1F
2010/10/22 16:50:56.0046 UserName: Ben
2010/10/22 16:50:56.0046 Windows directory: C:\WINDOWS
2010/10/22 16:50:56.0046 System windows directory: C:\WINDOWS
2010/10/22 16:50:56.0046 Processor architecture: Intel x86
2010/10/22 16:50:56.0046 Number of processors: 2
2010/10/22 16:50:56.0046 Page size: 0x1000
2010/10/22 16:50:56.0046 Boot type: Normal boot
2010/10/22 16:50:56.0046 ================================================================================
2010/10/22 16:50:56.0359 Initialize success
2010/10/22 16:50:58.0531 ================================================================================
2010/10/22 16:50:58.0531 Scan started
2010/10/22 16:50:58.0531 Mode: Manual;
2010/10/22 16:50:58.0531 ================================================================================
2010/10/22 16:50:59.0531 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2010/10/22 16:50:59.0562 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
2010/10/22 16:50:59.0625 ADIHdAudAddService (beee84a79710f705864685b05f1bb172) C:\WINDOWS\system32\drivers\ADIHdAud.sys
2010/10/22 16:50:59.0687 AEAudioService (358063ab6c1c4173b735525cdfa65f94) C:\WINDOWS\system32\drivers\AEAudio.sys
2010/10/22 16:50:59.0734 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2010/10/22 16:50:59.0796 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2010/10/22 16:51:00.0218 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2010/10/22 16:51:00.0281 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2010/10/22 16:51:00.0500 ati2mtag (d751308d47fdd78ab52477749e7b2431) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
2010/10/22 16:51:00.0656 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2010/10/22 16:51:00.0718 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2010/10/22 16:51:00.0750 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2010/10/22 16:51:00.0812 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2010/10/22 16:51:00.0843 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2010/10/22 16:51:00.0906 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2010/10/22 16:51:00.0953 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2010/10/22 16:51:01.0000 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
2010/10/22 16:51:01.0031 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
2010/10/22 16:51:01.0156 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2010/10/22 16:51:01.0218 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2010/10/22 16:51:01.0296 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2010/10/22 16:51:01.0312 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2010/10/22 16:51:01.0375 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2010/10/22 16:51:01.0437 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2010/10/22 16:51:01.0484 e1express (180b383bb935487e01ee6e4b50aa969e) C:\WINDOWS\system32\DRIVERS\e1e5132.sys
2010/10/22 16:51:01.0562 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2010/10/22 16:51:01.0593 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
2010/10/22 16:51:01.0625 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2010/10/22 16:51:01.0640 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
2010/10/22 16:51:01.0703 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
2010/10/22 16:51:01.0750 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2010/10/22 16:51:01.0765 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2010/10/22 16:51:01.0812 giveio (77ebf3e9386daa51551af429052d88d0) C:\WINDOWS\system32\giveio.sys
2010/10/22 16:51:01.0828 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2010/10/22 16:51:01.0875 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
2010/10/22 16:51:01.0921 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2010/10/22 16:51:01.0984 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2010/10/22 16:51:02.0078 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/10/22 16:51:02.0140 IBMPMDRV (293131c1da5f53cb05f75d637739d79c) C:\WINDOWS\system32\DRIVERS\ibmpmdrv.sys
2010/10/22 16:51:02.0171 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2010/10/22 16:51:02.0296 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2010/10/22 16:51:02.0343 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
2010/10/22 16:51:02.0390 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2010/10/22 16:51:02.0421 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2010/10/22 16:51:02.0484 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2010/10/22 16:51:02.0531 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2010/10/22 16:51:02.0593 irda (aca5e7b54409f9cb5eed97ed0c81120e) C:\WINDOWS\system32\DRIVERS\irda.sys
2010/10/22 16:51:02.0609 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2010/10/22 16:51:02.0671 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2010/10/22 16:51:02.0750 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2010/10/22 16:51:02.0765 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2010/10/22 16:51:02.0796 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2010/10/22 16:51:02.0828 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2010/10/22 16:51:02.0968 MEMSWEEP2 (d70476ad02d6fd75282b196d3b58831d) C:\WINDOWS\system32\2.tmp
2010/10/22 16:51:03.0031 mfeapfk (d0813cf480e3d38a265f3be86522bf3b) C:\WINDOWS\system32\drivers\mfeapfk.sys
2010/10/22 16:51:03.0093 mfeavfk (04440cc0f5f89933babd585cc5f2f70e) C:\WINDOWS\system32\drivers\mfeavfk.sys
2010/10/22 16:51:03.0140 mfebopk (f6e257c31e0c354a2ed22bf5026c2466) C:\WINDOWS\system32\drivers\mfebopk.sys
2010/10/22 16:51:03.0156 mfehidk (79fae8ce9a478f79b74873a810c8227e) C:\WINDOWS\system32\drivers\mfehidk.sys
2010/10/22 16:51:03.0203 mferkdet (f21bf10a3784e52eec925bb5f7d3fffa) C:\WINDOWS\system32\drivers\mferkdet.sys
2010/10/22 16:51:03.0234 mfetdik (f2d4d0f8e230257a0be36df803b549d1) C:\WINDOWS\system32\drivers\mfetdik.sys
