Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

webpages redirecting, google pops up new pages


  • This topic is locked This topic is locked
26 replies to this topic

#1 wiudavis

wiudavis

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 03 November 2010 - 01:00 AM

Well I attempted to run DDS and GMER without much luck. My DDS report came back with a bunch of scrambled letters and GMER had an error and stopped during the scan. I have ran Mawarebytes Anti-Malware but it will not update. I recently ran SuperAntispyware and removed around 400+ cookies, Malwarebytes still would not update. So I am in bad shape. I hope you can help. I am running Windows 7 and McAfee antivirus plus. Thanks

Update: 11-3-10. I have since turned off my mcafee and changed the file name of dds.scr to dds.exe. When I did that it ran about 3/4th of the way and windows crashed. I then reran dds.exe in save mode and I was able to get the two files. I then tried to run gmer from normal startup and got the blue screen again. After all that I decided I better wait to see what you guys suggest. I have attached my two notebook files. I am not sure if running in safe mode does you guys any good.

Attached Files


Edited by wiudavis, 03 November 2010 - 10:57 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 11 November 2010 - 01:13 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply



Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • extract RKUnhooker to your desktop
    Note** it is zipped up in a .rar file - If you do not have a program to unzip this type of file
    you can get a free one from here - http://www.7-zip.org/
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".


information and logs:

In your next post I need the following

1.logs from DDS
2.log from RKUnHooker
3.let me know of any problems you may have had
[/list]
Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 12:37 AM

Thank you so much for helping me, I really appreciate the help! Anyway, I was able to complete all of the steps that you listed above. The only problem I had is with the dds. It did not run correctly the 1st time, so I downloaded from Link 2 and it worked fine. You asked that I copy and paste my report from the rootkit unhooker. Here it is.

