Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Sound is removed and system can not restore


  • This topic is locked This topic is locked
24 replies to this topic

#1 mzche

mzche

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 16 February 2011 - 03:49 PM

I think a virus removed the sound on my computer and I can't do a system restore because it says "system restore can not protect your computer, please restart." I have restarted the computer and it says the same thing. My web browser also redirects to other websites (when I search).

What is the best way to go about fixing?

Edited by hamluis, 16 February 2011 - 03:54 PM.
Moved from XP forum to Am I Infected.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 17 February 2011 - 10:06 PM

Hello and welcome,it does appear you are imfected. We will need to run a few tools and review the logs.

Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware


Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
Close all open browsers before using, especially FireFox. <-Important!!!
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 20 February 2011 - 06:52 PM

Computer will not let me update malwarebytes.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 20 February 2011 - 07:19 PM

OK, run this first and try again,
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


YOu can also Manually Downloading Updates:
Manually download them from HERE and just double-click on mbam-rules.exe to install. Alternatively, you can updatethrough MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine..

Note: Mbam-rules.exe is not updated daily. Another way to get the most current database definitions if you're having problems updating through the program's interface or have already manually downloaded the latest definitions (mbam-rules.exe) shown on this page, is to do the following: Install MBAM on a clean computer, launch the program and update through MBAM's interface. Copy the definitions (rules.ref) to a USB stick or CD and transfer that file to the infected machine. Copy rules.ref to the location indicated for your operating system. If you cannot see the folder, then you may have to
url=http://www.bleepingcomputer.com/tutorials/how-to-see-hidden-files-in-windows/]Reconfigure Windows[/url] to show it.
  • XP: C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware
  • Vista: C:\Documents and Settings\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 21 February 2011 - 11:12 PM

I was finally able to update malwarebytes. I followed all of the steps but the browser is still redirecting. Here are my logs:



Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5363

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

2/21/2011 2:58:01 AM
mbam-log-2011-02-21 (02-58-01).txt

Scan type: Quick scan
Objects scanned: 212820
Time elapsed: 22 minute(s), 56 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SSHNAS (Trojan.Renos) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Bad: (93.188.164.35,93.188.160.105) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{34909000-DF2A-473F-AFC4-6784672AE383}\DhcpNameServer (Trojan.DNSChanger) -> Bad: (93.188.164.35,93.188.160.105) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DD0C7AF5-A15E-4B48-9F8E-9C39A8A1385B}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.164.35,93.188.160.105) Good: () -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\RECYCLER\s-1-5-21-1004336348-343818398-842925246-1003\Dc14.tmp (Trojan.Hiloti.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\Tasks\{22116563-108c-42c0-a7ce-60161b75e508}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\Tasks\{62c40aa6-4406-467a-a5a5-dfdf1b559b7a}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\Tasks\{bbaeaeaf-1275-40e2-bd6c-bc8f88bd114a}.job (Trojan.Downloader) -> Quarantined and deleted successfully.




SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/21/2011 at 10:23 PM

Application Version : 4.48.1000

Core Rules Database Version : 6203
Trace Rules Database Version: 4015

Scan type : Complete Scan
Total Scan Time : 01:49:21

Memory items scanned : 219
Memory threats detected : 0
Registry items scanned : 6911
Registry threats detected : 38
File items scanned : 22108
File threats detected : 77

System.BrokenFileAssociation
HKCR\.exe

Trojan.Dropper/Win-NV
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Type
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Start
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters#ServiceDll
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Security
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Security#Security

Trojan.Agent/Gen-SSHNAS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000\Control
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSHNAS\0000\Control#ActiveService

Trojan.DNS-Changer (Hi-Jacked DNS)
HKLM\SYSTEM\CONTROLSET002\SERVICES\TCPIP\PARAMETERS\INTERFACES\{34909000-DF2A-473F-AFC4-6784672AE383}#NAMESERVER
HKLM\SYSTEM\CONTROLSET002\SERVICES\TCPIP\PARAMETERS\INTERFACES\{DD0C7AF5-A15E-4B48-9F8E-9C39A8A1385B}#NAMESERVER
HKLM\SYSTEM\CONTROLSET003\SERVICES\TCPIP\PARAMETERS\INTERFACES\{DD0C7AF5-A15E-4B48-9F8E-9C39A8A1385B}#NAMESERVER
HKLM\SYSTEM\CONTROLSET004\SERVICES\TCPIP\PARAMETERS\INTERFACES\{DD0C7AF5-A15E-4B48-9F8E-9C39A8A1385B}#NAMESERVER
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{DD0C7AF5-A15E-4B48-9F8E-9C39A8A1385B}#NAMESERVER
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS#NAMESERVER
HKLM\SYSTEM\CONTROLSET002\SERVICES\TCPIP\PARAMETERS#NAMESERVER
HKLM\SYSTEM\CONTROLSET003\SERVICES\TCPIP\PARAMETERS#NAMESERVER
HKLM\SYSTEM\CONTROLSET004\SERVICES\TCPIP\PARAMETERS#NAMESERVER