2010/10/22 16:51:03.0265 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2010/10/22 16:51:03.0312 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2010/10/22 16:51:03.0390 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2010/10/22 16:51:03.0437 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2010/10/22 16:51:03.0468 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2010/10/22 16:51:03.0515 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2010/10/22 16:51:03.0562 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2010/10/22 16:51:03.0625 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2010/10/22 16:51:03.0687 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2010/10/22 16:51:03.0718 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2010/10/22 16:51:03.0796 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2010/10/22 16:51:03.0843 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2010/10/22 16:51:03.0906 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2010/10/22 16:51:03.0968 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2010/10/22 16:51:04.0000 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2010/10/22 16:51:04.0046 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2010/10/22 16:51:04.0078 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2010/10/22 16:51:04.0093 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2010/10/22 16:51:04.0125 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2010/10/22 16:51:04.0156 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2010/10/22 16:51:04.0343 NETw5x32 (ccdb8db66acd3c0a6c8e171b79f60ac4) C:\WINDOWS\system32\DRIVERS\NETw5x32.sys
2010/10/22 16:51:04.0531 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2010/10/22 16:51:04.0578 NSCIRDA (2adc0ca9945c65284b3d19bc18765974) C:\WINDOWS\system32\DRIVERS\nscirda.sys
2010/10/22 16:51:04.0640 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2010/10/22 16:51:04.0718 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2010/10/22 16:51:04.0781 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2010/10/22 16:51:04.0796 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2010/10/22 16:51:04.0843 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
2010/10/22 16:51:04.0906 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2010/10/22 16:51:04.0953 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2010/10/22 16:51:05.0015 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2010/10/22 16:51:05.0078 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2010/10/22 16:51:05.0140 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
2010/10/22 16:51:05.0281 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2010/10/22 16:51:05.0296 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2010/10/22 16:51:05.0328 pssnap (7a5a25c3632a87572503050f402a3bfa) C:\WINDOWS\system32\DRIVERS\pssnap.sy@
2010/10/22 16:51:05.0359 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2010/10/22 16:51:05.0468 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2010/10/22 16:51:05.0515 Rasirda (0207d26ddf796a193ccd9f83047bb5fc) C:\WINDOWS\system32\DRIVERS\rasirda.sys
2010/10/22 16:51:05.0546 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2010/10/22 16:51:05.0562 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2010/10/22 16:51:05.0609 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2010/10/22 16:51:05.0687 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2010/10/22 16:51:05.0703 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2010/10/22 16:51:05.0734 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2010/10/22 16:51:05.0781 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2010/10/22 16:51:05.0828 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2010/10/22 16:51:05.0890 RimVSerPort (2c4fb2e9f039287767c384e46ee91030) C:\WINDOWS\system32\DRIVERS\RimSerial.sys
2010/10/22 16:51:05.0937 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys
2010/10/22 16:51:05.0984 s24trans (96b4494d4734970f47c566e098c4f527) C:\WINDOWS\system32\DRIVERS\s24trans.sys
2010/10/22 16:51:06.0078 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
2010/10/22 16:51:06.0093 SASENUM (7ce61c25c159f50f9eaf6d77fc83fa35) C:\Program Files\SUPERAntiSpyware\SASENUM.SYS
2010/10/22 16:51:06.0125 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys
2010/10/22 16:51:06.0203 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2010/10/22 16:51:06.0218 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
2010/10/22 16:51:06.0250 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2010/10/22 16:51:06.0328 speedfan (5d6401db90ec81b71f8e2c5c8f0fef23) C:\WINDOWS\system32\speedfan.sys
2010/10/22 16:51:06.0375 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2010/10/22 16:51:06.0406 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2010/10/22 16:51:06.0484 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
2010/10/22 16:51:06.0640 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2010/10/22 16:51:06.0687 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2010/10/22 16:51:06.0781 SynTP (b55024af8a5f940a4723f3b62ccbf349) C:\WINDOWS\system32\DRIVERS\SynTP.sys
2010/10/22 16:51:06.0812 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2010/10/22 16:51:06.0859 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2010/10/22 16:51:06.0906 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2010/10/22 16:51:06.0937 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2010/10/22 16:51:06.0968 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2010/10/22 16:51:07.0046 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2010/10/22 16:51:07.0109 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2010/10/22 16:51:07.0171 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2010/10/22 16:51:07.0234 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2010/10/22 16:51:07.0281 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2010/10/22 16:51:07.0312 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2010/10/22 16:51:07.0375 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2010/10/22 16:51:07.0421 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2010/10/22 16:51:07.0468 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2010/10/22 16:51:07.0515 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2010/10/22 16:51:07.0578 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2010/10/22 16:51:07.0609 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2010/10/22 16:51:07.0656 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2010/10/22 16:51:07.0734 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys
2010/10/22 16:51:07.0781 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2010/10/22 16:51:07.0796 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2010/10/22 16:51:07.0859 \HardDisk0\MBR - detected Rootkit.Win32.TDSS.tdl4 (0)
2010/10/22 16:51:07.0859 ================================================================================
2010/10/22 16:51:07.0859 Scan finished
2010/10/22 16:51:07.0859 ================================================================================
2010/10/22 16:51:07.0875 Detected object count: 1
2010/10/22 16:51:16.0250 \HardDisk0\MBR - will be cured after reboot
2010/10/22 16:51:16.0250 Rootkit.Win32.TDSS.tdl4(\HardDisk0\MBR) - User select action: Cure
2010/10/22 16:51:33.0703 Deinitialize success

