Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Could I be infected?


  • This topic is locked This topic is locked
10 replies to this topic

#1 AnaLoGMunKy

AnaLoGMunKy

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 11 February 2011 - 12:40 PM

Hi

I have been getting frequent BSOD and I want to know if I am infected with anything. This has been happening since the computers first install, and I have wiped and reinstalled again but it still happens. The BSOD its random and has no pattern exept, if I power down after BSOD restart and the power up I will not get another one till I power on again another time.

Any suggestions welkomme

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:25 AM

Posted 11 February 2011 - 12:50 PM

Hello, lets see if we can look at some logs and see what they may say...
Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware



Please perform a scan with Eset Online Antiivirus Scanner.
This scan requires Internet Explorer,Opera or Firefox to work. Vista/Windows 7 users need to run Internet Explorer as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
  • Click the green Posted Image button.
  • Read the End User License Agreement and check the box:
  • Check Posted Image.
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Check Remove found threats and Scan potentially unwanted applications. (If given the option, choose "Quarantine" instead of delete.)
  • Click the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer.
  • If offered the option to get information or buy software at any point, just close the window.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop as ESETScan.txt.
  • Push the Posted Image button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply.
Note: A log.txt file will also be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
If you did not save the ESETScan log, click Posted Image > Run..., then type or copy and paste everything in the code box below into the Open dialogue box:

C:\Program Files\ESET\EsetOnlineScanner\log.txt
  • Click Ok and the scan results will open in Notepad.
  • Copy and paste the contents of log.txt in your next reply.
-- Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.

NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 AnaLoGMunKy

AnaLoGMunKy
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 11 February 2011 - 01:20 PM

Ok MBAM scan done. Will now scan with eset online scanner as well.

MBAM came up clean btw. Here is MBAM log


Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5742

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

11-Feb-11 6:17:47 PM
mbam-log-2011-02-11 (18-17-47).txt

Scan type: Quick scan
Objects scanned: 156858
Time elapsed: 1 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by AnaLoGMunKy, 11 February 2011 - 01:20 PM.


#4 AnaLoGMunKy

AnaLoGMunKy
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 11 February 2011 - 05:01 PM

C:\Users\MunKy\Documents\Bakup\24-11-10 16GB usb\Installers and Files\Reason 4 + Keygen + Patch RPS\Reason4 RpsPatch\Reason4 RpsPatch.zip probably a variant of Win32/PcClient.GJYDUUC trojan deleted - quarantined
C:\Users\MunKy\Documents\Bakup\28-1-11 16GB usb\Installers and Files\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen\keygen.exe a variant of Win32/Keygen.AD application cleaned by deleting - quarantined
C:\Users\MunKy\Documents\Bakup\28-1-11 16GB usb\Installers and Files\Reason 4 + Keygen + Patch RPS\Reason4 RpsPatch\Reason4 RpsPatch.zip probably a variant of Win32/PcClient.GJYDUUC trojan deleted - quarantined
C:\Users\MunKy\Downloads\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen\keygen.exe a variant of Win32/Keygen.AD application cleaned by deleting - quarantined
C:\Users\MunKy\Downloads\RARS\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen.rar a variant of Win32/Keygen.AD application deleted - quarantined
C:\Users\MunKy\Downloads\RARS\ujcucc.zip Win32/HackTool.Patcher.A application deleted - quarantined
C:\Users\MunKy\Downloads\Sony ACID Pro 7.0.641.Keygen\Keygen.exe a variant of Win32/Keygen.AR application cleaned by deleting - quarantined
C:\Users\MunKy\Downloads\Sony ACID Pro 7.0.641.Keygen\Sony ACID Pro 7.0.641.Keygen.rar a variant of Win32/Keygen.AR application deleted - quarantined
C:\Users\MunKy\Downloads\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG.zip a variant of Win32/Keygen.AQ application deleted - quarantined
C:\Users\MunKy\Downloads\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\keygen\keygen.rar a variant of Win32/Keygen.AQ application deleted - quarantined
C:\Users\MunKy\Downloads\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\keygen\keygen\keygen.exe a variant of Win32/Keygen.AQ application cleaned by deleting - quarantined
C:\Users\MunKy\Downloads\Windows 7 Ultimate (64 Bit)\Other Windows 7 Activation Tools\Windows 7 Loader eXtreme Edition 3.5.0.3.exe a variant of Win32/HackKMS.A application cleaned by deleting - quarantined
C:\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.rar probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
C:\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.zip probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
C:\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Codecs\RealPlayer10-5GOLD with activatiopn patch.rar probably a variant of Win32/TrojanDownloader.Agent.RSEWZO trojan deleted - quarantined
C:\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\e-donkey 2000\eDonkey 2000 6.1 + Crack & Emule.zip a variant of Win32/Tool.TPE.A application deleted - quarantined
C:\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Nero 6 + mp3pro\nero 6.0.0.9(burningrom+vision+incd+mix+mediaplayer+all keygens(suto).exe probably a variant of Win32/Agent.KTHXEFP trojan deleted - quarantined
C:\Windows\FixCamera.exe a variant of Win32/KillProc.A application cleaned by deleting - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Bakup\24-11-10 16GB usb\Installers and Files\Reason 4 + Keygen + Patch RPS\Reason4 RpsPatch\Reason4 RpsPatch.zip probably a variant of Win32/PcClient.GJYDUUC trojan deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Desktop\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen\keygen.exe a variant of Win32/Keygen.AD application cleaned by deleting - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.rar probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.zip probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Codecs\RealPlayer10-5GOLD with activatiopn patch.rar probably a variant of Win32/TrojanDownloader.Agent.RSEWZO trojan deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\e-donkey 2000\eDonkey 2000 6.1 + Crack & Emule.zip a variant of Win32/Tool.TPE.A application deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Nero 6 + mp3pro\nero 6.0.0.9(burningrom+vision+incd+mix+mediaplayer+all keygens(suto).exe probably a variant of Win32/Agent.KTHXEFP trojan deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Downloads\RARS\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen.rar a variant of Win32/Keygen.AD application deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Downloads\RARS\ujcucc.zip Win32/HackTool.Patcher.A application deleted - quarantined
H:\Backup Files\1\1\V0\C\Users\MunKy\Downloads\Windows 7 Ultimate (64 Bit)\Other Windows 7 Activation Tools\Windows 7 Loader eXtreme Edition 3.5.0.3.exe a variant of Win32/HackKMS.A application cleaned by deleting - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\Bakup\24-11-10 16GB usb\Installers and Files\Reason 4 + Keygen + Patch RPS\Reason4 RpsPatch\Reason4 RpsPatch.zip probably a variant of Win32/PcClient.GJYDUUC trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\Bakup\28-1-11 16GB usb\Installers and Files\Reason 4 + Keygen + Patch RPS\Reason4 RpsPatch\Reason4 RpsPatch.zip probably a variant of Win32/PcClient.GJYDUUC trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.rar probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.zip probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Codecs\RealPlayer10-5GOLD with activatiopn patch.rar probably a variant of Win32/TrojanDownloader.Agent.RSEWZO trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Documents\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\e-donkey 2000\eDonkey 2000 6.1 + Crack & Emule.zip a variant of Win32/Tool.TPE.A application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\RARS\IZotope.Ozone.VST.DX.RTAS.HTDM.v4.01.Incl.Keygen.rar a variant of Win32/Keygen.AD application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\RARS\ujcucc.zip Win32/HackTool.Patcher.A application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\Sony ACID Pro 7.0.641.Keygen\Sony ACID Pro 7.0.641.Keygen.rar a variant of Win32/Keygen.AR application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG.zip a variant of Win32/Keygen.AQ application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\keygen\keygen.rar a variant of Win32/Keygen.AQ application deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Downloads\Win Xp Pro SP3 oem\WINXPSP3OEM.iso multiple threats deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.rar probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\call of duty no cd + key gen\Call_of_Duty_No_CD_Crack_+_key_+_Online_Patch.zip probably a variant of Win32/Agent.FICVLEB trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\Codecs\RealPlayer10-5GOLD with activatiopn patch.rar probably a variant of Win32/TrojanDownloader.Agent.RSEWZO trojan deleted - quarantined
H:\Backup Files\2\1\V0\C\Users\MunKy\Music\BrainzBackup Aug06\OthyerShtuff Backup Aug06\Backup Shtuff\Helpfull Software & Drivers & Stuff\e-donkey 2000\eDonkey 2000 6.1 + Crack & Emule.zip a variant of Win32/Tool.TPE.A application deleted - quarantined
H:\From Keiths 13.01.11\Sony ACID Pro 7.0.641.Keygen\Keygen.exe a variant of Win32/Keygen.AR application cleaned by deleting - quarantined
H:\From Keiths 13.01.11\Sony ACID Pro 7.0.641.Keygen\Sony ACID Pro 7.0.641.Keygen.rar a variant of Win32/Keygen.AR application deleted - quarantined
H:\From Keiths 13.01.11\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG.zip a variant of Win32/Keygen.AQ application deleted - quarantined
H:\From Keiths 13.01.11\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\keygen\keygen.rar a variant of Win32/Keygen.AQ application deleted - quarantined
H:\From Keiths 13.01.11\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\Sony.ACID.Pro.v6.0.Incl.Keygen-SSG\keygen\keygen\keygen.exe a variant of Win32/Keygen.AQ application cleaned by deleting - quarantined