Malware.Trace
HKU\.DEFAULT\Software\Microsoft\Handle
HKU\S-1-5-18\Software\Microsoft\Handle

Adware.Tracking Cookie
.advertise.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.collective-media.net [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.collective-media.net [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.collective-media.net [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.myroitracking.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.tribalfusion.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.clicksor.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.clicksor.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.clicksor.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.clicksor.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.clicksor.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
.kontera.com [ C:\Documents and Settings\dearshay\Application Data\Mozilla\Firefox\Profiles\synroa4e.default\cookies.sqlite ]
udn.specificclick.net [ C:\Documents and Settings\LAD\Application Data\Macromedia\Flash Player\#SharedObjects\XSL8KVAQ ]
www.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.wordtracker.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.richmedia.yahoo.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.linksynergy.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.linksynergy.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.linksynergy.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.findhauntedhouses.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.findhauntedhouses.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.findhauntedhouses.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
.findhauntedhouses.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
www.googleadservices.com [ C:\Documents and Settings\LAD\Application Data\Mozilla\Firefox\Profiles\t653vv1e.default\cookies.sqlite ]
acvs.mediaonenetwork.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
bc.youporn.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
cdn4.specificclick.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
ds.serving-sys.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
googleads.g.doubleclick.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
interclick.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
m1.2mdn.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media-dev.pictela.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.entertonement.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.jambocast.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.mtvnservices.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.mtvu.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.scanscout.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.socialvibe.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media.thewb.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media01.kyte.tv [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
media1.break.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
mediatakeout.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
msntest.serving-sys.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
naiadsystems.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
objects.tremormedia.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
secure-us.imrworldwide.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
serving-sys.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
static.sexsearchcom.com [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
udn.specificclick.net [ C:\Documents and Settings\netta\Application Data\Macromedia\Flash Player\#SharedObjects\FWUT9U24 ]
cdn4.specificclick.net [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
convoad.technoratimedia.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
googleads.g.doubleclick.net [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
ia.media-imdb.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media.onsugar.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media.scanscout.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media.socialvibe.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media01.kyte.tv [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media1.break.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
msntest.serving-sys.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
objects.tremormedia.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
secure-us.imrworldwide.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
udn.specificclick.net [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
www.pornhub.com [ C:\Documents and Settings\parezco\Application Data\Macromedia\Flash Player\#SharedObjects\NUK32RM7 ]
media.scanscout.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\QGVNNASN ]
objects.tremormedia.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\QGVNNASN ]
video.redorbit.com [ C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\#SharedObjects\QGVNNASN ]