Edited by bensy, 22 October 2010 - 04:16 PM.


#10 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 23 October 2010 - 09:00 AM

Hi-

I was happy to see that TDSSKiller found the infection, but this type of infection is hard to get rid of even though TDSSKiller says it is fixed. To be sure it is gone, we need to run RKU again.

  • Double-click on RKUnhookerLE.exe on your desktop to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.

    Copy the entire contents of the report and paste it in your reply.
Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


On your question - "is it hard to tell if I'm still infected? Is that why people recommend and format and reinstall?" - A backdoor infection creates a security vulnerability on the host's computer. When the infection is cleaned, the vulnerability remains. It is this vulnerability that may or may not be used by other malware in the future.

In your reply, please copy in the RKU report. How is computer doing now?
Shannon

#11 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 23 October 2010 - 04:29 PM

Hi Shannon,
I've pasted the log below.

I still have browser redirects. I haven't been online long enough to see if I'm getting popups -- I'll edit this page if I get any. Otherwise, the computer seems better. I have not yet gotten the Win32 error I was getting before.

Thanks!

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
>Drivers
==============================================
0xF670C000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 5304320 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xF6291000 C:\WINDOWS\system32\DRIVERS\NETw5x32.sys 4202496 bytes (Intel Corporation, Intel® Wireless WiFi Link Driver)
0xBF19B000 C:\WINDOWS\System32\ati3duag.dll 3932160 bytes (ATI Technologies Inc. , ati3duag.dll)
0xBF55B000 C:\WINDOWS\System32\ativvaxx.dll 2379776 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2150400 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2150400 bytes
0x804D7000 RAW 2150400 bytes
0x804D7000 WMIxWDM 2150400 bytes
0xBF800000 Win32k 1855488 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1855488 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF7265000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xBF062000 C:\WINDOWS\System32\ati2cqag.dll 561152 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xAD1CA000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xBF0EB000 C:\WINDOWS\System32\atikvmag.dll 446464 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xF6168000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xAD31F000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xAA374000 C:\WINDOWS\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xF71CC000 mfehidk.sys 335872 bytes (McAfee, Inc., McAfee Link Driver)
0xBF012000 C:\WINDOWS\System32\ati2dvag.dll 327680 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xBF158000 C:\WINDOWS\System32\atiok3x2.dll 274432 bytes (ATI Technologies Inc., Ring 0 x2 component)
0xA9D6D000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF6693000 C:\WINDOWS\system32\DRIVERS\e1e5132.sys 249856 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 5.2 deserialized driver)
0xAE18E000 C:\WINDOWS\system32\drivers\ADIHdAud.sys 196608 bytes (Analog Devices, Inc., High Definition Audio Function Driver(Release Candidate 1))
0xF61C6000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF73A2000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xAA50C000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF7238000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF6241000 C:\WINDOWS\system32\DRIVERS\SynTP.sys 180224 bytes (Synaptics, Inc., Synaptics Touchpad Driver)
0xAD23A000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF66D0000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 163840 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xAD2D1000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xAD2F9000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xAE16A000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF626D000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF621E000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xAD287000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xAD265000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806E4000 ACPI_HAL 134400 bytes
0x806E4000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF731C000 fltMgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF7354000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF7373000 pcmcia.sys 122880 bytes (Microsoft Corporation, PCMCIA Bus Driver)
0xF721E000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF733C000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xAD1B2000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xAE0B3000 C:\WINDOWS\system32\drivers\AEAudio.sys 94208 bytes (Andrea Electronics Corporation, Audio Noise Filtering Driver (32-bit))
0xF7305000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF6207000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xAAC7C000 C:\WINDOWS\system32\DRIVERS\irda.sys 90112 bytes (Microsoft Corporation, IRDA Protocol Driver)
0xA9E76000 C:\WINDOWS\system32\drivers\mfeavfk.sys 86016 bytes (McAfee, Inc., Anti-Virus File System Filter Driver)
0xAAA0F000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF66F8000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xAD378000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xF72F2000 WudfPf.sys 77824 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xAA01B000 C:\WINDOWS\system32\drivers\mfeapfk.sys 69632 bytes (McAfee, Inc., Access Protection Filter Driver)
0xF7391000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF61F6000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xAE0FA000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF7561000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF7601000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF7571000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xAAB1C000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF7641000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF7671000 C:\WINDOWS\system32\drivers\mfetdik.sys 57344 bytes (McAfee, Inc., Anti-Virus Mini-Firewall Driver)
0xF7511000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF7541000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF7581000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF74F1000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF75A1000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF76A1000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF7551000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF74E1000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF7591000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF74D1000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF75D1000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF75C1000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF7501000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF7661000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF7741000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xAA1CC000 C:\WINDOWS\system32\drivers\mfebopk.sys 36864 bytes (McAfee, Inc., Buffer Overflow Protection Driver)