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows 7
Version 6.1.7600
Number of processors #2
==============================================
>Drivers
==============================================
0x8E82A000 C:\Windows\system32\DRIVERS\atikmdag.sys 4788224 bytes (ATI Technologies Inc., ATI Radeon Kernel Mode Driver)
0x83237000 C:\Windows\system32\ntkrnlpa.exe 4259840 bytes (Microsoft Corporation, NT Kernel & System)
0x83237000 PnpManager 4259840 bytes
0x83237000 RAW 4259840 bytes
0x83237000 WMIxWDM 4259840 bytes
0x95CD0000 Win32k 2404352 bytes
0x95CD0000 C:\Windows\System32\win32k.sys 2404352 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0x8F826000 C:\Windows\system32\drivers\RTKVHDA.sys 1937408 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0x89211000 C:\Windows\System32\drivers\tcpip.sys 1347584 bytes (Microsoft Corporation, TCP/IP Driver)
0x88E09000 C:\Windows\System32\Drivers\Ntfs.sys 1241088 bytes (Microsoft Corporation, NT File System Driver)
0x8E659000 C:\Windows\system32\DRIVERS\athr.sys 1232896 bytes (Atheros Communications, Inc., Atheros Extensible Wireless LAN device driver)
0x8F682000 C:\Windows\system32\DRIVERS\AGRSM.sys 1073152 bytes (LSI Corp, SoftModem Device Driver)
0x8ECBB000 C:\Windows\System32\drivers\dxgkrnl.sys 749568 bytes (Microsoft Corporation, DirectX Graphics Kernel)
0x89007000 C:\Windows\system32\drivers\ndis.sys 749568 bytes (Microsoft Corporation, NDIS 6.20 driver)
0x88A7B000 C:\Windows\system32\CI.dll 700416 bytes (Microsoft Corporation, Code Integrity Module)
0x96B4C000 C:\Windows\system32\drivers\peauth.sys 618496 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver)
0x96A0B000 C:\Windows\system32\drivers\HTTP.sys 544768 bytes (Microsoft Corporation, HTTP Protocol Stack)
0x88B26000 C:\Windows\system32\drivers\Wdf01000.sys 462848 bytes (Microsoft Corporation, Kernel Mode Driver Framework Runtime)
0x88F76000 C:\Windows\System32\Drivers\cng.sys 380928 bytes (Microsoft Corporation, Kernel Cryptography, Next Generation)
0x88D65000 C:\Windows\system32\drivers\mfehidk.sys 380928 bytes (McAfee, Inc., McAfee Link Driver)
0x8E4C3000 C:\Windows\system32\drivers\afd.sys 368640 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x8F4B2000 C:\Windows\system32\DRIVERS\rixdptsk.sys 331776 bytes (REDC, RICOH XD SM Driver)
0x984AF000 C:\Windows\System32\DRIVERS\srv.sys 331776 bytes (Microsoft Corporation, Server driver)
0x9843C000 C:\Windows\System32\DRIVERS\srv2.sys 323584 bytes (Microsoft Corporation, Smb 2.0 Server driver)
0x95F80000 C:\Windows\System32\ATMFD.DLL 315392 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0x8FC1A000 C:\Windows\system32\drivers\mfefirek.sys 307200 bytes (McAfee, Inc., McAfee Core Firewall Engine Driver)
0x8E786000 C:\Windows\system32\DRIVERS\USBPORT.SYS 307200 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0x88C77000 C:\Windows\System32\drivers\volmgrx.sys 307200 bytes (Microsoft Corporation, Volume Manager Extension Driver)
0x88BA5000 C:\Windows\system32\DRIVERS\ACPI.sys 294912 bytes (Microsoft Corporation, ACPI Driver for NT)
0x8FD62000 C:\Windows\system32\DRIVERS\nwifi.sys 286720 bytes (Microsoft Corporation, NativeWiFi Miniport Driver)
0x8F62D000 C:\Windows\system32\DRIVERS\usbhub.sys 278528 bytes (Microsoft Corporation, Default Hub Driver for USB)
0x88A39000 C:\Windows\system32\CLFS.SYS 270336 bytes (Microsoft Corporation, Common Log File System Driver)
0x8E593000 C:\Windows\system32\DRIVERS\rdbss.sys 266240 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x893BD000 C:\Windows\system32\DRIVERS\volsnap.sys 258048 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0x890BE000 C:\Windows\system32\drivers\NETIO.SYS 253952 bytes (Microsoft Corporation, Network I/O Subsystem)
0x96ADE000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 241664 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr)
0x8ED72000 C:\Windows\System32\drivers\dxgmms1.sys 233472 bytes (Microsoft Corporation, DirectX Graphics MMS)
0x83200000 ACPI_HAL 225280 bytes
0x83200000 C:\Windows\system32\halmacpi.dll 225280 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0x88D20000 C:\Windows\system32\drivers\fltmgr.sys 212992 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0x8F5B3000 C:\Windows\system32\DRIVERS\ks.sys 212992 bytes (Microsoft Corporation, Kernel CSA Library)
0x89166000 C:\Windows\System32\DRIVERS\fvevol.sys 204800 bytes (Microsoft Corporation, BitLocker Drive Encryption Driver)
0x8E491000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver)
0x8935A000 C:\Windows\System32\drivers\fwpkclnt.sys 200704 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API)
0x8F795000 C:\Windows\system32\drivers\portcls.sys 192512 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x89121000 C:\Windows\System32\drivers\rdyboost.sys 184320 bytes (Microsoft Corporation, ReadyBoost Driver)
0x8F40E000 C:\Windows\system32\DRIVERS\SynTP.sys 184320 bytes (Synaptics, Inc., Synaptics Touchpad Driver)
0x8F44A000 C:\Windows\system32\DRIVERS\1394ohci.sys 180224 bytes (Microsoft Corporation, 1394 OpenHCI Driver)
0x88F38000 C:\Windows\System32\Drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider)
0x88C0C000 C:\Windows\system32\DRIVERS\pci.sys 172032 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0x8938B000 C:\Windows\system32\drivers\mfewfpk.sys 159744 bytes (McAfee, Inc., Anti-Virus Mini-Firewall Driver)