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:25 AM

Posted 11 February 2011 - 08:12 PM

Hello at least we found the infections source. I f you keep these cracks and keygens on here than we are just wasting our time as they (as you can see) wikk just allow you to be reinfected.
IMPORTANT NOTE: The practice of using cracking tools, keygens, warez or any pirated software is not only considered illegal activity but it is a serious security risk.

Cracking applications are used for illegally breaking (cracking) various copy-protection and registration techniques used in commercial software. These programs may be distributed via Web sites, Usenet, and P2P networks.

trendmicro.com/vinfo

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

...warez/piracy sites ranked the highest in downloading spyware...just opening the web page usually sets off an exploit, never mind actually downloading anything. And by the time the malware is finished downloading, often the machine is trashed and rendered useless.

University of Washington spyware study

...One of the most aggressive and intrusive of all bad websites on the Internet are serial, warez, software cracking type sites...they sneak malware onto your system...Where do trojan viruses originate? One of the biggest malware distributors on the Internet are serial/warez/code cracking sites.

Bad Web Sites: Malware

When you use these kind of programs, be forewarned that some of the worst types of malware infections can be contracted and spread by visiting crack, keygen, warez and other pirated software sites. In many cases, those sites are infested with a smörgåsbord of malware and an increasing source of system infection. Those who attempt to get software for free can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

Before we can continue, I need you to remove all cracks and keygens immediately to reduce the risk of infection/reinfection. If not, then we are just wasting time trying to clean your system. Further, other tools used during the disinfection process may detect crack and keygens so we need to ensure they have been removed.

Using these types of programs or the websites you visited to get them is almost a guaranteed way to get yourself infected!!


Lets also look for a TDSS infection.

Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 AnaLoGMunKy

AnaLoGMunKy
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 11 February 2011 - 08:44 PM

The computer had BSOD before the keygens were on there. I can personally verify that while these cracks may have a less than safe reputation... they have NEVER caused BSOD before on the other computers I have used them on. This is clearly not the problem with my computer.

Scanned with the Kaspersky rootkit.