0xF75B1000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF7691000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xAA1FC000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF7681000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF7849000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF78B1000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF77D1000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xF7821000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF7899000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF7841000 C:\WINDOWS\system32\DRIVERS\ibmpmdrv.sys 28672 bytes (IBM Corp., IBM ThinkPad Power Management Driver)
0xF7839000 C:\WINDOWS\system32\DRIVERS\nscirda.sys 28672 bytes (National Semiconductor Corporation, NSC Fast Infrared Driver.)
0xF7751000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7761000 pssnap.sy@ 28672 bytes (Macrium Software, Backup image protection)
0xF7871000 C:\WINDOWS\system32\DRIVERS\RimSerial.sys 28672 bytes (Research in Motion Ltd, RIM Virtual Serial Driver)
0xF77C9000 C:\WINDOWS\system32\DRIVERS\usbprint.sys 28672 bytes (Microsoft Corporation, USB Printer driver)
0xF7829000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7831000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF78B9000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xF7819000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF78A1000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF78A9000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7759000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF7861000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7851000 C:\WINDOWS\system32\DRIVERS\rasirda.sys 20480 bytes (Microsoft Corporation, IrDA WAN Miniport Driver)
0xF7869000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7859000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF77D9000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF78E9000 C:\WINDOWS\system32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xF79A1000 C:\WINDOWS\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xF7989000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF79C5000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xAAE5E000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF78ED000 ACPIEC.sys 12288 bytes (Microsoft Corporation, ACPI Embedded Controller Driver)
0xF78E1000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF78E5000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xF611E000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF6C3B000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF7999000 C:\WINDOWS\system32\DRIVERS\irenum.sys 12288 bytes (Microsoft Corporation, Infra-Red Bus Enumerator)
0xAD2A9000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF79AD000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF6C37000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xAAE56000 C:\WINDOWS\system32\DRIVERS\s24trans.sys 12288 bytes (Intel Corporation, Intel WLAN Packet Driver)
0xF79DF000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7A1F000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF79D1000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7A23000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A25000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7A15000 C:\WINDOWS\System32\Drivers\RootMdm.sys 8192 bytes (Microsoft Corporation, Legacy Non-Pnp Modem Device Driver)
0xF79D5000 speedfan.sys 8192 bytes
0xF7A17000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7A13000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF79D3000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7AC2000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7BDC000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7A9B000 giveio.sys 4096 bytes
0xF7BCD000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7A9A000 C:\WINDOWS\system32\DRIVERS\OPRGHDLR.SYS 4096 bytes (Microsoft Corporation, ACPI Operation Registration Driver)
0xF7A99000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================
0x05900000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 102400 bytes
0x05FC0000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 1036288 bytes
0x06780000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 110592 bytes
0x00D20000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 118784 bytes
0x038A0000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 118784 bytes
0x062F0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 126976 bytes
0x06210000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 143360 bytes
0x05AC0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 1699840 bytes
0x06750000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 184320 bytes
0x05C60000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 217088 bytes
0x06240000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 233472 bytes
0x049A0000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 274432 bytes
0x00EF0000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 28672 bytes
0x01110000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 28672 bytes
0x00D50000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x00D80000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03980000 Hidden Image-->LOCALIZATION.Foundation.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03970000 Hidden Image-->CLI.Component.Runtime.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03C30000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03D90000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03EC0000 Hidden Image-->AEM.Plugin.Hotkeys.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x03EF0000 Hidden Image-->AEM.Plugin.WinMessages.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x040A0000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x040B0000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04A00000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04A30000 Hidden Image-->DEM.Graphics.I0709.dll [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04A10000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04B00000 Hidden Image-->AEM.Plugin.GD.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04A60000 Hidden Image-->AEM.Actions.CCAA.