0x891A9000 C:\Windows\system32\DRIVERS\CLASSPNP.SYS 151552 bytes (Microsoft Corporation, SCSI Class System Dll)
0x890FC000 C:\Windows\System32\Drivers\ksecpkg.sys 151552 bytes (Microsoft Corporation, Kernel Security Support Provider Interface Packages)
0x8EDAB000 C:\Windows\system32\DRIVERS\Rt86win7.sys 151552 bytes (Realtek Corporation , Realtek 8101E/8168/8169 NDIS 6.20 32-bit Driver )
0x8F7C4000 C:\Windows\system32\drivers\mfeavfk.sys 147456 bytes (McAfee, Inc., Anti-Virus File System Filter Driver)
0x98409000 C:\Windows\System32\Drivers\usbvideo.sys 147456 bytes (Microsoft Corporation, USB Video Class Driver)
0x88CF4000 C:\Windows\system32\DRIVERS\ataport.SYS 143360 bytes (Microsoft Corporation, ATAPI Driver Extension)
0x96ABB000 C:\Windows\system32\DRIVERS\mrxsmb.sys 143360 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0x8F549000 C:\Windows\system32\DRIVERS\ndiswan.sys 139264 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x8FDCB000 C:\Windows\System32\DRIVERS\srvnet.sys 135168 bytes (Microsoft Corporation, Server Network driver)
0x8E61E000 C:\Windows\system32\DRIVERS\tunnel.sys 135168 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x8E41B000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver)
0x88DDA000 C:\Windows\system32\DRIVERS\cdrom.sys 126976 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0x8E800000 C:\Windows\system32\DRIVERS\HDAudBus.sys 126976 bytes (Microsoft Corporation, High Definition Audio Bus Driver)
0x8E524000 C:\Windows\system32\DRIVERS\pacer.sys 126976 bytes (Microsoft Corporation, QoS Packet Scheduler)
0x95F60000 C:\Windows\System32\cdd.dll 122880 bytes (Microsoft Corporation, Canonical Display Driver)
0x8FD37000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA File Virtualization Filter Driver)
0x96B19000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 110592 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector)
0x96A90000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver)
0x8F800000 C:\Windows\system32\drivers\drmk.sys 102400 bytes (Microsoft Corporation, Microsoft Trusted Audio Drivers)
0x8F476000 C:\Windows\system32\DRIVERS\sdbus.sys 102400 bytes (Microsoft Corporation, SecureDigital Bus Driver)
0x8E400000 C:\Windows\System32\Drivers\dfsc.sys 98304 bytes (Microsoft Corporation, DFS Namespace Client Driver)
0x8E7D1000 C:\Windows\system32\DRIVERS\i8042prt.sys 98304 bytes (Microsoft Corporation, i8042 Port Driver)
0x8F526000 C:\Windows\system32\DRIVERS\rasl2tp.sys 98304 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0x8F56B000 C:\Windows\system32\DRIVERS\raspppoe.sys 98304 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0x8F583000 C:\Windows\system32\DRIVERS\raspptp.sys 94208 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x8F59A000 C:\Windows\system32\DRIVERS\rassstp.sys 94208 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager)
0x8E47A000 C:\Windows\system32\DRIVERS\tdx.sys 94208 bytes (Microsoft Corporation, TDI Translation Driver)
0x985E4000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0x98538000 C:\Windows\system32\drivers\mfeapfk.sys 90112 bytes (McAfee, Inc., Access Protection Filter Driver)
0x88CD5000 C:\Windows\System32\drivers\mountmgr.sys 90112 bytes (Microsoft Corporation, Mount Point Manager)
0x8F49E000 C:\Windows\system32\DRIVERS\rimsptsk.sys 81920 bytes (REDC, RICOH MS Driver)
0x8FC81000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 77824 bytes (Microsoft Corporation, Hid Class Library)
0x88F63000 C:\Windows\System32\Drivers\ksecdd.sys 77824 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0x8FDB8000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6)
0x8E570000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x8F514000 C:\Windows\system32\DRIVERS\AgileVpn.sys 73728 bytes (Microsoft Corporation, RAS Agile Vpn Miniport Call Manager)
0x8E647000 C:\Windows\system32\DRIVERS\amdk8.sys 73728 bytes (Microsoft Corporation, Processor Device Driver)
0x96AA9000 C:\Windows\System32\drivers\mpsdrv.sys 73728 bytes (Microsoft Corporation, Microsoft Protection Service Driver)
0x89198000 C:\Windows\system32\DRIVERS\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver)
0x8FD26000 C:\Windows\System32\Drivers\dump_dumpfve.sys 69632 bytes
0x88D54000 C:\Windows\system32\drivers\fileinfo.sys 69632 bytes (Microsoft Corporation, FileInfo Filter Driver)
0x8F671000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy)
0x88C41000 C:\Windows\System32\drivers\partmgr.sys 69632 bytes (Microsoft Corporation, Partition Management Driver)
0x88A20000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Platform Specific Hardware Error Driver)
0x8E543000 C:\Windows\system32\DRIVERS\vwififlt.sys 69632 bytes (Microsoft Corporation, Virtual WiFi Filter Driver)
0x8FD52000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver)
0x8914E000 C:\Windows\System32\Drivers\mup.sys 65536 bytes (Microsoft Corporation, Multiple UNC Provider Driver)
0x8FDA8000 C:\Windows\system32\DRIVERS\ndisuio.sys 65536 bytes (Microsoft Corporation, NDIS User mode I/O driver)
0x8E583000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Remote Desktop Server Driver)
0x88C67000 C:\Windows\system32\DRIVERS\volmgr.sys 65536 bytes (Microsoft Corporation, Volume Manager Driver)
0x88DC2000 C:\Windows\system32\DRIVERS\Lbd.sys 61440 bytes (Lavasoft AB, Boot Driver)