2011/02/12 01:37:32.0118 2200 TDSS rootkit removing tool 2.4.17.0 Feb 10 2011 11:07:20
2011/02/12 01:37:32.0428 2200 ================================================================================
2011/02/12 01:37:32.0428 2200 SystemInfo:
2011/02/12 01:37:32.0428 2200
2011/02/12 01:37:32.0428 2200 OS Version: 6.1.7600 ServicePack: 0.0
2011/02/12 01:37:32.0428 2200 Product type: Workstation
2011/02/12 01:37:32.0428 2200 ComputerName: MUNKY-PC
2011/02/12 01:37:32.0428 2200 UserName: MunKy
2011/02/12 01:37:32.0428 2200 Windows directory: C:\Windows
2011/02/12 01:37:32.0428 2200 System windows directory: C:\Windows
2011/02/12 01:37:32.0428 2200 Running under WOW64
2011/02/12 01:37:32.0428 2200 Processor architecture: Intel x64
2011/02/12 01:37:32.0428 2200 Number of processors: 8
2011/02/12 01:37:32.0428 2200 Page size: 0x1000
2011/02/12 01:37:32.0428 2200 Boot type: Normal boot
2011/02/12 01:37:32.0428 2200 ================================================================================
2011/02/12 01:37:33.0255 2200 Initialize success
2011/02/12 01:37:36.0269 0388 ================================================================================
2011/02/12 01:37:36.0269 0388 Scan started
2011/02/12 01:37:36.0269 0388 Mode: Manual;
2011/02/12 01:37:36.0269 0388 ================================================================================
2011/02/12 01:37:37.0470 0388 1394ohci (1b00662092f9f9568b995902f0cc40d5) C:\Windows\system32\DRIVERS\1394ohci.sys
2011/02/12 01:37:37.0499 0388 ACPI (6f11e88748cdefd2f76aa215f97ddfe5) C:\Windows\system32\DRIVERS\ACPI.sys
2011/02/12 01:37:37.0529 0388 AcpiPmi (63b05a0420ce4bf0e4af6dcc7cada254) C:\Windows\system32\DRIVERS\acpipmi.sys
2011/02/12 01:37:37.0557 0388 adp94xx (2f6b34b83843f0c5118b63ac634f5bf4) C:\Windows\system32\DRIVERS\adp94xx.sys
2011/02/12 01:37:37.0594 0388 adpahci (597f78224ee9224ea1a13d6350ced962) C:\Windows\system32\DRIVERS\adpahci.sys
2011/02/12 01:37:37.0612 0388 adpu320 (e109549c90f62fb570b9540c4b148e54) C:\Windows\system32\DRIVERS\adpu320.sys
2011/02/12 01:37:37.0648 0388 AFD (b9384e03479d2506bc924c16a3db87bc) C:\Windows\system32\drivers\afd.sys
2011/02/12 01:37:37.0678 0388 agp440 (608c14dba7299d8cb6ed035a68a15799) C:\Windows\system32\DRIVERS\agp440.sys
2011/02/12 01:37:37.0695 0388 aliide (5812713a477a3ad7363c7438ca2ee038) C:\Windows\system32\DRIVERS\aliide.sys
2011/02/12 01:37:37.0716 0388 amdide (1ff8b4431c353ce385c875f194924c0c) C:\Windows\system32\DRIVERS\amdide.sys
2011/02/12 01:37:37.0734 0388 AmdK8 (7024f087cff1833a806193ef9d22cda9) C:\Windows\system32\DRIVERS\amdk8.sys
2011/02/12 01:37:37.0876 0388 amdkmdag (f6640d83af0fd74c50e23e68548ea9a0) C:\Windows\system32\DRIVERS\atikmdag.sys
2011/02/12 01:37:38.0029 0388 amdkmdap (20b63276a1920b41e1c56720b395049b) C:\Windows\system32\DRIVERS\atikmpag.sys
2011/02/12 01:37:38.0045 0388 AmdPPM (1e56388b3fe0d031c44144eb8c4d6217) C:\Windows\system32\DRIVERS\amdppm.sys
2011/02/12 01:37:38.0060 0388 amdsata (7a4b413614c055935567cf88a9734d38) C:\Windows\system32\DRIVERS\amdsata.sys
2011/02/12 01:37:38.0079 0388 amdsbs (f67f933e79241ed32ff46a4f29b5120b) C:\Windows\system32\DRIVERS\amdsbs.sys
2011/02/12 01:37:38.0094 0388 amdxata (b4ad0cacbab298671dd6f6ef7e20679d) C:\Windows\system32\DRIVERS\amdxata.sys
2011/02/12 01:37:38.0112 0388 AppID (42fd751b27fa0e9c69bb39f39e409594) C:\Windows\system32\drivers\appid.sys
2011/02/12 01:37:38.0145 0388 arc (c484f8ceb1717c540242531db7845c4e) C:\Windows\system32\DRIVERS\arc.sys
2011/02/12 01:37:38.0159 0388 arcsas (019af6924aefe7839f61c830227fe79c) C:\Windows\system32\DRIVERS\arcsas.sys
2011/02/12 01:37:38.0180 0388 AsyncMac (769765ce2cc62867468cea93969b2242) C:\Windows\system32\DRIVERS\asyncmac.sys
2011/02/12 01:37:38.0194 0388 atapi (02062c0b390b7729edc9e69c680a6f3c) C:\Windows\system32\DRIVERS\atapi.sys
2011/02/12 01:37:38.0234 0388 AtiHDAudioService (4bf5bca6e2608cd8a00bc4a6673a9f47) C:\Windows\system32\drivers\AtihdW76.sys
2011/02/12 01:37:38.0290 0388 b06bdrv (3e5b191307609f7514148c6832bb0842) C:\Windows\system32\DRIVERS\bxvbda.sys
2011/02/12 01:37:38.0315 0388 b57nd60a (b5ace6968304a3900eeb1ebfd9622df2) C:\Windows\system32\DRIVERS\b57nd60a.sys
2011/02/12 01:37:38.0345 0388 Beep (16a47ce2decc9b099349a5f840654746) C:\Windows\system32\drivers\Beep.sys
2011/02/12 01:37:38.0375 0388 blbdrive (61583ee3c3a17003c4acd0475646b4d3) C:\Windows\system32\DRIVERS\blbdrive.sys
2011/02/12 01:37:38.0389 0388 bowser (91ce0d3dc57dd377e690a2d324022b08) C:\Windows\system32\DRIVERS\bowser.sys
2011/02/12 01:37:38.0409 0388 BrFiltLo (f09eee9edc320b5e1501f749fde686c8) C:\Windows\system32\DRIVERS\BrFiltLo.sys
2011/02/12 01:37:38.0421 0388 BrFiltUp (b114d3098e9bdb8bea8b053685831be6) C:\Windows\system32\DRIVERS\BrFiltUp.sys
2011/02/12 01:37:38.0452 0388 Brserid (43bea8d483bf1870f018e2d02e06a5bd) C:\Windows\System32\Drivers\Brserid.sys
2011/02/12 01:37:38.0468 0388 BrSerWdm (a6eca2151b08a09caceca35c07f05b42) C:\Windows\System32\Drivers\BrSerWdm.sys
2011/02/12 01:37:38.0481 0388 BrUsbMdm (b79968002c277e869cf38bd22cd61524) C:\Windows\System32\Drivers\BrUsbMdm.sys
2011/02/12 01:37:38.0494 0388 BrUsbSer (a87528880231c54e75ea7a44943b38bf) C:\Windows\System32\Drivers\BrUsbSer.sys
2011/02/12 01:37:38.0508 0388 BTHMODEM (9da669f11d1f894ab4eb69bf546a42e8) C:\Windows\system32\DRIVERS\bthmodem.sys
