Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

many issues


  • This topic is locked This topic is locked
16 replies to this topic

#1 Nyunyu

Nyunyu

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 17 May 2011 - 12:40 PM

hello ^^
Ok my problems are as follow google redirects me to ad sites, I'm constantly receiving fake anti-malware warnings, and firefox and scvhost seem to require most if not all my system resources.

.
DDS (Ver_11-03-05.01) - NTFSx86
Run by Beku at 11:17:09.83 on 17/05/2011
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_20
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.2.1033.18.2046.997 [GMT -4:00]
.
AV: Kaspersky Anti-Virus *Disabled/Outdated* {56547CC9-C9B2-849D-8FEF-A496150D6A06}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Kaspersky Anti-Virus *Disabled/Updated* {ED359D2D-EF88-8B13-B55F-9FE46E8A20BB}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Logitech\GamePanel Software\LGDevAgt.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Windows\System32\svchost.exe -k Akamai
C:\Program Files\peerblock\peerblock.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\System32\rundll32.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\alg.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\conime.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\taskeng.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Beku\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.ca/
uInternet Settings,ProxyOverride = *.local
BHO: vShare Plugin: {043c5167-00bb-4324-af7e-62013faedacf} - c:\program files\vshare\vshare_toolbar.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: IEVkbdBHO Class: {59273ab4-e7d3-40f9-a1a8-6fa9cca1862c} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\ievkbd.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FilterBHO Class: {e33cf602-d945-461a-83f0-819f76a199f8} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
TB: vShare Plugin: {043c5167-00bb-4324-af7e-62013faedacf} - c:\program files\vshare\vshare_toolbar.dll
uRun: [<NO NAME>]
uRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [MsnMsgr] "c:\program files\windows live\messenger\MsnMsgr.Exe" /background
uRun: [PeerBlock] c:\program files\peerblock\peerblock.exe
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [lpc] rundll32.exe "c:\users\beku\appdata\roaming\sun\ivzmdl.dll", RegisterDll
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Launch LgDeviceAgent] "c:\program files\logitech\gamepanel software\LgDevAgt.exe"
mRun: [Launch LGDCore] "c:\program files\logitech\gamepanel software\g-series software\LGDCore.exe" /SHOWHIDE
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky anti-virus 2011\avp.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [lpc] rundll32.exe"c:\users\beku\appdata\roaming\sun\ivzmdl.dll", RegisterDll
StartupFolder: c:\users\beku\appdata\roaming\micros~1\windows\startm~1\programs\startup\ccc.lnk - c:\program files\ati technologies\ati.ace\core-static\CCC.exe
StartupFolder: c:\users\beku\appdata\roaming\microsoft\windows\start menu\programs\startup\CurseClientStartup.ccip
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\setpoi~1.lnk - c:\program files\logitech\setpoint ii\SetpointII.exe
uPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {4248FE82-7FCB-46AC-B270-339F08212110} - {4248FE82-7FCB-46AC-B270-339F08212110} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
IE: {CCF151D8-D089-449F-A5A4-D9909053F20F} - {CCF151D8-D089-449F-A5A4-D9909053F20F} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CB50428B-657F-47DF-9B32-671F82AA73F7} - hxxp://www.photodex.com/pxplay.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {E6F480FC-BD44-4CBA-B74A-89AF7842937D} - hxxp://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.4.16.0.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Handler: vsharechrome - {3F3A4B8A-86FC-43A4-BB00-6D7EBE9D4484} - c:\program files\vshare\vshare_toolbar.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: klogon - c:\windows\system32\klogon.dll
AppInit_DLLs: c:\progra~1\kasper~1\kasper~1\mzvkbd3.dll
mASetup: ccc-core-static - msiexec /fums {395787D8-AB35-3BCE-772B-1C50144B1CDC} /qb
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\beku\appdata\roaming\mozilla\firefox\profiles\r8meblql.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca/
FF - prefs.js: network.proxy.http - 74.15.178.62
FF - prefs.js: network.proxy.type - 1
FF - component: c:\program files\mozilla firefox\extensions\{ab2ce124-6272-4b12-94a9-7303c7397bd1}\components\SkypeFfComponent.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll
FF - plugin: c:\program files\opera\program\plugins\np_gp.dll
FF - plugin: c:\program files\opera\program\plugins\npdivx32.dll
FF - plugin: c:\program files\opera\program\plugins\npsoestb.dll
FF - plugin: c:\users\beku\appdata\roaming\mozilla\firefox\profiles\r8meblql.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
FF - plugin: c:\windows\system32\tvuax\npTVUAx.dll
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TVU Web Player: firefox@tvunetworks.com - %profile%\extensions\firefox@tvunetworks.com
FF - Ext: vShare: vshare@toolbar - %profile%\extensions\vshare@toolbar