0x8F48F000 C:\Windows\system32\DRIVERS\rimmptsk.sys 61440 bytes (REDC, RICOH SD Driver)
0x8EDE4000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0x8E554000 C:\Windows\system32\DRIVERS\blbdrive.sys 57344 bytes (Microsoft Corporation, BLB Drive Driver)
0x8E562000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver)
0x8E46C000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver)
0x88C59000 C:\Windows\system32\DRIVERS\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0x88FD3000 C:\Windows\System32\drivers\pcw.sys 57344 bytes (Microsoft Corporation, Performance Counters for Windows Driver)
0x8F5E7000 C:\Windows\system32\DRIVERS\umbus.sys 57344 bytes (Microsoft Corporation, User-Mode Bus Enumerator)
0x88B97000 C:\Windows\system32\drivers\WDFLDR.SYS 57344 bytes (Microsoft Corporation, Kernel Mode Driver Framework Loader)
0x8F507000 C:\Windows\system32\DRIVERS\CompositeBus.sys 53248 bytes (Microsoft Corporation, Multi-Transport Composite Bus Enumerator)
0x8FD05000 C:\Windows\System32\Drivers\crashdmp.sys 53248 bytes (Microsoft Corporation, Crash Dump Driver)
0x8E7E9000 C:\Windows\system32\DRIVERS\kbdclass.sys 53248 bytes (Microsoft Corporation, Keyboard Class Driver)
0x8F788000 C:\Windows\system32\drivers\modem.sys 53248 bytes (Microsoft Corporation, Modem Device Driver)
0x8F43D000 C:\Windows\system32\DRIVERS\mouclass.sys 53248 bytes (Microsoft Corporation, Mouse Class Driver)
0x96BED000 C:\Windows\System32\drivers\tcpipreg.sys 53248 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver)
0x8E43C000 C:\Windows\System32\drivers\watchdog.sys 53248 bytes (Microsoft Corporation, Watchdog Driver)
0x98500000 C:\Windows\system32\drivers\cfwids.sys 49152 bytes (McAfee, Inc., McAfee Personal Firewall IDS Plugin)
0x8E5E8000 C:\Windows\System32\drivers\discache.sys 49152 bytes (Microsoft Corporation, System Indexer/Cache Driver)
0x88C00000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x88CCA000 C:\Windows\system32\DRIVERS\BATTC.SYS 45056 bytes (Microsoft Corporation, Battery Class Driver)
0x8FD12000 C:\Windows\System32\Drivers\dump_dumpata.sys 45056 bytes
0x8FC76000 C:\Windows\system32\DRIVERS\hidusb.sys 45056 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0x88A15000 C:\Windows\system32\mcupdate_AuthenticAMD.dll 45056 bytes (Microsoft Corporation, AMD Microcode Update Library)
0x9850C000 C:\Windows\system32\DRIVERS\monitor.sys 45056 bytes (Microsoft Corporation, Monitor Driver)
0x8FC98000 C:\Windows\system32\DRIVERS\mouhid.sys 45056 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0x8E461000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver)
0x8F53E000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x893B2000 C:\Windows\system32\drivers\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper)
0x88C36000 C:\Windows\system32\DRIVERS\vdrvroot.sys 45056 bytes (Microsoft Corporation, Virtual Drive Root Enumerator)
0x8FC65000 C:\Windows\system32\DRIVERS\dc3d.sys 40960 bytes (Microsoft Corporation, Filter Driver for Identification of Microsoft Hardware Wireless Mouse and Keyboard Device Models)
0x8FCC3000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver)
0x8E5DE000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver)
0x8E5D4000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy)
0x96BE3000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0x8EDDA000 C:\Windows\system32\DRIVERS\usbohci.sys 40960 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0x8EDD0000 C:\Windows\system32\DRIVERS\vwifibus.sys 40960 bytes (Microsoft Corporation, Virtual WiFi Bus Driver)
0x88D17000 C:\Windows\system32\DRIVERS\amdxata.sys 36864 bytes (Advanced Micro Devices, Storage Filter Driver)
0x98599000 C:\Windows\system32\DRIVERS\asyncmac.sys 36864 bytes (Microsoft Corporation, MS Remote Access serial network driver)
0x88CEB000 C:\Windows\system32\DRIVERS\atapi.sys 36864 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x8FD1D000 C:\Windows\System32\Drivers\dump_atapi.sys 36864 bytes
0x88FE1000 C:\Windows\System32\Drivers\Fs_Rec.sys 36864 bytes (Microsoft Corporation, File System Recognizer Driver)
0x98555000 C:\Windows\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0x8FCA3000 C:\Windows\system32\DRIVERS\point32.sys 36864 bytes (Microsoft Corporation, Point32k.sys)
0x88DD1000 C:\Windows\System32\Drivers\PxHelp20.sys 36864 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0x95F30000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver)
0x98400000 C:\Windows\System32\Drivers\UVCFTR_S.SYS 36864 bytes (Chicony Electronics Co., Ltd., UVCFTR_S.sys)
0x88BED000 C:\Windows\system32\DRIVERS\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0x891CE000 C:\Windows\system32\DRIVERS\AtiPcie.sys 32768 bytes (ATI Technologies Inc., ATI PCIE Driver for ATI PCIE chipset)
0x88A31000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver)
0x88CC2000 C:\Windows\system32\DRIVERS\compbatt.sys 32768 bytes (Microsoft Corporation, Composite Battery Driver)
0x8E63F000 C:\Windows\system32\DRIVERS\FwLnk.sys 32768 bytes (TOSHIBA Corporation, TOSHIBA Firmware Linkage 32-bit Driver)
0x8915E000 C:\Windows\System32\drivers\hwpolicy.sys 32768 bytes (Microsoft Corporation, Hardware Policy Driver)
0x80BC9000 C:\Windows\system32\kdcom.dll 32768 bytes (Microsoft Corporation, Serial Kernel Debugger)