2011/02/12 01:37:38.0533 0388 cdfs (b8bd2bb284668c84865658c77574381a) C:\Windows\system32\DRIVERS\cdfs.sys
2011/02/12 01:37:38.0561 0388 cdrom (83d2d75e1efb81b3450c18131443f7db) C:\Windows\system32\DRIVERS\cdrom.sys
2011/02/12 01:37:38.0578 0388 circlass (d7cd5c4e1b71fa62050515314cfb52cf) C:\Windows\system32\DRIVERS\circlass.sys
2011/02/12 01:37:38.0608 0388 CLFS (fe1ec06f2253f691fe36217c592a0206) C:\Windows\system32\CLFS.sys
2011/02/12 01:37:38.0631 0388 CmBatt (0840155d0bddf1190f84a663c284bd33) C:\Windows\system32\DRIVERS\CmBatt.sys
2011/02/12 01:37:38.0643 0388 cmdide (e19d3f095812725d88f9001985b94edd) C:\Windows\system32\DRIVERS\cmdide.sys
2011/02/12 01:37:38.0661 0388 CNG (f95fd4cb7da00ba2a63ce9f6b5c053e1) C:\Windows\system32\Drivers\cng.sys
2011/02/12 01:37:38.0683 0388 Compbatt (102de219c3f61415f964c88e9085ad14) C:\Windows\system32\DRIVERS\compbatt.sys
2011/02/12 01:37:38.0708 0388 CompositeBus (f26b3a86f6fa87ca360b879581ab4123) C:\Windows\system32\DRIVERS\CompositeBus.sys
2011/02/12 01:37:38.0725 0388 crcdisk (1c827878a998c18847245fe1f34ee597) C:\Windows\system32\DRIVERS\crcdisk.sys
2011/02/12 01:37:38.0763 0388 CSC (4a6173c2279b498cd8f57cae504564cb) C:\Windows\system32\drivers\csc.sys
2011/02/12 01:37:38.0795 0388 DfsC (3f1dc527070acb87e40afe46ef6da749) C:\Windows\system32\Drivers\dfsc.sys
2011/02/12 01:37:38.0820 0388 discache (13096b05847ec78f0977f2c0f79e9ab3) C:\Windows\system32\drivers\discache.sys
2011/02/12 01:37:38.0849 0388 Disk (9819eee8b5ea3784ec4af3b137a5244c) C:\Windows\system32\DRIVERS\disk.sys
2011/02/12 01:37:38.0883 0388 drmkaud (9b19f34400d24df84c858a421c205754) C:\Windows\system32\drivers\drmkaud.sys
2011/02/12 01:37:38.0914 0388 DXGKrnl (ebce0b0924835f635f620d19f0529dce) C:\Windows\System32\drivers\dxgkrnl.sys
2011/02/12 01:37:38.0995 0388 ebdrv (dc5d737f51be844d8c82c695eb17372f) C:\Windows\system32\DRIVERS\evbda.sys
2011/02/12 01:37:39.0103 0388 elxstor (0e5da5369a0fcaea12456dd852545184) C:\Windows\system32\DRIVERS\elxstor.sys
2011/02/12 01:37:39.0124 0388 ErrDev (34a3c54752046e79a126e15c51db409b) C:\Windows\system32\DRIVERS\errdev.sys
2011/02/12 01:37:39.0207 0388 exfat (a510c654ec00c1e9bdd91eeb3a59823b) C:\Windows\system32\drivers\exfat.sys
2011/02/12 01:37:39.0302 0388 fastfat (0adc83218b66a6db380c330836f3e36d) C:\Windows\system32\drivers\fastfat.sys
2011/02/12 01:37:39.0324 0388 fdc (d765d19cd8ef61f650c384f62fac00ab) C:\Windows\system32\DRIVERS\fdc.sys
2011/02/12 01:37:39.0358 0388 FileInfo (655661be46b5f5f3fd454e2c3095b930) C:\Windows\system32\drivers\fileinfo.sys
2011/02/12 01:37:39.0372 0388 Filetrace (5f671ab5bc87eea04ec38a6cd5962a47) C:\Windows\system32\drivers\filetrace.sys
2011/02/12 01:37:39.0388 0388 flpydisk (c172a0f53008eaeb8ea33fe10e177af5) C:\Windows\system32\DRIVERS\flpydisk.sys
2011/02/12 01:37:39.0415 0388 FltMgr (f7866af72abbaf84b1fa5aa195378c59) C:\Windows\system32\drivers\fltmgr.sys
2011/02/12 01:37:39.0435 0388 FsDepends (d43703496149971890703b4b1b723eac) C:\Windows\system32\drivers\FsDepends.sys
2011/02/12 01:37:39.0454 0388 Fs_Rec (e95ef8547de20cf0603557c0cf7a9462) C:\Windows\system32\drivers\Fs_Rec.sys
2011/02/12 01:37:39.0469 0388 fvevol (ae87ba80d0ec3b57126ed2cdc15b24ed) C:\Windows\system32\DRIVERS\fvevol.sys
2011/02/12 01:37:39.0491 0388 gagp30kx (8c778d335c9d272cfd3298ab02abe3b6) C:\Windows\system32\DRIVERS\gagp30kx.sys
2011/02/12 01:37:39.0509 0388 hcw85cir (f2523ef6460fc42405b12248338ab2f0) C:\Windows\system32\drivers\hcw85cir.sys
2011/02/12 01:37:39.0537 0388 HdAudAddService (6410f6f415b2a5a9037224c41da8bf12) C:\Windows\system32\drivers\HdAudio.sys
2011/02/12 01:37:39.0571 0388 HDAudBus (0a49913402747a0b67de940fb42cbdbb) C:\Windows\system32\DRIVERS\HDAudBus.sys
2011/02/12 01:37:39.0585 0388 HidBatt (78e86380454a7b10a5eb255dc44a355f) C:\Windows\system32\DRIVERS\HidBatt.sys
2011/02/12 01:37:39.0601 0388 HidBth (7fd2a313f7afe5c4dab14798c48dd104) C:\Windows\system32\DRIVERS\hidbth.sys
2011/02/12 01:37:39.0623 0388 HidIr (0a77d29f311b88cfae3b13f9c1a73825) C:\Windows\system32\DRIVERS\hidir.sys
2011/02/12 01:37:39.0640 0388 HidUsb (b3bf6b5b50006def50b66306d99fcf6f) C:\Windows\system32\DRIVERS\hidusb.sys
2011/02/12 01:37:39.0662 0388 HpSAMD (0886d440058f203eba0e1825e4355914) C:\Windows\system32\DRIVERS\HpSAMD.sys
2011/02/12 01:37:39.0683 0388 HTTP (cee049cac4efa7f4e1e4ad014414a5d4) C:\Windows\system32\drivers\HTTP.sys
2011/02/12 01:37:39.0705 0388 hwpolicy (f17766a19145f111856378df337a5d79) C:\Windows\system32\drivers\hwpolicy.sys
2011/02/12 01:37:39.0719 0388 i8042prt (fa55c73d4affa7ee23ac4be53b4592d3) C:\Windows\system32\DRIVERS\i8042prt.sys
2011/02/12 01:37:39.0737 0388 iaStorV (d83efb6fd45df9d55e9a1afc63640d50) C:\Windows\system32\DRIVERS\iaStorV.sys
2011/02/12 01:37:39.0763 0388 iirsp (5c18831c61933628f5bb0ea2675b9d21) C:\Windows\system32\DRIVERS\iirsp.sys
2011/02/12 01:37:39.0817 0388 IntcAzAudAddService (e8017f1662d9142f45ceab694d013c00) C:\Windows\system32\drivers\RTKVHD64.sys
2011/02/12 01:37:39.0858 0388 intelide (f00f20e70c6ec3aa366910083a0518aa) C:\Windows\system32\DRIVERS\intelide.sys
2011/02/12 01:37:39.0882 0388 intelppm (ada036632c664caa754079041cf1f8c1) C:\Windows\system32\DRIVERS\intelppm.sys
2011/02/12 01:37:39.0917 0388 IpFilterDriver (722dd294df62483cecaae6e094b4d695) C:\Windows\system32\DRIVERS\ipfltdrv.sys