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Skype extension for Firefox: {AB2CE124-6272-4b12-94A9-7303C7397BD1} - c:\program files\mozilla firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
---- FIREFOX POLICIES ----
user_pref(security.warn_viewing_mixed,false);
user_pref(security.warn_viewing_mixed.show_once,false);
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
user_pref(security.warn_submit_insecure,false);
FF - user.js: security.warn_submit_insecure.show_once - false
FF - user.js: network.http.accept-encoding -
.
============= SERVICES / DRIVERS ===============
.
R1 kl2;kl2;c:\windows\system32\drivers\kl2.sys [2010-6-9 11352]
R1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\drivers\klim6.sys [2010-4-22 22104]
R2 Akamai;Akamai NetSession Interface;c:\windows\system32\svchost.exe -k Akamai [2008-5-25 21504]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-5-25 21504]
R2 WDDMService;WD SmartWare Drive Manager;c:\program files\western digital\wd smartware\wd drive manager\WDDMService.exe [2010-1-21 110592]
R2 WDSmartWareBackgroundService;WD SmartWare Background Service;c:\program files\western digital\wd smartware\front parlor\WDSmartWareBackgroundService.exe [2009-6-16 20480]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [2009-11-2 19984]
R3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\drivers\ManyCam.sys [2008-1-14 21632]
R3 pbfilter;pbfilter;c:\program files\peerblock\pbfilter.sys [2011-1-13 20080]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2009-11-26 34384]
S2 AVP;Kaspersky Anti-Virus Service;c:\program files\kaspersky lab\kaspersky anti-virus 2011\avp.exe [2010-11-2 365336]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 dualshock3;SIXAXIS/DUALSHOCK3 DX (USB) Beta;c:\windows\system32\drivers\dualshock3.sys [2010-10-21 22912]
S3 libusb0;libusb0;c:\windows\system32\drivers\libusb0.sys [2010-10-21 16896]
S3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\drivers\MijXfilt.sys [2010-8-12 51712]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 PPJoyBus;Parallel Port Joystick Bus device driver;c:\windows\system32\drivers\PPJoyBus.sys [2004-1-23 13952]
S3 PPortJoystick;Parallel Port Joystick device driver;c:\windows\system32\drivers\PPortJoy.sys [2004-1-23 28800]
S3 qcusbser;ACER Android USB Device for Legacy Serial Communication;c:\windows\system32\drivers\qcusbser.sys [2009-8-14 105984]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2009-2-13 11520]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2011-05-17 14:44:53 388096 ----a-r- c:\users\beku\appdata\roaming\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-05-17 14:44:30 -------- d-----w- c:\program files\Trend Micro
2011-05-17 06:27:54 -------- d-----w- c:\users\beku\appdata\local\{A48921E5-F30F-45B5-846F-DD1E348A6E34}
2011-05-16 18:27:26 -------- d-----w- c:\users\beku\appdata\local\{B3C2E842-7DD4-4928-B693-23C4A281DBAB}
2011-05-16 16:11:34 -------- d-----w- c:\users\beku\appdata\roaming\Malwarebytes
2011-05-16 16:11:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-16 16:11:08 -------- d-----w- c:\progra~2\Malwarebytes
2011-05-16 16:11:02 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-16 16:11:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-16 06:25:41 -------- d-----w- c:\users\beku\appdata\local\{19D7CF5A-1F27-41AD-B4B1-2583405290D3}
2011-05-15 05:24:39 -------- d-----w- c:\users\beku\appdata\local\{8E7F8405-22F1-4D0E-89AA-AEBA8EA68CF9}
2011-05-13 23:09:39 -------- d-----w- c:\users\beku\appdata\local\{7941AC1E-55EE-44C5-BCC2-6C3E07BD0103}
2011-05-13 11:09:27 -------- d-----w- c:\users\beku\appdata\local\{CAFECCD8-A8B8-49F4-9DDB-F23B5A0744AF}
2011-05-12 23:09:15 -------- d-----w- c:\users\beku\appdata\local\{AFD6A145-8534-44A3-9E7E-983652C6B182}
2011-05-12 11:09:04 -------- d-----w- c:\users\beku\appdata\local\{9DA855A0-FB4C-44ED-93B6-D76F59DD70C6}
2011-05-11 23:08:52 -------- d-----w- c:\users\beku\appdata\local\{112360C8-DB31-4F7B-AE06-86BA02D82F3C}
2011-05-11 11:08:40 -------- d-----w- c:\users\beku\appdata\local\{B988C456-5BDB-4D80-893A-E9DAE88FCBA5}
2011-05-10 23:08:29 -------- d-----w- c:\users\beku\appdata\local\{2A369E43-6E62-4837-BDCD-1963EB230FF1}
2011-05-10 11:08:17 -------- d-----w- c:\users\beku\appdata\local\{CC00352F-55EB-42A3-A779-82D6441375EF}
2011-05-09 23:07:52 -------- d-----w- c:\users\beku\appdata\local\{6EE49A78-7552-4BBC-B400-0F0128722FAB}
2011-05-09 02:22:55 -------- d-----w- c:\users\beku\appdata\local\{95898F23-D1D0-45DD-B5DA-83B10FFE8917}
2011-05-08 03:03:19 -------- d-----w- c:\users\beku\appdata\local\{1AFE9EAF-1CEB-440D-9892-494E0E2316FB}
2011-05-07 15:03:07 -------- d-----w- c:\users\beku\appdata\local\{53D2C9F5-E733-42E5-878D-C3AED9AB690D}
2011-05-07 03:02:43 -------- d-----w- c:\users\beku\appdata\local\{870B0064-CAF3-4477-A4D8-B7AECFF428A9}
2011-05-06 15:02:08 -------- d-----w- c:\users\beku\appdata\local\{7DC5947A-716D-4455-B791-DD0A9D800DFC}
2011-05-06 03:01:56 -------- d-----w- c:\users\beku\appdata\local\{CC6494FA-C710-4D30-A3FE-57D1ADC6924A}
2011-05-05 15:01:45 -------- d-----w- c:\users\beku\appdata\local\{A5663F90-5F85-48E0-A02B-D5DA0E17EB44}
2011-05-05 03:01:34 -------- d-----w- c:\users\beku\appdata\local\{2F42736D-4031-4E14-BB43-42CF11E04021}