0x88BF6000 C:\Windows\system32\DRIVERS\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver)
0x8E449000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8E451000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Encoder Miniport)
0x8E459000 C:\Windows\system32\drivers\rdprefmp.sys 32768 bytes (Microsoft Corporation, RDP Reflector Driver Miniport)
0x89205000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor)
0x89000000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver)
0x8FC6F000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0x9854E000 C:\Users\Darrin\AppData\Local\Temp\mbr.sys 28672 bytes
0x891F7000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver)
0x88C52000 C:\Windows\system32\DRIVERS\pciide.sys 28672 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x8E51D000 C:\Windows\system32\DRIVERS\wfplwf.sys 28672 bytes (Microsoft Corporation, WFP NDIS 6.20 Lightweight Filter Driver)
0x89200000 C:\Windows\system32\DRIVERS\TVALZ_O.SYS 20480 bytes (TOSHIBA Corporation, TOSHIBA ACPI-Based Value Added Logical and General Purpose Device Driver)
0x8E5F4000 C:\Windows\System32\Drivers\ASPI32.SYS 16384 bytes (Adaptec, ASPI for WIN32 Kernel Driver)
0x8F503000 C:\Windows\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0x8FC94000 C:\Windows\system32\DRIVERS\NuidFltr.sys 16384 bytes (Microsoft Corporation, Filter Driver for Microsoft Hardware HID Non-User Input Data)
0x8EDF3000 C:\Windows\system32\DRIVERS\tdcmdpst.sys 16384 bytes (TOSHIBA Corporation., Toshiba ODD Writing Driver For x86.)
0x8F5B1000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x8F43B000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
==============================================
>Stealth
==============================================
0x07490000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 102400 bytes
0x079F0000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 1150976 bytes
0x00410000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 118784 bytes
0x03970000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 118784 bytes
0x08330000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 135168 bytes
0x07B90000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 151552 bytes
0x07EB0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 1740800 bytes
0x07820000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 217088 bytes
0x07BC0000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 233472 bytes
0x005E0000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 28672 bytes
0x00610000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 28672 bytes
0x00540000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x00550000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x042C0000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x03E40000 Hidden Image-->CLI.Component.Runtime.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04160000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04130000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04180000 Hidden Image-->AEM.Plugin.WinMessages.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04170000 Hidden Image-->AEM.Plugin.Hotkeys.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x042D0000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x048A0000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04890000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x048B0000 Hidden Image-->DEM.Graphics.I0709.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05030000 Hidden Image-->AEM.Actions.CCAA.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05000000 Hidden Image-->AEM.Plugin.GD.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05040000 Hidden Image-->ResourceManagement.Foundation.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05460000 Hidden Image-->DEM.Graphics.I0804.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x055E0000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05730000 Hidden Image-->DEM.Graphics.I0805.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05860000 Hidden Image-->DEM.Graphics.I0706.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x058B0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05CC0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05EC0000 Hidden Image-->DEM.Graphics.I0712.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x05ED0000 Hidden Image-->DEM.Graphics.I0812.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07320000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07440000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07380000 Hidden Image-->AEM.Plugin.REG.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07360000 Hidden Image-->CLI.Component.Runtime.Extension.EEU.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07390000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07430000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07470000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07650000 Hidden Image-->atixclib.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07B20000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07B10000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07B80000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x07B50000 Hidden Image-->Branding.dll [ EPROCESS 0x86D202C8 ] PID: 4240, 28672 bytes
0x04630000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 299008 bytes