2011/02/12 01:37:39.0950 0388 IPMIDRV (e2b4a4494db7cb9b89b55ca268c337c5) C:\Windows\system32\DRIVERS\IPMIDrv.sys
2011/02/12 01:37:39.0970 0388 IPNAT (af9b39a7e7b6caa203b3862582e9f2d0) C:\Windows\system32\drivers\ipnat.sys
2011/02/12 01:37:39.0984 0388 IRENUM (3abf5e7213eb28966d55d58b515d5ce9) C:\Windows\system32\drivers\irenum.sys
2011/02/12 01:37:40.0007 0388 isapnp (2f7b28dc3e1183e5eb418df55c204f38) C:\Windows\system32\DRIVERS\isapnp.sys
2011/02/12 01:37:40.0030 0388 iScsiPrt (fa4d2557de56d45b0a346f93564be6e1) C:\Windows\system32\DRIVERS\msiscsi.sys
2011/02/12 01:37:40.0084 0388 JRAID (1c368c1a2733dcc5b8e15420aa2b0f6d) C:\Windows\system32\DRIVERS\jraid.sys
2011/02/12 01:37:40.0104 0388 kbdclass (bc02336f1cba7dcc7d1213bb588a68a5) C:\Windows\system32\DRIVERS\kbdclass.sys
2011/02/12 01:37:40.0119 0388 kbdhid (6def98f8541e1b5dceb2c822a11f7323) C:\Windows\system32\DRIVERS\kbdhid.sys
2011/02/12 01:37:40.0147 0388 KSecDD (e8b6fcc9c83535c67f835d407620bd27) C:\Windows\system32\Drivers\ksecdd.sys
2011/02/12 01:37:40.0174 0388 KSecPkg (a8c63880ef6f4d3fec7b616b9c060215) C:\Windows\system32\Drivers\ksecpkg.sys
2011/02/12 01:37:40.0195 0388 ksthunk (6869281e78cb31a43e969f06b57347c4) C:\Windows\system32\drivers\ksthunk.sys
2011/02/12 01:37:40.0235 0388 lltdio (1538831cf8ad2979a04c423779465827) C:\Windows\system32\DRIVERS\lltdio.sys
2011/02/12 01:37:40.0256 0388 LSI_FC (1a93e54eb0ece102495a51266dcdb6a6) C:\Windows\system32\DRIVERS\lsi_fc.sys
2011/02/12 01:37:40.0270 0388 LSI_SAS (1047184a9fdc8bdbff857175875ee810) C:\Windows\system32\DRIVERS\lsi_sas.sys
2011/02/12 01:37:40.0290 0388 LSI_SAS2 (30f5c0de1ee8b5bc9306c1f0e4a75f93) C:\Windows\system32\DRIVERS\lsi_sas2.sys
2011/02/12 01:37:40.0305 0388 LSI_SCSI (0504eacaff0d3c8aed161c4b0d369d4a) C:\Windows\system32\DRIVERS\lsi_scsi.sys
2011/02/12 01:37:40.0328 0388 luafv (43d0f98e1d56ccddb0d5254cff7b356e) C:\Windows\system32\drivers\luafv.sys
2011/02/12 01:37:40.0357 0388 mcdbus (79d51e7f5926e8ce1b3ebecebae28cff) C:\Windows\system32\DRIVERS\mcdbus.sys
2011/02/12 01:37:40.0380 0388 megasas (a55805f747c6edb6a9080d7c633bd0f4) C:\Windows\system32\DRIVERS\megasas.sys
2011/02/12 01:37:40.0396 0388 MegaSR (baf74ce0072480c3b6b7c13b2a94d6b3) C:\Windows\system32\DRIVERS\MegaSR.sys
2011/02/12 01:37:40.0421 0388 Modem (800ba92f7010378b09f9ed9270f07137) C:\Windows\system32\drivers\modem.sys
2011/02/12 01:37:40.0442 0388 monitor (b03d591dc7da45ece20b3b467e6aadaa) C:\Windows\system32\DRIVERS\monitor.sys
2011/02/12 01:37:40.0467 0388 mouclass (7d27ea49f3c1f687d357e77a470aea99) C:\Windows\system32\DRIVERS\mouclass.sys
2011/02/12 01:37:40.0489 0388 mouhid (d3bf052c40b0c4166d9fd86a4288c1e6) C:\Windows\system32\DRIVERS\mouhid.sys
2011/02/12 01:37:40.0504 0388 mountmgr (791af66c4d0e7c90a3646066386fb571) C:\Windows\system32\drivers\mountmgr.sys
2011/02/12 01:37:40.0528 0388 mpio (609d1d87649ecc19796f4d76d4c15cea) C:\Windows\system32\DRIVERS\mpio.sys
2011/02/12 01:37:40.0558 0388 mpsdrv (6c38c9e45ae0ea2fa5e551f2ed5e978f) C:\Windows\system32\drivers\mpsdrv.sys
2011/02/12 01:37:40.0588 0388 MRxDAV (30524261bb51d96d6fcbac20c810183c) C:\Windows\system32\drivers\mrxdav.sys
2011/02/12 01:37:40.0605 0388 mrxsmb (767a4c3bcf9410c286ced15a2db17108) C:\Windows\system32\DRIVERS\mrxsmb.sys
2011/02/12 01:37:40.0622 0388 mrxsmb10 (920ee0ff995fcfdeb08c41605a959e1c) C:\Windows\system32\DRIVERS\mrxsmb10.sys
2011/02/12 01:37:40.0637 0388 mrxsmb20 (740d7ea9d72c981510a5292cf6adc941) C:\Windows\system32\DRIVERS\mrxsmb20.sys
2011/02/12 01:37:40.0650 0388 msahci (5c37497276e3b3a5488b23a326a754b7) C:\Windows\system32\DRIVERS\msahci.sys
2011/02/12 01:37:40.0673 0388 msdsm (8d27b597229aed79430fb9db3bcbfbd0) C:\Windows\system32\DRIVERS\msdsm.sys
2011/02/12 01:37:40.0697 0388 Msfs (aa3fb40e17ce1388fa1bedab50ea8f96) C:\Windows\system32\drivers\Msfs.sys
2011/02/12 01:37:40.0715 0388 mshidkmdf (f9d215a46a8b9753f61767fa72a20326) C:\Windows\System32\drivers\mshidkmdf.sys
2011/02/12 01:37:40.0751 0388 MSILiveVirtualCamera (05aabc801c159dbd307ddb214e655da1) C:\Windows\system32\DRIVERS\MSILiveVirtualCamera.sys
2011/02/12 01:37:40.0769 0388 msisadrv (d916874bbd4f8b07bfb7fa9b3ccae29d) C:\Windows\system32\DRIVERS\msisadrv.sys
2011/02/12 01:37:40.0818 0388 MSI_DVD_010507 (b0142fb630770fd1e31983793cef5945) C:\PROGRA~1\MSI\MSIWDev\DVDSYS64_100507.sys
2011/02/12 01:37:40.0831 0388 MSI_MSIBIOS_010507 (192476c10371dc83243d67432b2cdcbf) C:\PROGRA~1\MSI\MSIWDev\msibios64_100507.sys
2011/02/12 01:37:40.0844 0388 MSI_VGASYS_010507 (541721064012dd044aeb1b74fbdbda14) C:\PROGRA~1\MSI\MSIWDev\VGASYS64_100507.sys
2011/02/12 01:37:40.0872 0388 MSKSSRV (49ccf2c4fea34ffad8b1b59d49439366) C:\Windows\system32\drivers\MSKSSRV.sys
2011/02/12 01:37:40.0884 0388 MSPCLOCK (bdd71ace35a232104ddd349ee70e1ab3) C:\Windows\system32\drivers\MSPCLOCK.sys
2011/02/12 01:37:40.0907 0388 MSPQM (4ed981241db27c3383d72092b618a1d0) C:\Windows\system32\drivers\MSPQM.sys
2011/02/12 01:37:40.0922 0388 MsRPC (89cb141aa8616d8c6a4610fa26c60964) C:\Windows\system32\drivers\MsRPC.sys
2011/02/12 01:37:40.0948 0388 mssmbios (0eed230e37515a0eaee3c2e1bc97b288) C:\Windows\system32\DRIVERS\mssmbios.sys
2011/02/12 01:37:40.0960 0388 MSTEE (2e66f9ecb30b4221a318c92ac2250779) C:\Windows\system32\drivers\MSTEE.sys
2011/02/12 01:37:40.0976 0388 MTConfig (7ea404308934e675bffde8edf0757bcd) C:\Windows\system32\DRIVERS\MTConfig.sys