2011-05-04 15:01:23 -------- d-----w- c:\users\beku\appdata\local\{9E1CC630-51F9-46E1-92AE-158653FD8E09}
2011-05-04 03:01:56 6792528 ----a-w- c:\progra~2\microsoft\windows defender\definition updates\{8ccd6014-209c-49f1-8c55-586759407663}\mpengine.dll
2011-05-04 03:01:12 -------- d-----w- c:\users\beku\appdata\local\{46E7B300-6E32-45F8-B3D4-310CAA53253E}
2011-05-04 00:26:21 -------- d-----w- c:\users\beku\appdata\local\{768B3168-7629-4A15-A67A-7FAEA3D5DD0C}
2011-05-03 12:25:58 -------- d-----w- c:\users\beku\appdata\local\{142CE3B2-5243-483A-BD30-2D56E71C5084}
2011-05-03 00:22:31 -------- d-----w- c:\users\beku\appdata\local\{197B7210-596C-4021-B1AB-2E3B0B16B6FE}
2011-05-01 19:25:47 -------- d-----w- c:\users\beku\appdata\local\{04DC1D39-787F-4C19-9AEF-B1F16F1AEE2A}
2011-05-01 07:25:36 -------- d-----w- c:\users\beku\appdata\local\{7C449354-23F9-4C61-8374-ACA48E82CE34}
2011-04-30 19:25:24 -------- d-----w- c:\users\beku\appdata\local\{154B610A-54B9-4303-8474-282BCDC542EC}
2011-04-30 02:00:31 -------- d-----w- c:\users\beku\appdata\local\{40F92F79-C586-4A39-83D1-2E04EDA676B0}
2011-04-29 14:00:20 -------- d-----w- c:\users\beku\appdata\local\{EEFC8E92-AD8B-47CC-99EE-54F8EC29650F}
2011-04-28 20:32:39 -------- d-----w- c:\users\beku\appdata\local\{1239C9BC-6149-4D5F-9C39-6B4EA014D8EC}
2011-04-28 02:51:36 -------- d-----w- c:\users\beku\appdata\local\{689648A0-D4A8-4712-AA1C-498ACCC48EDA}
2011-04-27 14:51:11 -------- d-----w- c:\users\beku\appdata\local\{42A642ED-849E-48FA-9F3B-D2B259AB49AC}
2011-04-26 14:50:47 -------- d-----w- c:\users\beku\appdata\local\{0C24E723-69B6-427F-90C8-97FD1C33305E}
2011-04-26 02:50:10 -------- d-----w- c:\users\beku\appdata\local\{A5E7691C-77E0-4A17-98B1-629EE736EC64}
2011-04-25 14:49:59 -------- d-----w- c:\users\beku\appdata\local\{F3C9BAEA-2E64-4766-92AE-E9CD6096F19B}
2011-04-25 02:49:48 -------- d-----w- c:\users\beku\appdata\local\{3ED2ED7A-4EF2-48A3-9A96-05F28083D2B7}
2011-04-24 14:49:37 -------- d-----w- c:\users\beku\appdata\local\{99C862F3-13CB-4E31-A703-F12440738081}
2011-04-24 02:49:26 -------- d-----w- c:\users\beku\appdata\local\{65190C51-845F-4B07-92B2-8165437102C9}
2011-04-23 14:49:15 -------- d-----w- c:\users\beku\appdata\local\{A6102038-6008-4453-BAB2-C63B338C6899}
2011-04-23 02:49:03 -------- d-----w- c:\users\beku\appdata\local\{0ABBF5A3-3C0C-4C97-BCA9-B86F8DFE21E9}
2011-04-22 14:48:52 -------- d-----w- c:\users\beku\appdata\local\{BAA7B93C-25F9-41F9-9BB3-4D4E5C3E7424}
2011-04-22 04:27:29 -------- d-----w- c:\program files\Yahoo!
2011-04-22 02:48:32 -------- d-----w- c:\users\beku\appdata\local\{493116C0-E3CC-42A8-A534-C6E2BCAE2DC4}
2011-04-21 14:44:55 -------- d-----w- c:\users\beku\appdata\local\{872E48C1-8127-453F-BA42-3006856E9CA5}
2011-04-21 02:44:44 -------- d-----w- c:\users\beku\appdata\local\{A44BE39C-21E6-4512-BB9F-70DB1A12903A}
2011-04-20 14:44:20 -------- d-----w- c:\users\beku\appdata\local\{1A5D60BD-C1D9-4CEC-AB07-3EB4FB9902B2}
2011-04-20 02:43:54 -------- d-----w- c:\users\beku\appdata\local\{4FCF22F4-98A5-4FD9-9E22-3686E7FC7F0B}
2011-04-19 14:43:43 -------- d-----w- c:\users\beku\appdata\local\{D1EE65B4-9721-41DC-9D00-6F3B91F40698}
2011-04-19 02:43:30 -------- d-----w- c:\users\beku\appdata\local\{A55A316C-3032-4EDC-95CF-F0CA338CE356}
2011-04-18 14:43:07 -------- d-----w- c:\users\beku\appdata\local\{8FDE3055-05F3-4C08-968D-EE0126F2777D}
2011-04-18 02:42:56 -------- d-----w- c:\users\beku\appdata\local\{D03F6911-5FBE-4C4F-B48C-B6D0676E885F}
.
==================== Find3M ====================
.
2011-03-14 08:43:26 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2011-02-26 04:36:43 1682 --sha-w- c:\progra~2\KGyGaAvL.sys
2011-02-22 14:13:01 288768 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2011-02-22 13:33:12 1068544 ----a-w- c:\windows\system32\DWrite.dll
2011-02-22 13:33:09 797696 ----a-w- c:\windows\system32\FntCache.dll
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500KS-00MJB0 rev.02.01C03 -> Harddisk0\DR0 -> \Device\Ide\IdePort1 P1T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x891D5439]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x891db7d0]; MOV EAX, [0x891db84c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x84E7C912] -> \Device\Harddisk0\DR0[0x88B384B8]
3 CLASSPNP[0x863A78B3] -> ntkrnlpa!IofCallDriver[0x84E7C912] -> [0x88412898]
5 acpi[0x8B7B46BC] -> ntkrnlpa!IofCallDriver[0x84E7C912] -> [0x88478030]
\Driver\atapi[0x88D3EF38] -> IRP_MJ_CREATE -> 0x891D5439
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; MOV ES, AX; MOV DS, AX; MOV SI, 0x7c00; MOV DI, 0x600; MOV CX, 0x200; CLD ; REP MOVSB ; PUSH AX; PUSH 0x61c; RETF ; STI ; PUSHA ; MOV CX, 0x147; MOV BP, 0x62a; ROR BYTE [BP+0x0], CL; INC BP; }
detected disk devices:
\Device\Ide\IdeDeviceP1T0L0-3 -> \??\IDE#DiskWDC_WD2500KS-00MJB0_____________________02.01C03#5&2e6a01c1&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
user != kernel MBR !!!
sectors 488397166 (+255): user != kernel
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
============= FINISH: 11:18:24.17 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 20 May 2011 - 07:33 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.