0x077D0000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 315392 bytes
0x00FD0000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 36864 bytes
0x00FE0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 36864 bytes
0x00510000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x039C0000 Hidden Image-->AxInterop.WBOCXLib.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x039B0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x03F90000 Hidden Image-->Interop.WBOCXLib.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x03FC0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x04610000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x05710000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x05D00000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x05D30000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x05E80000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x071C0000 Hidden Image-->CLI.Aspect.PowerPlayDPPE.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x07450000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 36864 bytes
0x07860000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 372736 bytes
0x083D0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 372736 bytes
0x073A0000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 413696 bytes
0x07760000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 413696 bytes
0x08530000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 413696 bytes
0x08360000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 446464 bytes
0x00530000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 45056 bytes
0x005A0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 45056 bytes
0x00530000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x007F0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x03F60000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x05720000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x05890000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x05D10000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x05D60000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 45056 bytes
0x075C0000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 503808 bytes
0x03AD0000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x03E30000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x03F70000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x04140000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x041B0000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x05600000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x05CF0000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x05D40000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x07190000 Hidden Image-->CLI.Aspect.PowerPlayDPPE.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x07420000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x07460000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x07640000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 53248 bytes
0x9848B730 Unknown thread object [ ETHREAD 0x857C6350 ] , 600 bytes
0x8FCCF33A Unknown thread object [ ETHREAD 0x874386E0 ] , 600 bytes
0x98517730 Unknown thread object [ ETHREAD 0x854B2B20 ] , 600 bytes
0x985A2730 Unknown thread object [ ETHREAD 0x857DFD48 ] , 600 bytes
0x985C3730 Unknown thread object [ ETHREAD 0x87436770 ] , 600 bytes
0x08850000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 602112 bytes
0x05D50000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 61440 bytes
0x05EB0000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 61440 bytes
0x05F50000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 61440 bytes
0x06CF0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 61440 bytes
0x005C0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x99614D40 ] PID: 4024, 69632 bytes
0x009C0000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 69632 bytes
0x03990000 Hidden Image-->CLI.Component.SkinFactory.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 69632 bytes
0x045F0000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 69632 bytes
0x05EF0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 69632 bytes
0x07300000 Hidden Image-->APM.Server.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 69632 bytes
0x08270000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 724992 bytes
0x055C0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 77824 bytes
0x05870000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 77824 bytes
0x05E90000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 77824 bytes
0x08780000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 806912 bytes
0x089C0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 823296 bytes
0x00780000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 86016 bytes
0x05740000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 86016 bytes
0x07B60000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 86016 bytes
0x03D60000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 94208 bytes
0x05010000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 94208 bytes
0x07130000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x86D202C8 ] PID: 4240, 94208 bytes
0x04510000 Hidden Image-->TCrdMain.resources.dll [ EPROCESS 0x997CE7B0 ] PID: 3604, 978944 bytes