2011/02/12 01:37:40.0993 0388 Mup (f9a18612fd3526fe473c1bda678d61c8) C:\Windows\system32\Drivers\mup.sys
2011/02/12 01:37:41.0014 0388 mv91cons (6af2640b5d7202fa0d96467318d4592e) C:\Windows\system32\DRIVERS\mv91cons.sys
2011/02/12 01:37:41.0080 0388 mv91xx (77073c1af9c0921ff18ee628049bb1a9) C:\Windows\system32\DRIVERS\mv91xx.sys
2011/02/12 01:37:41.0125 0388 NativeWifiP (1ea3749c4114db3e3161156ffffa6b33) C:\Windows\system32\DRIVERS\nwifi.sys
2011/02/12 01:37:41.0169 0388 NDIS (cad515dbd07d082bb317d9928ce8962c) C:\Windows\system32\drivers\ndis.sys
2011/02/12 01:37:41.0205 0388 NdisCap (9f9a1f53aad7da4d6fef5bb73ab811ac) C:\Windows\system32\DRIVERS\ndiscap.sys
2011/02/12 01:37:41.0229 0388 NdisTapi (30639c932d9fef22b31268fe25a1b6e5) C:\Windows\system32\DRIVERS\ndistapi.sys
2011/02/12 01:37:41.0244 0388 Ndisuio (f105ba1e22bf1f2ee8f005d4305e4bec) C:\Windows\system32\DRIVERS\ndisuio.sys
2011/02/12 01:37:41.0262 0388 NdisWan (557dfab9ca1fcb036ac77564c010dad3) C:\Windows\system32\DRIVERS\ndiswan.sys
2011/02/12 01:37:41.0290 0388 NDProxy (659b74fb74b86228d6338d643cd3e3cf) C:\Windows\system32\drivers\NDProxy.sys
2011/02/12 01:37:41.0309 0388 NetBIOS (86743d9f5d2b1048062b14b1d84501c4) C:\Windows\system32\DRIVERS\netbios.sys
2011/02/12 01:37:41.0325 0388 NetBT (9162b273a44ab9dce5b44362731d062a) C:\Windows\system32\DRIVERS\netbt.sys
2011/02/12 01:37:41.0360 0388 nfrd960 (77889813be4d166cdab78ddba990da92) C:\Windows\system32\DRIVERS\nfrd960.sys
2011/02/12 01:37:41.0389 0388 Npfs (1e4c4ab5c9b8dd13179bbdc75a2a01f7) C:\Windows\system32\drivers\Npfs.sys
2011/02/12 01:37:41.0414 0388 nsiproxy (e7f5ae18af4168178a642a9247c63001) C:\Windows\system32\drivers\nsiproxy.sys
2011/02/12 01:37:41.0462 0388 Ntfs (356698a13c4630d5b31c37378d469196) C:\Windows\system32\drivers\Ntfs.sys
2011/02/12 01:37:41.0497 0388 Null (9899284589f75fa8724ff3d16aed75c1) C:\Windows\system32\drivers\Null.sys
2011/02/12 01:37:41.0523 0388 nusb3hub (285acec1b13a15ba520aae06bacb9cff) C:\Windows\system32\DRIVERS\nusb3hub.sys
2011/02/12 01:37:41.0551 0388 nusb3xhc (f6d625ff7b56bb6ea063f0d3a5bbc996) C:\Windows\system32\DRIVERS\nusb3xhc.sys
2011/02/12 01:37:41.0566 0388 nvraid (3e38712941e9bb4ddbee00affe3fed3d) C:\Windows\system32\DRIVERS\nvraid.sys
2011/02/12 01:37:41.0582 0388 nvstor (477dc4d6deb99be37084c9ac6d013da1) C:\Windows\system32\DRIVERS\nvstor.sys
2011/02/12 01:37:41.0606 0388 nv_agp (270d7cd42d6e3979f6dd0146650f0e05) C:\Windows\system32\DRIVERS\nv_agp.sys
2011/02/12 01:37:41.0629 0388 ohci1394 (3589478e4b22ce21b41fa1bfc0b8b8a0) C:\Windows\system32\DRIVERS\ohci1394.sys
2011/02/12 01:37:41.0649 0388 Parport (0086431c29c35be1dbc43f52cc273887) C:\Windows\system32\DRIVERS\parport.sys
2011/02/12 01:37:41.0667 0388 partmgr (7daa117143316c4a1537e074a5a9eaf0) C:\Windows\system32\drivers\partmgr.sys
2011/02/12 01:37:41.0690 0388 pci (f36f6504009f2fb0dfd1b17a116ad74b) C:\Windows\system32\DRIVERS\pci.sys
2011/02/12 01:37:41.0705 0388 pciide (b5b8b5ef2e5cb34df8dcf8831e3534fa) C:\Windows\system32\DRIVERS\pciide.sys
2011/02/12 01:37:41.0734 0388 pcmcia (b2e81d4e87ce48589f98cb8c05b01f2f) C:\Windows\system32\DRIVERS\pcmcia.sys
2011/02/12 01:37:41.0757 0388 pcw (d6b9c2e1a11a3a4b26a182ffef18f603) C:\Windows\system32\drivers\pcw.sys
2011/02/12 01:37:41.0777 0388 PEAUTH (68769c3356b3be5d1c732c97b9a80d6e) C:\Windows\system32\drivers\peauth.sys
2011/02/12 01:37:41.0833 0388 PptpMiniport (27cc19e81ba5e3403c48302127bda717) C:\Windows\system32\DRIVERS\raspptp.sys
2011/02/12 01:37:41.0852 0388 Processor (0d922e23c041efb1c3fac2a6f943c9bf) C:\Windows\system32\DRIVERS\processr.sys
2011/02/12 01:37:41.0882 0388 Psched (ee992183bd8eaefd9973f352e587a299) C:\Windows\system32\DRIVERS\pacer.sys
2011/02/12 01:37:41.0913 0388 ql2300 (a53a15a11ebfd21077463ee2c7afeef0) C:\Windows\system32\DRIVERS\ql2300.sys
2011/02/12 01:37:41.0989 0388 ql40xx (4f6d12b51de1aaeff7dc58c4d75423c8) C:\Windows\system32\DRIVERS\ql40xx.sys
2011/02/12 01:37:42.0023 0388 QWAVEdrv (76707bb36430888d9ce9d705398adb6c) C:\Windows\system32\drivers\qwavedrv.sys
2011/02/12 01:37:42.0045 0388 RasAcd (5a0da8ad5762fa2d91678a8a01311704) C:\Windows\system32\DRIVERS\rasacd.sys
2011/02/12 01:37:42.0063 0388 RasAgileVpn (7ecff9b22276b73f43a99a15a6094e90) C:\Windows\system32\DRIVERS\AgileVpn.sys
2011/02/12 01:37:42.0086 0388 Rasl2tp (87a6e852a22991580d6d39adc4790463) C:\Windows\system32\DRIVERS\rasl2tp.sys
2011/02/12 01:37:42.0110 0388 RasPppoe (855c9b1cd4756c5e9a2aa58a15f58c25) C:\Windows\system32\DRIVERS\raspppoe.sys
2011/02/12 01:37:42.0133 0388 RasSstp (e8b1e447b008d07ff47d016c2b0eeecb) C:\Windows\system32\DRIVERS\rassstp.sys
2011/02/12 01:37:42.0150 0388 rdbss (3bac8142102c15d59a87757c1d41dce5) C:\Windows\system32\DRIVERS\rdbss.sys
2011/02/12 01:37:42.0169 0388 rdpbus (302da2a0539f2cf54d7c6cc30c1f2d8d) C:\Windows\system32\DRIVERS\rdpbus.sys
2011/02/12 01:37:42.0184 0388 RDPCDD (cea6cc257fc9b7715f1c2b4849286d24) C:\Windows\system32\DRIVERS\RDPCDD.sys
2011/02/12 01:37:42.0205 0388 RDPDR (9706b84dbabfc4b4ca46c5a82b14dfa3) C:\Windows\system32\drivers\rdpdr.sys
2011/02/12 01:37:42.0228 0388 RDPENCDD (bb5971a4f00659529a5c44831af22365) C:\Windows\system32\drivers\rdpencdd.sys
2011/02/12 01:37:42.0248 0388 RDPREFMP (216f3fa57533d98e1f74ded70113177a) C:\Windows\system32\drivers\rdprefmp.sys