We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.


In order for me to see the status of the infection I will need a new set of logs to start with.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply





Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".


information and logs:

  • In your next post I need the following

  • .logs from DDS
  • log from RKUnHooker
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 20 May 2011 - 08:15 PM

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows Vista
Version 6.0.6002 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0x8B40A000 C:\Windows\system32\DRIVERS\kl1.sys 5382144 bytes (Kaspersky Lab ZAO, Kaspersky Unified Driver)
0x9020A000 C:\Windows\system32\DRIVERS\atikmdag.sys 5320704 bytes (ATI Technologies Inc., ATI Radeon Kernel Mode Driver)
0x84E4E000 C:\Windows\system32\ntkrnlpa.exe 3907584 bytes (Microsoft Corporation, NT Kernel & System)
0x84E4E000 PnpManager 3907584 bytes
0x84E4E000 RAW 3907584 bytes
0x84E4E000 WMIxWDM 3907584 bytes
0x93AA0000 Win32k 2109440 bytes
0x93AA0000 C:\Windows\System32\win32k.sys 2109440 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0x8BA0F000 C:\Windows\System32\Drivers\Ntfs.sys 1114112 bytes (Microsoft Corporation, NT File System Driver)
0x85601000 C:\Windows\system32\drivers\ndis.sys 1093632 bytes (Microsoft Corporation, NDIS 6.0 wrapper driver)
0x86202000 C:\Windows\System32\drivers\tcpip.sys 958464 bytes (Microsoft Corporation, TCP/IP Driver)
0x806D9000 C:\Windows\system32\CI.dll 917504 bytes (Microsoft Corporation, Code Integrity Module)
0xA631F000 C:\Windows\system32\drivers\peauth.sys 909312 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver)
0x91CB3000 C:\Windows\system32\drivers\spsys.sys 720896 bytes (Microsoft Corporation, security processor)
0x9071D000 C:\Windows\System32\drivers\dxgkrnl.sys 655360 bytes (Microsoft Corporation, DirectX Graphics Kernel)
0x86316000 C:\Windows\system32\DRIVERS\HDAudBus.sys 577536 bytes (Microsoft Corporation, High Definition Audio Bus Driver)
0x90E43000 C:\Windows\system32\DRIVERS\klif.sys 536576 bytes (Kaspersky Lab, Klif Mini-Filter [fre_wlh_x86])
0x85551000 C:\Windows\System32\Drivers\ksecdd.sys 462848 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0x8B92C000 C:\Windows\system32\drivers\Wdf01000.sys 462848 bytes (Microsoft Corporation, Kernel Mode Driver Framework Runtime)
0x8060F000 C:\Windows\system32\mcupdate_GenuineIntel.dll 458752 bytes (Microsoft Corporation, Intel Microcode Update Library)
0x91D86000 C:\Windows\system32\drivers\HTTP.sys 446464 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xA62C4000 C:\Windows\System32\DRIVERS\srv.sys 319488 bytes (Microsoft Corporation, Server driver)
0x93CF0000 C:\Windows\System32\ATMFD.DLL 315392 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0x8544C000 C:\Windows\System32\drivers\volmgrx.sys 303104 bytes (Microsoft Corporation, Volume Manager Extension Driver)
0x9140E000 C:\Windows\system32\drivers\afd.sys 294912 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x807B9000 C:\Windows\system32\drivers\acpi.sys 286720 bytes (Microsoft Corporation, ACPI Driver for NT)
0x80698000 C:\Windows\system32\CLFS.SYS 266240 bytes (Microsoft Corporation, Common Log File System Driver)
0x90A05000 C:\Windows\system32\DRIVERS\storport.sys 266240 bytes (Microsoft Corporation, Microsoft Storage Port Driver)
0x90E04000 C:\Windows\system32\drivers\HdAudio.sys 258048 bytes (Microsoft Corporation, High Definition Audio Function Driver)
0x85772000 C:\Windows\system32\DRIVERS\USBPORT.SYS 253952 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0x914DE000 C:\Windows\system32\DRIVERS\rdbss.sys 245760 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x85737000 C:\Windows\system32\drivers\NETIO.SYS 241664 bytes (Microsoft Corporation, Network I/O Subsystem)
0x91C06000 C:\Windows\system32\DRIVERS\udfs.sys 241664 bytes (Microsoft Corporation, UDF File System Driver)
0x863A3000 C:\Windows\system32\DRIVERS\e1e6032.sys 237568 bytes (Intel Corporation, Intel® PRO/1000 Adapter NDIS 6 deserialized driver)
0xA624B000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 233472 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr)
0x8BB1F000 C:\Windows\system32\drivers\volsnap.sys 233472 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0x854F8000 C:\Windows\system32\drivers\PCTCore.sys 225280 bytes (PC Tools, PC Tools KDS Core Driver)
0x90F79000 C:\Windows\System32\drivers\pctgntdi.sys 225280 bytes (PC Tools, PC Tools Generic TDI Driver)
0x90BA8000 C:\Windows\system32\DRIVERS\usbhub.sys 217088 bytes (Microsoft Corporation, Default Hub Driver for USB)
0x84E1B000 ACPI_HAL 208896 bytes
0x84E1B000 C:\Windows\system32\hal.dll 208896 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xAC44A000 C:\Windows\System32\Drivers\RDPWD.SYS 208896 bytes (Microsoft Corporation, RDP Terminal Stack Driver)
0x8B9AB000 C:\Windows\system32\drivers\fltmgr.sys 204800 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0x91456000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver)
0x855C2000 C:\Windows\system32\DRIVERS\msiscsi.sys 192512 bytes (Microsoft Corporation, Microsoft iSCSI Initiator Driver)
0x90A9A000 C:\Windows\system32\drivers\portcls.sys 184320 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x8570C000 C:\Windows\system32\drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider)
0x90A64000 C:\Windows\system32\DRIVERS\ks.sys 172032 bytes (Microsoft Corporation, Kernel CSA Library)
0x9156B000 C:\Windows\System32\Drivers\fastfat.SYS 163840 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xA629C000 C:\Windows\System32\DRIVERS\srv2.sys 163840 bytes (Microsoft Corporation, Smb 2.0 Server driver)
0x8BB6F000 C:\Windows\System32\drivers\ecache.sys 159744 bytes (Microsoft Corporation, Special Memory Device Cache)
0x85407000 C:\Windows\system32\drivers\pci.sys 159744 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xAC40D000 C:\Windows\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0x90AC7000 C:\Windows\system32\drivers\drmk.sys 151552 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0x90B0E000 C:\Windows\system32\DRIVERS\ndiswan.sys 143360 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x8BBA7000 C:\Windows\system32\drivers\CLASSPNP.SYS 135168 bytes (Microsoft Corporation, SCSI Class System Dll)
0xA620B000 C:\Windows\system32\drivers\mrxdav.sys 135168 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0x90EF9000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver)
0xA622C000 C:\Windows\system32\DRIVERS\mrxsmb.sys 126976 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0x854CA000 C:\Windows\system32\drivers\ataport.SYS 122880 bytes (Microsoft Corporation, ATAPI Driver Extension)