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04B50000 Hidden Image-->DEM.Graphics.I0804.dll [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04CB0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04CC0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04D70000 Hidden Image-->DEM.Graphics.I0706.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04CF0000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04D50000 Hidden Image-->DEM.Graphics.I0805.dll [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04EF0000 Hidden Image-->DEM.Graphics.I0712.dll [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x04F40000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x05150000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x053B0000 Hidden Image-->CLI.Component.Runtime.Extension.EEU.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x054E0000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x05590000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x055B0000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x055D0000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x05CC0000 Hidden Image-->atixclib.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x05EA0000 Hidden Image-->Branding.dll [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x05EB0000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x060C0000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x06200000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 28672 bytes
0x01130000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x8518EDA0 ] PID: 1340, 307200 bytes
0x00DC0000 Hidden Image-->System.Runtime.Remoting.dll [ EPROCESS 0x84EA3730 ] PID: 636, 307200 bytes
0x05E50000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 315392 bytes
0x064A0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 364544 bytes
0x01200000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 36864 bytes
0x01230000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 36864 bytes
0x039B0000 Hidden Image-->AxInterop.WBOCXLib.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x00D20000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x038D0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x039F0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x03B30000 Hidden Image-->Interop.WBOCXLib.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04140000 Hidden Image-->LOCALIZATION.Foundation.Implementation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x049F0000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04D20000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04DF0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04E20000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04E90000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x04F10000 Hidden Image-->CLI.Aspect.WorkstationConfig2.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x05010000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x05570000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 36864 bytes
0x056E0000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 405504 bytes
0x05DD0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 413696 bytes
0x06390000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 413696 bytes
0x040C0000 Hidden Image-->ATIDEMGX.dll [ EPROCESS 0x84EA3730 ] PID: 636, 438272 bytes
0x06310000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 446464 bytes
0x06280000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 446464 bytes
0x00D50000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 45056 bytes
0x00DC0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 45056 bytes
0x00D40000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x00E20000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x03990000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x04D30000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x04D80000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x04E10000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x04E80000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 45056 bytes
0x06410000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 462848 bytes
0x054F0000 Hidden Image-->CLI.Component.Systemtray.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 487424 bytes
0x05880000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 495616 bytes
0x03960000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x03950000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x039D0000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x03C40000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x04010000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x04D10000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x04DE0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x04E40000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x05580000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x055C0000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x05860000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 53248 bytes
0x06500000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 602112 bytes
0x04FE0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x038C0000 Hidden Image-->CLI.Component.SkinFactory.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x04890000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x04E50000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x04EA0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x04F70000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x04FF0000 Hidden Image-->CLI.Aspect.PowerPlay3.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 61440 bytes
0x00DD0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x8518EDA0 ] PID: 1340, 69632 bytes
0x00D90000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 69632 bytes
0x00D60000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 69632 bytes
0x04EC0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 69632 bytes
0x04F50000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 69632 bytes
0x05130000 Hidden Image-->APM.Server.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 69632 bytes
0x03930000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 77824 bytes
0x04B10000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 77824 bytes
0x04CD0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 77824 bytes
0x04DB0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 77824 bytes
0x06670000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 823296 bytes
0x04D90000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 86016 bytes
0x04FC0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 86016 bytes
0x061E0000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x84EA3730 ] PID: 636, 86016 bytes