2011/02/20 21:59:15.0687 3160 TDSS rootkit removing tool 2.4.17.0 Feb 10 2011 11:07:20
2011/02/20 21:59:16.0546 3160 ================================================================================
2011/02/20 21:59:16.0546 3160 SystemInfo:
2011/02/20 21:59:16.0546 3160
2011/02/20 21:59:16.0546 3160 OS Version: 5.1.2600 ServicePack: 3.0
2011/02/20 21:59:16.0546 3160 Product type: Workstation
2011/02/20 21:59:16.0546 3160 ComputerName: HOME-43DD7AF7BF
2011/02/20 21:59:16.0578 3160 UserName: dearshay
2011/02/20 21:59:16.0578 3160 Windows directory: C:\WINDOWS
2011/02/20 21:59:16.0578 3160 System windows directory: C:\WINDOWS
2011/02/20 21:59:16.0578 3160 Processor architecture: Intel x86
2011/02/20 21:59:16.0578 3160 Number of processors: 1
2011/02/20 21:59:16.0578 3160 Page size: 0x1000
2011/02/20 21:59:16.0578 3160 Boot type: Normal boot
2011/02/20 21:59:16.0578 3160 ================================================================================
2011/02/20 21:59:19.0593 3160 Initialize success
2011/02/20 21:59:25.0968 0576 ================================================================================
2011/02/20 21:59:25.0968 0576 Scan started
2011/02/20 21:59:25.0968 0576 Mode: Manual;
2011/02/20 21:59:25.0968 0576 ================================================================================
2011/02/20 21:59:27.0921 0576 ac97intc (0f2d66d5f08ebe2f77bb904288dcf6f0) C:\WINDOWS\system32\drivers\ac97intc.sys
2011/02/20 21:59:28.0390 0576 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/02/20 21:59:28.0828 0576 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/02/20 21:59:29.0296 0576 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/02/20 21:59:29.0625 0576 AegisP (2c5c22990156a1063e19ad162191dc1d) C:\WINDOWS\system32\DRIVERS\AegisP.sys
2011/02/20 21:59:30.0015 0576 Afc (a7b8a3a79d35215d798a300df49ed23f) C:\WINDOWS\system32\drivers\Afc.sys
2011/02/20 21:59:30.0593 0576 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2011/02/20 21:59:32.0578 0576 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/02/20 21:59:32.0953 0576 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\drivers\atapi.sys
2011/02/20 21:59:33.0281 0576 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/02/20 21:59:33.0609 0576 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/02/20 21:59:34.0250 0576 AvgLdx86 (b8c187439d27aba430dd69fdcf1fa657) C:\WINDOWS\System32\Drivers\avgldx86.sys
2011/02/20 21:59:34.0671 0576 AvgMfx86 (53b3f979930a786a614d29cafe99f645) C:\WINDOWS\System32\Drivers\avgmfx86.sys
2011/02/20 21:59:35.0000 0576 AvgTdiX (22e3b793c3e61720f03d3a22351af410) C:\WINDOWS\System32\Drivers\avgtdix.sys
2011/02/20 21:59:35.0406 0576 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/02/20 21:59:35.0812 0576 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/02/20 21:59:36.0265 0576 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/02/20 21:59:36.0796 0576 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/02/20 21:59:37.0078 0576 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/02/20 21:59:37.0421 0576 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/02/20 21:59:38.0062 0576 CoachVc (1ef03a4109e5ddae1e5212acfe7b85c3) C:\WINDOWS\system32\DRIVERS\CoachVc.sys
2011/02/20 21:59:39.0078 0576 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/02/20 21:59:39.0625 0576 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/02/20 21:59:40.0328 0576 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/02/20 21:59:40.0625 0576 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/02/20 21:59:40.0937 0576 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/02/20 21:59:41.0140 0576 DNINDIS5 (d2ee54cdbced01d48f2b18642be79a98) C:\WINDOWS\system32\DNINDIS5.SYS
2011/02/20 21:59:41.0718 0576 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/02/20 21:59:42.0000 0576 EL90XBC (6e883bf518296a40959131c2304af714) C:\WINDOWS\system32\DRIVERS\el90xbc5.sys
2011/02/20 21:59:42.0593 0576 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/02/20 21:59:43.0062 0576 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/02/20 21:59:43.0515 0576 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/02/20 21:59:43.0875 0576 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/02/20 21:59:44.0265 0576 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
2011/02/20 21:59:44.0718 0576 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/02/20 21:59:45.0140 0576 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/02/20 21:59:45.0515 0576 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
2011/02/20 21:59:45.0968 0576 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/02/20 21:59:46.0468 0576 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/02/20 21:59:46.0968 0576 HPZid412 (d03d10f7ded688fecf50f8fbf1ea9b8a) C:\WINDOWS\system32\DRIVERS\HPZid412.sys
2011/02/20 21:59:47.0281 0576 HPZipr12 (89f41658929393487b6b7d13c8528ce3) C:\WINDOWS\system32\DRIVERS\HPZipr12.sys
2011/02/20 21:59:47.0640 0576 HPZius12 (abcb05ccdbf03000354b9553820e39f8) C:\WINDOWS\system32\DRIVERS\HPZius12.sys
2011/02/20 21:59:48.0187 0576 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/02/20 21:59:48.0968 0576 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/02/20 21:59:49.0546 0576 i81x (06b7ef73ba5f302eecc294cdf7e19702) C:\WINDOWS\system32\DRIVERS\i81xnt5.sys