0x90FB0000 \ArcName\multi(0)disk(0)rdisk(0)partition(1)\Windows\system32\drivers\PctWfpFilter.sys 118784 bytes
0x915CF000 C:\Windows\System32\DRIVERS\srvnet.sys 118784 bytes (Microsoft Corporation, Server Network driver)
0x862EC000 C:\Windows\System32\drivers\fwpkclnt.sys 110592 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API)
0x91C90000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA File Virtualization Filter Driver)
0x857B0000 C:\Windows\system32\DRIVERS\serial.sys 106496 bytes (Microsoft Corporation, Serial Device Driver)
0x90FE7000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver)
0x857E2000 C:\Windows\system32\DRIVERS\cdrom.sys 98304 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xA6284000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 98304 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector)
0x857CA000 C:\Windows\system32\DRIVERS\parport.sys 98304 bytes (Microsoft Corporation, Parallel Port Driver)
0x91524000 C:\Windows\System32\Drivers\dfsc.sys 94208 bytes (Microsoft Corporation, DFS Namespace Client Driver)
0x90AEC000 C:\Windows\system32\DRIVERS\rasl2tp.sys 94208 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0x9153B000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0x91C41000 C:\Windows\system32\DRIVERS\cdfs.sys 90112 bytes (Microsoft Corporation, CD-ROM File System Driver)
0x91491000 C:\Windows\system32\DRIVERS\pacer.sys 90112 bytes (Microsoft Corporation, QoS Packet Scheduler)
0x90F4C000 C:\Windows\system32\DRIVERS\tdx.sys 90112 bytes (Microsoft Corporation, TDI Translation Driver)
0x8BBD1000 C:\Windows\System32\drivers\mpsdrv.sys 86016 bytes (Microsoft Corporation, Microsoft Protection Service Driver)
0x90B54000 C:\Windows\system32\DRIVERS\rassstp.sys 86016 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager)
0x90F62000 C:\Windows\system32\DRIVERS\USBSTOR.SYS 86016 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0x863EB000 C:\Windows\system32\DRIVERS\WUDFRd.sys 86016 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Reflector)
0x90B40000 C:\Windows\system32\DRIVERS\raspptp.sys 81920 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x90FD3000 C:\Windows\system32\DRIVERS\smb.sys 81920 bytes (Microsoft Corporation, SMB Transport driver)
0x91D73000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6)
0x914BD000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x915BD000 C:\Windows\system32\drivers\usbaudio.sys 73728 bytes (Microsoft Corporation, USB Audio Class Driver)
0x90BEE000 C:\Windows\system32\DRIVERS\WUDFPf.sys 73728 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0x8BB96000 C:\Windows\system32\drivers\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver)
0x90BDD000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy)
0x8067F000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Platform Specific Hardware Error Driver)
0x8552F000 C:\Windows\system32\drivers\TfFsMon.sys 69632 bytes (PC Tools, ThreatFire Filesystem Monitor)
0x85540000 C:\Windows\system32\drivers\TfSysMon.sys 69632 bytes (PC Tools, ThreatFire System Monitor)
0x854E8000 C:\Windows\system32\drivers\fileinfo.sys 65536 bytes (Microsoft Corporation, FileInfo Filter Driver)
0x9155B000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 65536 bytes (Microsoft Corporation, Hid Class Library)
0x91D63000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver)
0x854B2000 C:\Windows\System32\drivers\mountmgr.sys 65536 bytes (Microsoft Corporation, Mount Point Manager)
0x907E3000 C:\Windows\system32\DRIVERS\ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0x90B69000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Terminal Server Driver)
0x86307000 C:\Windows\system32\DRIVERS\intelppm.sys 61440 bytes (Microsoft Corporation, Processor Device Driver)
0x91C81000 C:\Windows\system32\DRIVERS\monitor.sys 61440 bytes (Microsoft Corporation, Monitor Driver)
0x8BB60000 C:\Windows\System32\Drivers\mup.sys 61440 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0x8542E000 C:\Windows\System32\drivers\partmgr.sys 61440 bytes (Microsoft Corporation, Partition Management Driver)
0x90B31000 C:\Windows\system32\DRIVERS\raspppoe.sys 61440 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0x907D4000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0x8543D000 C:\Windows\system32\drivers\volmgr.sys 61440 bytes (Microsoft Corporation, Volume Manager Driver)
0x863DD000 C:\Windows\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0x93CE0000 C:\Windows\System32\cdd.dll 57344 bytes (Microsoft Corporation, Canonical Display Driver)
0x914AF000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver)
0x90F35000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver)
0x8549D000 C:\Windows\system32\drivers\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0x914D0000 C:\Windows\System32\Drivers\SCDEmu.SYS 57344 bytes (PowerISO Computing, Inc., PowerISO Virtual Drive)
0x8B99D000 C:\Windows\system32\drivers\WDFLDR.SYS 57344 bytes (Microsoft Corporation, Kernel Mode Driver Framework Loader)
0x91C57000 C:\Windows\System32\Drivers\crashdmp.sys 53248 bytes (Microsoft Corporation, Crash Dump Driver)
0x90A57000 C:\Windows\system32\DRIVERS\STREAM.SYS 53248 bytes (Microsoft Corporation, WDM CODEC Class Device Driver 2.0)
0x90B9B000 C:\Windows\system32\DRIVERS\umbus.sys 53248 bytes (Microsoft Corporation, User-Mode Bus Enumerator)
0x90A8E000 C:\Windows\system32\drivers\ScreamingBAudio.sys 49152 bytes (Screaming Bee LLC, Screaming Bee Audio Driver)
0x915EC000 C:\Windows\System32\drivers\tcpipreg.sys 49152 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver)
0xAC43E000 C:\Windows\System32\DRIVERS\tssecsrv.sys 49152 bytes (Microsoft Corporation, TS Security Filter Driver)
0x90EED000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x907BD000 C:\Windows\System32\drivers\watchdog.sys 49152 bytes (Microsoft Corporation, Watchdog Driver)
0x91C64000 C:\Windows\System32\Drivers\dump_dumpata.sys 45056 bytes
0x907F3000 C:\Windows\system32\DRIVERS\fdc.sys 45056 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0x90B79000 C:\Windows\system32\DRIVERS\kbdclass.sys 45056 bytes (Microsoft Corporation, Keyboard Class Driver)
0x90B84000 C:\Windows\system32\DRIVERS\mouclass.sys 45056 bytes (Microsoft Corporation, Mouse Class Driver)
0x90F2A000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver)
0x90B03000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x90A46000 C:\Windows\system32\DRIVERS\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper)
0xAC433000 C:\Windows\system32\drivers\tdtcp.sys 45056 bytes (Microsoft Corporation, TCP Transport Driver)
0x8BBF1000 C:\Windows\system32\DRIVERS\tunnel.sys 45056 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x907C9000 C:\Windows\system32\DRIVERS\usbuhci.sys 45056 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0x91C77000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver)