2011/02/12 01:37:42.0263 0388 RDPWD (8a3e6bea1c53ea6177fe2b6eba2c80d7) C:\Windows\system32\drivers\RDPWD.sys
2011/02/12 01:37:42.0288 0388 rdyboost (634b9a2181d98f15941236886164ec8b) C:\Windows\system32\drivers\rdyboost.sys
2011/02/12 01:37:42.0327 0388 rspndr (ddc86e4f8e7456261e637e3552e804ff) C:\Windows\system32\DRIVERS\rspndr.sys
2011/02/12 01:37:42.0371 0388 RTL8167 (4b42bc58294e83a6a92ec8b88c14c4a3) C:\Windows\system32\DRIVERS\Rt64win7.sys
2011/02/12 01:37:42.0397 0388 s3cap (88af6e02ab19df7fd07ecdf9c91e9af6) C:\Windows\system32\DRIVERS\vms3cap.sys
2011/02/12 01:37:42.0446 0388 Saffire (c41c3a2485d94698f74a6561d2fd6b83) C:\Windows\system32\Drivers\Saffire.sys
2011/02/12 01:37:42.0484 0388 SaffireAudio (7e847d5ca3c8460c5bf253338966c21e) C:\Windows\system32\drivers\SaffireAudio.sys
2011/02/12 01:37:42.0505 0388 SaffireMidi (1e8308f00873509fb3b1bb3b3edba89a) C:\Windows\system32\drivers\SaffireMidi.sys
2011/02/12 01:37:42.0533 0388 sbp2port (e3bbb89983daf5622c1d50cf49f28227) C:\Windows\system32\DRIVERS\sbp2port.sys
2011/02/12 01:37:42.0558 0388 scfilter (c94da20c7e3ba1dca269bc8460d98387) C:\Windows\system32\DRIVERS\scfilter.sys
2011/02/12 01:37:42.0587 0388 secdrv (3ea8a16169c26afbeb544e0e48421186) C:\Windows\system32\drivers\secdrv.sys
2011/02/12 01:37:42.0616 0388 Serenum (cb624c0035412af0debec78c41f5ca1b) C:\Windows\system32\DRIVERS\serenum.sys
2011/02/12 01:37:42.0641 0388 Serial (c1d8e28b2c2adfaec4ba89e9fda69bd6) C:\Windows\system32\DRIVERS\serial.sys
2011/02/12 01:37:42.0666 0388 sermouse (1c545a7d0691cc4a027396535691c3e3) C:\Windows\system32\DRIVERS\sermouse.sys
2011/02/12 01:37:42.0690 0388 sffdisk (a554811bcd09279536440c964ae35bbf) C:\Windows\system32\DRIVERS\sffdisk.sys
2011/02/12 01:37:42.0704 0388 sffp_mmc (ff414f0baefeba59bc6c04b3db0b87bf) C:\Windows\system32\DRIVERS\sffp_mmc.sys
2011/02/12 01:37:42.0718 0388 sffp_sd (178298f767fe638c9fedcbdef58bb5e4) C:\Windows\system32\DRIVERS\sffp_sd.sys
2011/02/12 01:37:42.0732 0388 sfloppy (a9d601643a1647211a1ee2ec4e433ff4) C:\Windows\system32\DRIVERS\sfloppy.sys
2011/02/12 01:37:42.0759 0388 SiSRaid2 (843caf1e5fde1ffd5ff768f23a51e2e1) C:\Windows\system32\DRIVERS\SiSRaid2.sys
2011/02/12 01:37:42.0786 0388 SiSRaid4 (6a6c106d42e9ffff8b9fcb4f754f6da4) C:\Windows\system32\DRIVERS\sisraid4.sys
2011/02/12 01:37:42.0814 0388 Smb (548260a7b8654e024dc30bf8a7c5baa4) C:\Windows\system32\DRIVERS\smb.sys
2011/02/12 01:37:43.0192 0388 SNP2STD (59c7c44c1a0d154b885124ba705c0295) C:\Windows\system32\DRIVERS\snp2sxp.sys
2011/02/12 01:37:43.0450 0388 spldr (b9e31e5cacdfe584f34f730a677803f9) C:\Windows\system32\drivers\spldr.sys
2011/02/12 01:37:43.0477 0388 srv (de6f5658da951c4bc8e498570b5b0d5f) C:\Windows\system32\DRIVERS\srv.sys
2011/02/12 01:37:43.0497 0388 srv2 (4d33d59c0b930c523d29f9bd40cda9d2) C:\Windows\system32\DRIVERS\srv2.sys
2011/02/12 01:37:43.0515 0388 srvnet (5a663fd67049267bc5c3f3279e631ffb) C:\Windows\system32\DRIVERS\srvnet.sys
2011/02/12 01:37:43.0553 0388 stexstor (f3817967ed533d08327dc73bc4d5542a) C:\Windows\system32\DRIVERS\stexstor.sys
2011/02/12 01:37:43.0569 0388 storflt (ffd7a6f15b14234b5b0e5d49e7961895) C:\Windows\system32\DRIVERS\vmstorfl.sys
2011/02/12 01:37:43.0591 0388 storvsc (8fccbefc5c440b3c23454656e551b09a) C:\Windows\system32\DRIVERS\storvsc.sys
2011/02/12 01:37:43.0613 0388 swenum (d01ec09b6711a5f8e7e6564a4d0fbc90) C:\Windows\system32\DRIVERS\swenum.sys
2011/02/12 01:37:43.0672 0388 Tcpip (90a2d722cf64d911879d6c4a4f802a4d) C:\Windows\system32\drivers\tcpip.sys
2011/02/12 01:37:43.0735 0388 TCPIP6 (90a2d722cf64d911879d6c4a4f802a4d) C:\Windows\system32\DRIVERS\tcpip.sys
2011/02/12 01:37:43.0765 0388 tcpipreg (76d078af6f587b162d50210f761eb9ed) C:\Windows\system32\drivers\tcpipreg.sys
2011/02/12 01:37:43.0784 0388 TDPIPE (3371d21011695b16333a3934340c4e7c) C:\Windows\system32\drivers\tdpipe.sys
2011/02/12 01:37:43.0810 0388 TDTCP (e4245bda3190a582d55ed09e137401a9) C:\Windows\system32\drivers\tdtcp.sys
2011/02/12 01:37:43.0829 0388 tdx (079125c4b17b01fcaeebce0bcb290c0f) C:\Windows\system32\DRIVERS\tdx.sys
2011/02/12 01:37:43.0849 0388 TermDD (c448651339196c0e869a355171875522) C:\Windows\system32\DRIVERS\termdd.sys
2011/02/12 01:37:43.0881 0388 tssecsrv (61b96c26131e37b24e93327a0bd1fb95) C:\Windows\system32\DRIVERS\tssecsrv.sys
2011/02/12 01:37:43.0906 0388 tunnel (3836171a2cdf3af8ef10856db9835a70) C:\Windows\system32\DRIVERS\tunnel.sys
2011/02/12 01:37:43.0977 0388 TurboB (f37d49111a12a97de4bb5d8ff444bd2c) C:\Windows\system32\DRIVERS\TurboB.sys
2011/02/12 01:37:44.0035 0388 uagp35 (b4dd609bd7e282bfc683cec7eaaaad67) C:\Windows\system32\DRIVERS\uagp35.sys
2011/02/12 01:37:44.0052 0388 udfs (d47baead86c65d4f4069d7ce0a4edceb) C:\Windows\system32\DRIVERS\udfs.sys
2011/02/12 01:37:44.0077 0388 uliagpkx (4bfe1bc28391222894cbf1e7d0e42320) C:\Windows\system32\DRIVERS\uliagpkx.sys
2011/02/12 01:37:44.0106 0388 umbus (eab6c35e62b1b0db0d1b48b671d3a117) C:\Windows\system32\DRIVERS\umbus.sys
2011/02/12 01:37:44.0119 0388 UmPass (b2e8e8cb557b156da5493bbddcc1474d) C:\Windows\system32\DRIVERS\umpass.sys
2011/02/12 01:37:44.0147 0388 usbccgp (b26afb54a534d634523c4fb66765b026) C:\Windows\system32\DRIVERS\usbccgp.sys
2011/02/12 01:37:44.0161 0388 usbcir (af0892a803fdda7492f595368e3b68e7) C:\Windows\system32\DRIVERS\usbcir.sys
2011/02/12 01:37:44.0183 0388 usbehci (df9f9afc9aaabd8ed47975d44e38169a) C:\Windows\system32\DRIVERS\usbehci.sys