2011/02/20 21:59:50.0234 0576 iAimFP0 (7b5b44efe5eb9dadfb8ee29700885d23) C:\WINDOWS\system32\DRIVERS\wADV01nt.sys
2011/02/20 21:59:50.0781 0576 iAimFP1 (eb1f6bab6c22ede0ba551b527475f7e9) C:\WINDOWS\system32\DRIVERS\wADV02NT.sys
2011/02/20 21:59:51.0234 0576 iAimFP2 (03ce989d846c1aa81145cb22fcb86d06) C:\WINDOWS\system32\DRIVERS\wADV05NT.sys
2011/02/20 21:59:51.0562 0576 iAimFP3 (525849b4469de021d5d61b4db9be3a9d) C:\WINDOWS\system32\DRIVERS\wSiINTxx.sys
2011/02/20 21:59:51.0828 0576 iAimFP4 (589c2bcdb5bd602bf7b63d210407ef8c) C:\WINDOWS\system32\DRIVERS\wVchNTxx.sys
2011/02/20 21:59:52.0281 0576 iAimFP5 (0308aef61941e4af478fa1a0f83812f5) C:\WINDOWS\system32\DRIVERS\wADV07nt.sys
2011/02/20 21:59:52.0812 0576 iAimFP6 (714038a8aa5de08e12062202cd7eaeb5) C:\WINDOWS\system32\DRIVERS\wADV08nt.sys
2011/02/20 21:59:53.0390 0576 iAimFP7 (7bb3aa595e4507a788de1cdc63f4c8c4) C:\WINDOWS\system32\DRIVERS\wADV09nt.sys
2011/02/20 21:59:53.0781 0576 iAimTV0 (d83bdd5c059667a2f647a6be5703a4d2) C:\WINDOWS\system32\DRIVERS\wATV01nt.sys
2011/02/20 21:59:54.0062 0576 iAimTV1 (ed968d23354daa0d7c621580c012a1f6) C:\WINDOWS\system32\DRIVERS\wATV02NT.sys
2011/02/20 21:59:54.0328 0576 iAimTV3 (d738273f218a224c1ddac04203f27a84) C:\WINDOWS\system32\DRIVERS\wATV04nt.sys
2011/02/20 21:59:54.0656 0576 iAimTV4 (0052d118995cbab152daabe6106d1442) C:\WINDOWS\system32\DRIVERS\wCh7xxNT.sys
2011/02/20 21:59:55.0078 0576 iAimTV5 (791cc45de6e50445be72e8ad6401ff45) C:\WINDOWS\system32\DRIVERS\wATV10nt.sys
2011/02/20 21:59:55.0421 0576 iAimTV6 (352fa0e98bc461ce1ce5d41f64db558d) C:\WINDOWS\system32\DRIVERS\wATV06nt.sys
2011/02/20 21:59:55.0890 0576 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/02/20 21:59:56.0390 0576 IntelIde (acd339d6d7b01790d6bdc58742f79219) C:\WINDOWS\system32\DRIVERS\intelide.sys
2011/02/20 21:59:56.0390 0576 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\intelide.sys. Real md5: acd339d6d7b01790d6bdc58742f79219, Fake md5: b5466a9250342a7aa0cd1fba13420678
2011/02/20 21:59:56.0515 0576 IntelIde - detected Rootkit.Win32.TDSS.tdl3 (0)
2011/02/20 21:59:56.0703 0576 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
2011/02/20 21:59:57.0156 0576 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/02/20 21:59:57.0609 0576 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/02/20 21:59:57.0828 0576 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/02/20 21:59:58.0312 0576 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/02/20 21:59:58.0781 0576 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/02/20 21:59:59.0250 0576 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/02/20 21:59:59.0656 0576 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/02/20 22:00:00.0031 0576 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/02/20 22:00:00.0453 0576 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/02/20 22:00:01.0968 0576 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/02/20 22:00:02.0468 0576 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/02/20 22:00:02.0781 0576 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/02/20 22:00:03.0296 0576 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/02/20 22:00:03.0937 0576 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/02/20 22:00:04.0437 0576 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/02/20 22:00:04.0921 0576 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/02/20 22:00:05.0234 0576 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/02/20 22:00:05.0562 0576 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/02/20 22:00:05.0906 0576 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/02/20 22:00:06.0171 0576 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/02/20 22:00:06.0500 0576 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/02/20 22:00:06.0812 0576 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/02/20 22:00:07.0187 0576 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/02/20 22:00:07.0546 0576 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/02/20 22:00:07.0843 0576 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/02/20 22:00:08.0250 0576 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/02/20 22:00:08.0531 0576 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/02/20 22:00:08.0750 0576 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/02/20 22:00:09.0187 0576 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/02/20 22:00:09.0546 0576 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/02/20 22:00:09.0953 0576 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/02/20 22:00:10.0406 0576 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/02/20 22:00:10.0812 0576 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/02/20 22:00:11.0265 0576 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/02/20 22:00:11.0687 0576 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/02/20 22:00:11.0968 0576 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/02/20 22:00:12.0328 0576 P3 (c90018bafdc7098619a4a95b046b30f3) C:\WINDOWS\system32\DRIVERS\p3.sys