0x90B91000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver)
0x9151A000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy)
0xA6200000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0x90200000 C:\Windows\system32\DRIVERS\serenum.sys 40960 bytes (Microsoft Corporation, Serial Port Enumerator)
0x91DF3000 C:\Windows\system32\DRIVERS\asyncmac.sys 36864 bytes (Microsoft Corporation, MS Remote Access serial network driver)
0x8BBC8000 C:\Windows\system32\drivers\crcdisk.sys 36864 bytes (Microsoft Corporation, Disk Block Verification Filter Driver)
0x90EC6000 C:\Windows\System32\Drivers\Fs_Rec.SYS 36864 bytes (Microsoft Corporation, File System Recognizer Driver)
0x91552000 C:\Windows\system32\DRIVERS\hidusb.sys 36864 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0x915B4000 C:\Windows\system32\DRIVERS\kbdhid.sys 36864 bytes (Microsoft Corporation, HID Keyboard Filter Driver)
0x915AB000 C:\Windows\system32\DRIVERS\klmouflt.sys 36864 bytes (Kaspersky Lab, KLMOUFLT Mouse Device Filter [fre_wlh_x86])
0xAC494000 C:\Windows\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0x90F43000 C:\Windows\System32\DRIVERS\rasacd.sys 36864 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0x93CC0000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver)
0x8BA00000 C:\Windows\system32\DRIVERS\tunmp.sys 36864 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x8B9DD000 C:\Windows\system32\drivers\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0x91488000 C:\Windows\system32\drivers\ws2ifsl.sys 36864 bytes (Microsoft Corporation, Winsock2 IFS Layer)
0x854C2000 C:\Windows\system32\drivers\atapi.sys 32768 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x80690000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver)
0x91C6F000 C:\Windows\System32\Drivers\dump_atapi.sys 32768 bytes
0x914A7000 C:\Windows\system32\DRIVERS\klim6.sys 32768 bytes (Kaspersky Lab ZAO, Kaspersky Lab Intermediate Network Driver)
0x91593000 C:\Windows\system32\DRIVERS\LHidFilt.Sys 32768 bytes (Logitech, Inc., Logitech HID Filter Driver.)
0x915A3000 C:\Windows\system32\DRIVERS\LMouFilt.Sys 32768 bytes (Logitech, Inc., Logitech Mouse Filter Driver.)
0x9159B000 C:\Windows\system32\DRIVERS\mouhid.sys 32768 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0x8B9E6000 C:\Windows\system32\drivers\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver)
0x90F1A000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x90F22000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8BB58000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor)
0x90ED6000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver)
0x90EE6000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0x85496000 C:\Windows\system32\drivers\intelide.sys 28672 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0xAC48D000 C:\Users\Beku\AppData\Local\Temp\mbr.sys 28672 bytes
0x90ECF000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver)
0xA6312000 C:\Windows\system32\DRIVERS\parvdm.sys 28672 bytes (Microsoft Corporation, VDM Parallel Driver)
0xAC47D000 C:\Program Files\peerblock\pbfilter.sys 28672 bytes
0x854AB000 C:\Windows\system32\drivers\pciide.sys 28672 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x90FCD000 C:\Windows\system32\DRIVERS\kl2.sys 24576 bytes (Kaspersky Lab ZAO, Kaspersky Unified Driver)
0x90A51000 C:\Windows\system32\DRIVERS\ManyCam.sys 24576 bytes (ManyCam LLC., ManyCam Virtual Webcam, WDM Video Capture Driver)
0x8BA09000 C:\Windows\system32\DRIVERS\GEARAspiWDM.sys 12288 bytes (GEAR Software Inc., CD DVD Filter)
0x89563000 C:\Windows\system32\kdcom.dll 12288 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0x90B8F000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x90F77000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
==============================================
>Stealth
==============================================
0x01DC0000 Hidden Image-->CLI.Component.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 102400 bytes
0x066A0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 102400 bytes
0x08560000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 1044480 bytes
0x00900000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 110592 bytes
0x01D40000 Hidden Image-->MOM.Implementation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 110592 bytes
0x06FB0000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 110592 bytes
0x076A0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 126976 bytes
0x07D20000 Hidden Image-->CLI.Component.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 1413120 bytes
0x07240000 Hidden Image-->CLI.Aspect.Welcome.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 143360 bytes
0x079C0000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 1683456 bytes
0x06F80000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 192512 bytes
0x07FB0000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 217088 bytes
0x04FC0000 Hidden Image-->CLI.Caste.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 233472 bytes
0x00A40000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 28672 bytes
0x00A00000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 28672 bytes
0x00A20000 Hidden Image-->MOM.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x00A40000 Hidden Image-->LOG.Foundation.Implementation.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x01F30000 Hidden Image-->CLI.Foundation.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x040B0000 Hidden Image-->AEM.Server.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x040F0000 Hidden Image-->DEM.Graphics.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x040E0000 Hidden Image-->AEM.Plugin.DPPE.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x04320000 Hidden Image-->DEM.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x04210000 Hidden Image-->AEM.Plugin.EEU.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x05280000 Hidden Image-->DEM.OS.I0602.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x052A0000 Hidden Image-->DEM.OS.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x052F0000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x05390000 Hidden Image-->CLI.Caste.Graphics.Runtime.Shared.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x05360000 Hidden Image-->CLI.Aspect.HotkeysHandling.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x060F0000 Hidden Image-->CLI.Caste.Graphics.Wizard.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x06300000 Hidden Image-->CLI.Component.Client.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x06AB0000 Hidden Image-->atixclib.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x06AA0000 Hidden Image-->CLI.Component.Wizard.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x07220000 Hidden Image-->CLI.Caste.Graphics.Dashboard.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x071F0000 Hidden Image-->CLI.Component.Dashboard.Shared.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x071E0000 Hidden Image-->CLI.Component.Dashboard.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 28672 bytes