2011/02/12 01:37:44.0210 0388 usbhub (372a91bc3c6603080a793880b0873785) C:\Windows\system32\DRIVERS\usbhub.sys
2011/02/12 01:37:44.0232 0388 usbohci (58e546bbaf87664fc57e0f6081e4f609) C:\Windows\system32\DRIVERS\usbohci.sys
2011/02/12 01:37:44.0248 0388 usbprint (73188f58fb384e75c4063d29413cee3d) C:\Windows\system32\DRIVERS\usbprint.sys
2011/02/12 01:37:44.0283 0388 usbscan (aaa2513c8aed8b54b189fd0c6b1634c0) C:\Windows\system32\DRIVERS\usbscan.sys
2011/02/12 01:37:44.0319 0388 USBSTOR (080d3820da6c046be82fc8b45a893e83) C:\Windows\system32\DRIVERS\USBSTOR.SYS
2011/02/12 01:37:44.0436 0388 usbuhci (81fb2216d3a60d1284455d511797db3d) C:\Windows\system32\DRIVERS\usbuhci.sys
2011/02/12 01:37:44.0471 0388 vdrvroot (c5c876ccfc083ff3b128f933823e87bd) C:\Windows\system32\DRIVERS\vdrvroot.sys
2011/02/12 01:37:44.0513 0388 vga (da4da3f5e02943c2dc8c6ed875de68dd) C:\Windows\system32\DRIVERS\vgapnp.sys
2011/02/12 01:37:44.0553 0388 VgaSave (53e92a310193cb3c03bea963de7d9cfc) C:\Windows\System32\drivers\vga.sys
2011/02/12 01:37:44.0622 0388 vhdmp (c82e748660f62a242b2dfac1442f22a4) C:\Windows\system32\DRIVERS\vhdmp.sys
2011/02/12 01:37:44.0650 0388 viaide (e5689d93ffe4e5d66c0178761240dd54) C:\Windows\system32\DRIVERS\viaide.sys
2011/02/12 01:37:44.0673 0388 vmbus (1501699d7eda984abc4155a7da5738d1) C:\Windows\system32\DRIVERS\vmbus.sys
2011/02/12 01:37:44.0691 0388 VMBusHID (ae10c35761889e65a6f7176937c5592c) C:\Windows\system32\DRIVERS\VMBusHID.sys
2011/02/12 01:37:44.0719 0388 volmgr (2b1a3dae2b4e70dbba822b7a03fbd4a3) C:\Windows\system32\DRIVERS\volmgr.sys
2011/02/12 01:37:44.0745 0388 volmgrx (99b0cbb569ca79acaed8c91461d765fb) C:\Windows\system32\drivers\volmgrx.sys
2011/02/12 01:37:44.0768 0388 volsnap (58f82eed8ca24b461441f9c3e4f0bf5c) C:\Windows\system32\DRIVERS\volsnap.sys
2011/02/12 01:37:44.0789 0388 vsmraid (5e2016ea6ebaca03c04feac5f330d997) C:\Windows\system32\DRIVERS\vsmraid.sys
2011/02/12 01:37:44.0816 0388 vwifibus (36d4720b72b5c5d9cb2b9c29e9df67a1) C:\Windows\System32\drivers\vwifibus.sys
2011/02/12 01:37:44.0835 0388 WacomPen (4e9440f4f152a7b944cb1663d3935a3e) C:\Windows\system32\DRIVERS\wacompen.sys
2011/02/12 01:37:44.0858 0388 WANARP (47ca49400643effd3f1c9a27e1d69324) C:\Windows\system32\DRIVERS\wanarp.sys
2011/02/12 01:37:44.0867 0388 Wanarpv6 (47ca49400643effd3f1c9a27e1d69324) C:\Windows\system32\DRIVERS\wanarp.sys
2011/02/12 01:37:44.0901 0388 Wd (72889e16ff12ba0f235467d6091b17dc) C:\Windows\system32\DRIVERS\wd.sys
2011/02/12 01:37:44.0931 0388 Wdf01000 (441bd2d7b4f98134c3a4f9fa570fd250) C:\Windows\system32\drivers\Wdf01000.sys
2011/02/12 01:37:44.0974 0388 WfpLwf (611b23304bf067451a9fdee01fbdd725) C:\Windows\system32\DRIVERS\wfplwf.sys
2011/02/12 01:37:44.0987 0388 WIMMount (05ecaec3e4529a7153b3136ceb49f0ec) C:\Windows\system32\drivers\wimmount.sys
2011/02/12 01:37:45.0062 0388 WinUsb (817eaff5d38674edd7713b9dfb8e9791) C:\Windows\system32\DRIVERS\WinUsb.sys
2011/02/12 01:37:45.0090 0388 WmiAcpi (f6ff8944478594d0e414d3f048f0d778) C:\Windows\system32\DRIVERS\wmiacpi.sys
2011/02/12 01:37:45.0119 0388 ws2ifsl (6bcc1d7d2fd2453957c5479a32364e52) C:\Windows\system32\drivers\ws2ifsl.sys
2011/02/12 01:37:45.0154 0388 WudfPf (7cadc74271dd6461c452c271b30bd378) C:\Windows\system32\drivers\WudfPf.sys
2011/02/12 01:37:45.0186 0388 WUDFRd (3b197af0fff08aa66b6b2241ca538d64) C:\Windows\system32\DRIVERS\WUDFRd.sys
2011/02/12 01:37:45.0234 0388 ================================================================================
2011/02/12 01:37:45.0234 0388 Scan finished
2011/02/12 01:37:45.0234 0388 ================================================================================


So is the computer clean or you want me to use any other programs? Where do I go from here?

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:25 AM

Posted 11 February 2011 - 09:13 PM

Hi, I didn't say they were the cause of the BSOD but were for the infections. If you still have the BSOD's. Then it's either a hard / software issue now or possibly a deep rootkit,but I think it's more the first. If they continue i think you need to post in the Win 7 forum and have them test as I see no more malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 AnaLoGMunKy

AnaLoGMunKy
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 11 February 2011 - 09:22 PM

Hi, I didn't say they were the cause of the BSOD but were for the infections. If you still have the BSOD's. Then it's either a hard / software issue now or possibly a deep rootkit,but I think it's more the first. If they continue i think you need to post in the Win 7 forum and have them test as I see no more malware.


Ok I will open a new thread in win7 forum section :thumbup2:

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:25 AM

Posted 11 February 2011 - 10:01 PM

Ok if they cannot find it come back here and we'll post in the Malware logs section,if they don't send you.
:thumbsup:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 AnaLoGMunKy

AnaLoGMunKy
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edinburgh
  • Local time:08:25 AM

Posted 12 February 2011 - 09:26 PM

BSOD thread
DDS log thread

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:25 AM

Posted 12 February 2011 - 09:39 PM

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users