#12 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 24 October 2010 - 06:43 AM

Hi-

TDSSKiller was successful in ridding your computer of that infection. We now need to clean off the rest of the infections.

Download Combofix from either of the links below, and save it to your desktop. For information regarding this download, please visit this webpage: how-to-use-combofix

Link 1
Link 2

**Note: It is important that it is saved directly to your desktop**

1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

How to Temporarily Disable your Anti-virusl


Double click on combofix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please copy the "C:\ComboFix.txt" into your reply.
Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall


In your reply, please copy in the ComboFix log and tell me how your computer is running.

Thanks,
Shannon

#13 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 24 October 2010 - 11:46 AM

Hi Shannon,

I've posted the log below. Combofix had to install the recovery console, but I thought that wouldn't be a problem.

I haven't had much time to test out the computer, but the Google box redirect is gone (actually, my Google box is gone, replaced with a Yahoo search box, but I can fix that). I tried out some searches in Google, and there's no redirect there, either.

I'll update this post if anything fishy happens. Thanks again for your help.

ComboFix 10-10-23.02 - Ben 10/24/2010 12:29:31.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.556 [GMT -4:00]
Running from: c:\documents and settings\Ben\Desktop\ComboFix.exe
AV: McAfee VirusScan Enterprise *On-access scanning disabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Ben\Start Menu\Programs\Antimalware Doctor
c:\documents and settings\Ben\Start Menu\Programs\Antimalware Doctor\Antimalware Doctor.lnk
c:\documents and settings\Ben\Start Menu\Programs\Antimalware Doctor\Uninstall.lnk
c:\program files\Mozilla Firefox\searchplugins\google_search.xml
c:\windows\system32\1.tmp
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job

c:\windows\system32\winlogon.exe . . . is infected!!

c:\windows\explorer.exe . . . is infected!!

.
((((((((((((((((((((((((( Files Created from 2010-09-24 to 2010-10-24 )))))))))))))))))))))))))))))))
.