0x04340000 Hidden Image-->ATIDEMGX.dll [ EPROCESS 0x8B230788 ] PID: 1692, 315392 bytes
0x08360000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 331776 bytes
0x083C0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 356352 bytes
0x00DF0000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 36864 bytes
0x00B90000 Hidden Image-->MemeoRemoteCore.dll [ EPROCESS 0x8AE037D8 ] PID: 2888, 36864 bytes
0x01DB0000 Hidden Image-->CLI.Foundation.XManifest.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x01F50000 Hidden Image-->AEM.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x04040000 Hidden Image-->NEWAEM.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x05110000 Hidden Image-->ACE.Graphics.DisplaysManager.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x053B0000 Hidden Image-->CLI.Aspect.CustomFormats.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x053D0000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x053C0000 Hidden Image-->CLI.Aspect.DeviceProperty.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x05790000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x057B0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x05E30000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x05E70000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x06090000 Hidden Image-->APM.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x06080000 Hidden Image-->CLI.Aspect.PowerPlayDPPE.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x06520000 Hidden Image-->CLI.Component.Wizard.Shared.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 36864 bytes
0x067C0000 Hidden Image-->CLI.Component.Systemtray.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 397312 bytes
0x06B90000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 413696 bytes
0x07370000 Hidden Image-->CLI.Aspect.DisplaysManager.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 446464 bytes
0x00970000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 45056 bytes
0x00A50000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 45056 bytes
0x00D60000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 45056 bytes
0x00870000 Hidden Image-->CCC.Implementation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x00A10000 Hidden Image-->LOG.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x00BA0000 Hidden Image-->LOG.Foundation.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x01F20000 Hidden Image-->CLI.Component.Runtime.Shared.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x01F40000 Hidden Image-->ATICCCom.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x04020000 Hidden Image-->AEM.Server.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x040C0000 Hidden Image-->AEM.Plugin.Source.Kit.Server.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x05760000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x05780000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x057A0000 Hidden Image-->CLI.Aspect.DisplaysOptions.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x05E10000 Hidden Image-->CLI.Aspect.DeviceLCD.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x05F30000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 45056 bytes
0x06B10000 Hidden Image-->CLI.Component.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 479232 bytes
0x08140000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 487424 bytes
0x06F00000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 495616 bytes
0x04100000 Hidden Image-->DEM.Graphics.I0601.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x053A0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x05E50000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x05DD0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x05EF0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x05F20000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x06070000 Hidden Image-->CLI.Aspect.PowerPlayDPPE.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x060A0000 Hidden Image-->CLI.Component.Client.Shared.Private.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x06580000 Hidden Image-->CLI.Caste.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x06830000 Hidden Image-->CLI.Aspect.TransCode.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 53248 bytes
0x08420000 Hidden Image-->CLI.Aspect.DisplaysColour2.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 585728 bytes
0x00A30000 Hidden Image-->CLI.Foundation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x05000000 Hidden Image-->CLI.Caste.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x052C0000 Hidden Image-->ATIDEMOS.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x05770000 Hidden Image-->CLI.Aspect.InfoCentre.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x05DE0000 Hidden Image-->CLI.Aspect.DeviceCRT.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x05E40000 Hidden Image-->CLI.Aspect.DeviceDFP.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 61440 bytes
0x081C0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 659456 bytes
0x084B0000 Hidden Image-->CLI.Aspect.MMVideo.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 675840 bytes
0x00A20000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x8ABAB4B0 ] PID: 1836, 69632 bytes
0x00B80000 Hidden Image-->LOG.Foundation.Implementation.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 69632 bytes
0x05370000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 69632 bytes
0x05740000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Shared.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 69632 bytes
0x05E90000 Hidden Image-->CLI.Aspect.OverDrive3.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 69632 bytes
0x05EC0000 Hidden Image-->CLI.Aspect.Radeon3D.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 69632 bytes
0x075F0000 Hidden Image-->CLI.Aspect.DeviceCV.Graphics.Wizard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 700416 bytes
0x05510000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Runtime.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 86016 bytes
0x07200000 Hidden Image-->CLI.Caste.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 86016 bytes
0x08270000 Hidden Image-->CLI.Aspect.DeviceTV.Graphics.Dashboard.DLL [ EPROCESS 0x8B230788 ] PID: 1692, 921600 bytes