2011/02/20 22:00:13.0015 0576 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/02/20 22:00:14.0156 0576 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/02/20 22:00:14.0625 0576 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/02/20 22:00:15.0046 0576 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/02/20 22:00:16.0171 0576 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/02/20 22:00:16.0906 0576 PCTCore (6ef125721a9f1f7dbf3229786f7decd0) C:\WINDOWS\system32\drivers\PCTCore.sys
2011/02/20 22:00:17.0390 0576 pctDS (f820b4c61d1e591325b679d479d4eea4) C:\WINDOWS\system32\drivers\pctDS.sys
2011/02/20 22:00:19.0843 0576 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/02/20 22:00:20.0484 0576 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/02/20 22:00:20.0984 0576 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/02/20 22:00:22.0484 0576 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/02/20 22:00:23.0046 0576 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/02/20 22:00:23.0484 0576 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/02/20 22:00:24.0031 0576 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/02/20 22:00:24.0359 0576 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/02/20 22:00:37.0468 0576 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/02/20 22:00:37.0859 0576 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2011/02/20 22:00:38.0343 0576 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/02/20 22:00:38.0765 0576 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/02/20 22:00:39.0796 0576 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/02/20 22:00:40.0125 0576 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/02/20 22:00:40.0421 0576 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/02/20 22:00:40.0828 0576 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/02/20 22:00:41.0421 0576 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/02/20 22:00:41.0828 0576 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/02/20 22:00:42.0250 0576 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/02/20 22:00:42.0765 0576 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/02/20 22:00:43.0250 0576 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/02/20 22:00:43.0578 0576 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/02/20 22:00:43.0875 0576 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/02/20 22:00:45.0125 0576 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/02/20 22:00:45.0546 0576 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/02/20 22:00:45.0984 0576 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/02/20 22:00:46.0515 0576 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/02/20 22:00:46.0875 0576 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/02/20 22:00:47.0406 0576 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/02/20 22:00:47.0890 0576 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/02/20 22:00:48.0296 0576 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
2011/02/20 22:00:48.0640 0576 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/02/20 22:00:48.0937 0576 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/02/20 22:00:49.0234 0576 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/02/20 22:00:49.0546 0576 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/02/20 22:00:49.0921 0576 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/02/20 22:00:50.0203 0576 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/02/20 22:00:50.0453 0576 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/02/20 22:00:50.0859 0576 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/02/20 22:00:51.0218 0576 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/02/20 22:00:51.0656 0576 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/02/20 22:00:52.0171 0576 WPN111 (75a833b635e093c728f5027b01f8cbb7) C:\WINDOWS\system32\DRIVERS\WPN111.sys
2011/02/20 22:00:52.0609 0576 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
2011/02/20 22:00:53.0078 0576 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/02/20 22:00:53.0328 0576 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/02/20 22:00:53.0671 0576 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/02/20 22:00:54.0500 0576 ================================================================================
2011/02/20 22:00:54.0500 0576 Scan finished
2011/02/20 22:00:54.0531 0576 ================================================================================
2011/02/20 22:00:54.0609 2700 Detected object count: 1
2011/02/20 22:01:12.0781 2700 IntelIde (acd339d6d7b01790d6bdc58742f79219) C:\WINDOWS\system32\DRIVERS\intelide.sys
2011/02/20 22:01:12.0781 2700 Suspicious file (Forged): C:\WINDOWS\system32\DRIVERS\intelide.sys. Real md5: acd339d6d7b01790d6bdc58742f79219, Fake md5: b5466a9250342a7aa0cd1fba13420678
2011/02/20 22:01:35.0890 2700 Backup copy not found, trying to cure infected file..
2011/02/20 22:01:35.0890 2700 Cure success, using it..
2011/02/20 22:01:36.0062 2700 C:\WINDOWS\system32\DRIVERS\intelide.sys - will be cured after reboot
2011/02/20 22:01:36.0062 2700 Rootkit.Win32.TDSS.tdl3(IntelIde) - User select action: Cure
2011/02/20 22:01:41.0343 0956 Deinitialize success