Attached File  Attach.txt   8.56KB   0 downloads

Attached File  DDS.txt   17.44KB   1 downloads

#4 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 12:40 AM

Also, I never did "Unhook" or "Unhook All" with the rootkit unhooker. I just saved report and closed the program. Did you want me to do any "unhooking"?

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 12 November 2010 - 12:47 AM

Hello

That is fine.

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 01:26 AM

I have ran the combofix without any problems. I have attached the log here. Attached File  combofix report.txt   13.67KB   1 downloads

As for my computer, after restarting I am still getting some odd popups. From google-analytic..here is an example
http://www.google-analytics.com/pp.php?to=con&from=a1&type=seconddown.rtsports.com:&ref=http%3A%2F%2Fseconddown.rtsports.com%2Fcgi-bin%2Fwelcome_page%3FUID%3D9r6p862rbzv71fa%26LN%3D20886%26U%3D138005

What are you seeing from the logs?

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 12 November 2010 - 01:36 AM

Hello

google-analytic is a wierd one sometimes we find and others I don't

we are going to check the router

Create and Run Batch File
Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

It should look like this: Posted Image <--XP
Double-click on router.bat to run it. it will open notepad when done please post back the results
gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 01:40 AM

Attached File  Log1.txt   6.22KB   3 downloads

#9 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 01:42 AM

If it means anything, this google-anayltics popup is also happening on my desktop computer. I have been working on my laptop with you. They are both connected through a router.

Edited by wiudavis, 12 November 2010 - 01:42 AM.


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 12 November 2010 - 02:01 AM

Hello

Yes it looks like the DNS settings on the router have been changed.

Resetting Router

Letís try to reset the router to its default configuration.
  • This can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router.
  • Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds).
  • If you donít know the router's default password, you can look it up. Here
  • You also need to reconfigure any security settings you had in place prior to the reset.
  • You may also need to consult with your Internet service provider to find out which DNS servers your network should be using or you can use OpenDNS
Note: After resetting your router, it is important to set a non-default password, and if possible, username, on the router. This will assist in eliminating the possibility of the router being hijacked again.

flush the DNS:

Now lets flush the DNS on the computer:

  • click on Start
  • select run
  • enter cmd and hit enter
  • a black window will open.
  • please enter the following text into that window and hit enter:


    ipconfig /flushdns

Now lets check the router again

Create and Run Batch File
Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

It should look like this: Posted Image <--XP
Double-click on router.bat to run it. it will open notepad when done please post back the results

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 11:43 AM

I reset my router, but now I cannot get online through the router? It says i have a conflict with my IP addresses. I called linksys and they said that my router warranty is out of date and I would need to pay for service. Do you have a fix on getting my router and modem to link back up? Do i need to flush the dns even if I cannot get online with my router? I have changed the setting on the router as far as router name and password. When i hook everything back up it will not get internet access. I am currently on a differnet computer that is bypassing the modem. I have not done a dns flush yet.

Edited by wiudavis, 12 November 2010 - 11:46 AM.


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 12 November 2010 - 11:50 AM

let me know what router you have


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 12 November 2010 - 11:59 AM

I have a linksys wrt54g

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:08 AM

Posted 12 November 2010 - 12:12 PM

Hello

ok I want to be sure of things before we move forward

you get this when you try to connect wirelessly? have you tried to connect to the router by cable?


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 wiudavis

wiudavis
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:06:08 AM

Posted 15 November 2010 - 12:28 AM

I was out of town this weekend and decided to purchase a new router. I have installed the new E1000 linksys router, and I do not seem to have the google redirect issue any longer on either machine. Is it possible that we have fixed the problem, or do we need to continue with this process?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users