2010-10-20 19:49 . 2010-10-20 19:49 -------- d-----w- c:\documents and settings\Administrator
2010-10-19 21:54 . 2010-10-19 21:54 -------- d-----w- c:\program files\Common Files\Adobe
2010-10-18 20:06 . 2010-05-26 14:39 6144 ------w- c:\windows\system32\2.tmp
2010-10-15 02:41 . 2008-04-14 12:00 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-10-09 22:29 . 2010-10-09 22:29 -------- d-----w- c:\program files\Sophos
2010-10-08 22:32 . 2010-10-08 22:32 -------- d--h--w- c:\windows\PIF
2010-10-08 18:20 . 2010-10-08 18:20 -------- d-----w- c:\documents and settings\Ben\Application Data\Genieo
2010-10-08 18:20 . 2010-10-08 18:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Update
2010-10-08 18:19 . 2010-10-08 18:19 104960 --sha-r- c:\windows\system32\ati2cqag2.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-10-09 20:40 . 2010-01-28 21:12 15328 ----a-w- c:\windows\system32\drivers\pssnap.sys
2010-09-18 16:23 . 2008-04-14 12:00 974848 ----a-w- c:\windows\system32\mfc42u.dll
2010-09-18 06:53 . 2008-04-14 12:00 974848 ----a-w- c:\windows\system32\mfc42.dll
2010-09-18 06:53 . 2008-04-14 12:00 954368 ----a-w- c:\windows\system32\mfc40.dll
2010-09-18 06:53 . 2008-04-14 12:00 953856 ----a-w- c:\windows\system32\mfc40u.dll
2010-09-10 05:58 . 2008-04-14 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-09-10 05:58 . 2008-04-14 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-09-10 05:58 . 2008-04-14 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-09-04 19:12 . 2010-09-04 19:12 53248 ----a-r- c:\documents and settings\Ben\Application Data\Microsoft\Installer\{08DEC21F-F7E5-46F9-81D1-3ED30BD3AEC9}\ARPPRODUCTICON.exe
2010-09-01 11:51 . 2008-04-14 12:00 285824 ----a-w- c:\windows\system32\atmfd.dll
2010-08-31 13:42 . 2008-04-14 12:00 1852800 ----a-w- c:\windows\system32\win32k.sys
2010-08-27 08:02 . 2008-04-14 12:00 119808 ----a-w- c:\windows\system32\t2embed.dll
2010-08-27 05:57 . 2008-04-14 12:00 99840 ----a-w- c:\windows\system32\srvsvc.dll
2010-08-26 13:39 . 2008-04-14 12:00 357248 ------w- c:\windows\system32\drivers\srv.sys
2010-08-26 12:52 . 2009-10-24 16:23 5120 ----a-w- c:\windows\system32\xpsp4res.dll
2010-08-23 16:12 . 2008-04-14 12:00 617472 ----a-w- c:\windows\system32\comctl32.dll
2010-08-17 13:17 . 2008-04-14 12:00 58880 ----a-w- c:\windows\system32\spoolsv.exe
2010-08-16 08:45 . 2008-04-14 12:00 590848 ----a-w- c:\windows\system32\rpcrt4.dll
2008-09-29 12:07 . 2009-10-26 14:46 22576 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
.

------- Sigcheck -------

[-] 2008-04-14 . 3E196D79D9A9C970FDCD39E286D3C716 . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe

[-] 2008-04-14 . A0C6B042F07D1126F1063D2731DA1209 . 1033728 . . [6.00.2900.5512] . . c:\windows\explorer.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"GoodSync"="c:\program files\Siber Systems\GoodSync\GoodSync.exe" [2010-07-25 4679096]
"Google Update"="c:\documents and settings\Ben\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-10-23 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2005-09-15 110592]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-01 61440]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2005-05-20 925696]
"ShStatEXE"="c:\program files\McAfee\VirusScan Enterprise\SHSTAT.EXE" [2008-09-29 124240]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]
"itype"="c:\program files\Microsoft IntelliType Pro\itype.exe" [2008-06-10 1442888]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-09-23 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\McAfeeEngineService]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2009-10-23 22:20 133104 ----atw- c:\documents and settings\Ben\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\McAfeeUpdaterUI]
2008-03-14 08:00 136512 ----a-w- c:\program files\McAfee\Common Framework\UdaterUI.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
2010-10-09 20:53 2424560 ----a-w- c:\program files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
2005-09-15 20:57 512000 ----a-w- c:\program files\Synaptics\SynTP\SynTPEnh.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Documents and Settings\\Ben\\My Documents\\Downloads\\utorrent.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

R0 pssnap;Paramount Software Snapshot Filter;c:\windows\system32\drivers\pssnap.sy@ [10/8/2010 4:46 PM 15328]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [10/12/2009 9:24 PM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [10/12/2009 9:24 PM 67656]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\McAfee\VirusScan Enterprise\EngineServer.exe [9/29/2008 8:07 AM 19456]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [10/26/2009 10:46 AM 67904]
R2 ReflectService;Macrium Reflect Image Mounting Service;c:\program files\Macrium\Reflect\ReflectService.exe [1/28/2010 5:12 PM 220128]
S0 zteccc;zteccc; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [11/13/2009 5:37 PM 135664]
S3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\2.tmp [10/18/2010 4:06 PM 6144]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [10/26/2009 10:46 AM 64432]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [10/12/2009 9:24 PM 12872]

--- Other Services/Drivers In Memory ---

*Deregistered* - klmd25
*Deregistered* - Normandy
.
Contents of the 'Scheduled Tasks' folder

2010-10-19 c:\windows\Tasks\GoodSync - backup.job
- c:\program files\Siber Systems\GoodSync\GoodSync.exe [2010-07-25 04:22]

2010-10-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-11-13 21:37]

2010-10-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-11-13 21:37]