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 21 February 2011 - 11:25 PM

Ok a reboot/restart is needed after those steps. Do that now if you have not.

We still have something here as MBAM did not fully update. I think after these tho we'll have it.
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5363 << yours ... Now at 5836

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Also do this online scan
Please perform a scan with Eset Online Antiivirus Scanner.
This scan requires Internet Explorer,Opera or Firefox to work. Vista/Windows 7 users need to run Internet Explorer as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
  • Click the green Posted Image button.
  • Read the End User License Agreement and check the box:
  • Check Posted Image.
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Check Remove found threats and Scan potentially unwanted applications. (If given the option, choose "Quarantine" instead of delete.)
  • Click the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer.
  • If offered the option to get information or buy software at any point, just close the window.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop as ESETScan.txt.
  • Push the Posted Image button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply.
Note: A log.txt file will also be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
If you did not save the ESETScan log, click Posted Image > Run..., then type or copy and paste everything in the code box below into the Open dialogue box:

C:\Program Files\ESET\EsetOnlineScanner\log.txt
  • Click Ok and the scan results will open in Notepad.
  • Copy and paste the contents of log.txt in your next reply.
-- Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.

NOTE: In some instances if no malware is found there will be no log produced.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 22 February 2011 - 03:08 PM

Malwarebytes finally updated and I ran a quick scan and found 3 items. I will let you know what ESET does.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 22 February 2011 - 03:11 PM

Great!! kindly post the logs.
MBAM
•The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.

•Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system

I'll be back in a few hours.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 22 February 2011 - 08:13 PM

ESET found 1 virus. But I still have search engine pop ups. I have listed the ESET and Malwarebytes logs below:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5843

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

2/22/2011 2:58:27 PM
mbam-log-2011-02-22 (14-58-27).txt

Scan type: Quick scan
Objects scanned: 224289
Time elapsed: 30 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\g043oqxanu (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\wmpsrcwpo.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\dearshay\local settings\application data\cpp.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.




ESTScan:

C:\WINDOWS\opukamosarevegub.dll a variant of Win32/Kryptik.KNA trojan cleaned by deleting - quarantined

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 22 February 2011 - 11:03 PM

The router is infected
First as there are other machines on this router they need to install and update MBAM,DO NOT run yet. You now need to disconnect from the internet. Then scan eacch PC then reset the router.

Next you must reset the router to its default configuration. This can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router. Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds). If you don?t know the router's default password, you can look it up HERE.
Note: After resetting your router, it is important to set a non-default password, and if possible, username, on the router. This will assist in eliminating the possibility of the router being hijacked again.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 23 February 2011 - 12:43 PM

I disconnected from the internet and ran malwarebytes. I reset the router but cannot access the website where I can change the password. I got on it from my mobile browser once and tried to change the password but it wouldn't let me. Then I lost connection and reset it again but since then it says page cannot be found. I can't even access the internet via computer now.

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 23 February 2011 - 02:00 PM

Please click Start > Run, type inetcpl.cpl in the runbox and press enter.

Click the Connections tab and click the LAN settings option.

Verify if "Use a proxy..." is checked, if so, UNcheck it and click OK/OK to exit.

Now check if the internet is working again..

OR
Go to Start ... Run and type in cmd
A dos Window will appear.
Type in the dos window: netsh winsock reset
Click on the enter key.

Reboot your system to complete the process.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 24 February 2011 - 11:10 AM

Thanks a lot. I am now able to access the internet from my computer but for some reason I cannot access the website that it says to change my password. I believe its preventing me from doing so, like it was hard to download specific programs for a while, it goes to the page and redirects to "Page cannot be accessed" or something of that nature.

However, like I said before, I was able to use the website on my phone then wireless kicked back in and I was not able to do it anymore.

#14 mzche

mzche
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 24 February 2011 - 05:58 PM

oh yeah, I have the sound back too. The only problem I am having is that I'm still trying to login to the website to change my password. The page will not even show up and its the right address.

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:09 AM

Posted 24 February 2011 - 08:07 PM

Ok, what website is it and what the password for?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users