2010-10-22 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-854245398-1960408961-1801674531-1003Core.job
- c:\documents and settings\Ben\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-10-23 22:20]

2010-10-24 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-854245398-1960408961-1801674531-1003UA.job
- c:\documents and settings\Ben\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-10-23 22:20]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Ben\Application Data\Mozilla\Firefox\Profiles\nmr8w7cr.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=
FF - component: c:\documents and settings\Ben\Application Data\Mozilla\Firefox\Profiles\nmr8w7cr.default\extensions\{340c2bbc-ce74-4362-90b5-7c26312808ef}\platform\WINNT_x86-msvc\components\WeaveCrypto.dll
FF - component: c:\program files\Google\Google Gears\Firefox\lib\ff36\gears.dll
FF - component: c:\program files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}\components\SkypeFfComponent.dll
FF - plugin: c:\documents and settings\Ben\Local Settings\Application Data\Google\Update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\Google\Update\1.2.183.39\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: browser.search.selectedEngine - Google
FF - user.js: browser.search.order.1 - Google
FF - user.js: keyword.URL - hxxp://search.fast-find.net/?sid=10101063100&s=c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqz9s", true); // Traditional
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqs8s", true); // Simplified
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--j6w193g", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4a87g", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7c0a67fbc", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7cvafr", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kpry57d", true); // Traditional
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kprw13d", true); // Simplified
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-10-24 12:32
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\2.tmp"

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\pssnap]
"ImagePath"="system32\DRIVERS\pssnap.sy@"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-854245398-1960408961-1801674531-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-854245398-1960408961-1801674531-1003\Software\SecuROM\License information*]
"datasecu"=hex:45,a3,ed,37,a7,63,e7,46,0b,6b,64,0e,66,fc,99,d3,b0,af,22,f0,ce,
54,0c,d9,ca,b6,1b,a8,4d,ad,5d,c5,bd,ba,85,79,97,12,2c,c5,d4,90,64,ac,78,d4,\
"rkeysecu"=hex:87,83,6a,93,28,2b,0d,15,a2,f8,2f,53,40,5d,86,f9

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\software\Microsoft\Environment*]
"Licence0"="04F0D21-79D8-7A25-D702-433F"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(880)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-10-24 12:34:04
ComboFix-quarantined-files.txt 2010-10-24 16:34

Pre-Run: 4,572,930,048 bytes free
Post-Run: 4,761,677,824 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 1EE4DEAE0A5A09D8802F4CF2AAE46F50

#14 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:22 AM

Posted 25 October 2010 - 04:34 AM

Hi-

Thank you for the ComboFix log and the good news on how your is acting, but we are not finished yet. You have two files that are infected that ComboFix was not able to clean. We will have to do that manually.

First, in case we need it, do you have the system CD that came with your computer? We will first try to do without it.

Next, Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :filefind
    winlogon.exe
    explorer.exe
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

In your reply, please copy in the SystemLook log.
Shannon

#15 bensy

bensy
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:11:22 AM

Posted 25 October 2010 - 02:06 PM

Hi Shannon,

I have a legit copy of Windows XP Professional. That's all that came with my computer. I got my computer at a previous job where if anything went wrong, I could just take it in. I have a Thinkpad T60p and I've stripped out most of the IBM software anyway.

Here is the log. Thanks.

SystemLook 04.09.10 by jpshortstuff
Log created at 14:58 on 25/10/2010 by Ben
Administrator - Elevation successful

========== filefind ==========

Searching for "winlogon.exe"
C:\pebuilder3110a\BartPE\I386\SYSTEM32\WINLOGON.EXE --a---- 502272 bytes [17:43 04/04/2010] [04:56 04/08/2004] 01C3346C241652F43AED8E2149881BFE
C:\WINDOWS\system32\winlogon.exe --a---- 507904 bytes [12:00 14/04/2008] [12:00 14/04/2008] 3E196D79D9A9C970FDCD39E286D3C716

Searching for "explorer.exe"
C:\pebuilder3110a\BartPE\I386\EXPLORER.EXE --a---- 1032192 bytes [17:44 04/04/2010] [04:56 04/08/2004] A0732187050030AE399B241436565E64
C:\WINDOWS\explorer.exe --a---- 1033728 bytes [12:00 14/04/2008] [12:00 14/04/2008] A0C6B042F07D1126F1063D2731DA1209

-= EOF =-




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users