!!POSSIBLE ROOTKIT ACTIVITY DETECTED!! =)

.
DDS (Ver_11-03-05.01) - NTFSx86
Run by Beku at 20:53:04.28 on 20/05/2011
Internet Explorer: 7.0.6002.18005 BrowserJavaVersion: 1.6.0_20
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.2.1033.18.2046.840 [GMT -4:00]
.
AV: Kaspersky Anti-Virus *Disabled/Outdated* {56547CC9-C9B2-849D-8FEF-A496150D6A06}
AV: Spyware Doctor with AntiVirus *Disabled/Updated* {2F668A56-D5E0-2DF1-A0AE-CB1284F42AB2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Spyware Doctor *Disabled/Updated* {94076BB2-F3DA-227F-9A1E-F060FF73600F}
SP: Kaspersky Anti-Virus *Disabled/Updated* {ED359D2D-EF88-8B13-B55F-9FE46E8A20BB}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Logitech\GamePanel Software\LGDevAgt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\ehome\ehtray.exe
C:\Program Files\peerblock\peerblock.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Windows\System32\svchost.exe -k Akamai
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\conime.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
C:\Windows\system32\UI0Detect.exe
svchost.exe "C:\Windows\system32\amdpcom32a.exe"
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\System32\alg.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Beku\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.ca/
uInternet Settings,ProxyOverride = *.local
BHO: vShare Plugin: {043c5167-00bb-4324-af7e-62013faedacf} - c:\program files\vshare\vshare_toolbar.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: IEVkbdBHO Class: {59273ab4-e7d3-40f9-a1a8-6fa9cca1862c} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\ievkbd.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FilterBHO Class: {e33cf602-d945-461a-83f0-819f76a199f8} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
TB: vShare Plugin: {043c5167-00bb-4324-af7e-62013faedacf} - c:\program files\vshare\vshare_toolbar.dll
uRun: [<NO NAME>]
uRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [MsnMsgr] "c:\program files\windows live\messenger\MsnMsgr.Exe" /background
uRun: [PeerBlock] c:\program files\peerblock\peerblock.exe
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Launch LgDeviceAgent] "c:\program files\logitech\gamepanel software\LgDevAgt.exe"
mRun: [Launch LGDCore] "c:\program files\logitech\gamepanel software\g-series software\LGDCore.exe" /SHOWHIDE
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky anti-virus 2011\avp.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
StartupFolder: c:\users\beku\appdata\roaming\micros~1\windows\startm~1\programs\startup\ccc.lnk - c:\program files\ati technologies\ati.ace\core-static\CCC.exe
StartupFolder: c:\users\beku\appdata\roaming\microsoft\windows\start menu\programs\startup\CurseClientStartup.ccip
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\setpoi~1.lnk - c:\program files\logitech\setpoint ii\SetpointII.exe
uPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
dPolicies-explorer: HideSCAHealth = 1 (0x1)
IE: {4248FE82-7FCB-46AC-B270-339F08212110} - {4248FE82-7FCB-46AC-B270-339F08212110} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
IE: {CCF151D8-D089-449F-A5A4-D9909053F20F} - {CCF151D8-D089-449F-A5A4-D9909053F20F} - c:\program files\kaspersky lab\kaspersky anti-virus 2011\klwtbbho.dll
LSP: c:\program files\common files\pc tools\lsp\PCTLsp.dll
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CB50428B-657F-47DF-9B32-671F82AA73F7} - hxxp://www.photodex.com/pxplay.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {E6F480FC-BD44-4CBA-B74A-89AF7842937D} - hxxp://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.4.16.0.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Handler: vsharechrome - {3F3A4B8A-86FC-43A4-BB00-6D7EBE9D4484} - c:\program files\vshare\vshare_toolbar.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: klogon - c:\windows\system32\klogon.dll
AppInit_DLLs: c:\progra~1\kasper~1\kasper~1\mzvkbd3.dll
mASetup: ccc-core-static - msiexec /fums {395787D8-AB35-3BCE-772B-1C50144B1CDC} /qb
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\beku\appdata\roaming\mozilla\firefox\profiles\r8meblql.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca/
FF - prefs.js: network.proxy.http - 74.15.178.62
FF - prefs.js: network.proxy.type - 1
FF - component: c:\program files\mozilla firefox\extensions\{ab2ce124-6272-4b12-94a9-7303c7397bd1}\components\SkypeFfComponent.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll
FF - plugin: c:\program files\opera\program\plugins\np_gp.dll
FF - plugin: c:\program files\opera\program\plugins\npdivx32.dll
FF - plugin: c:\program files\opera\program\plugins\npsoestb.dll
FF - plugin: c:\users\beku\appdata\roaming\mozilla\firefox\profiles\r8meblql.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
FF - plugin: c:\windows\system32\tvuax\npTVUAx.dll
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TVU Web Player: firefox@tvunetworks.com - %profile%\extensions\firefox@tvunetworks.com
FF - Ext: vShare: vshare@toolbar - %profile%\extensions\vshare@toolbar
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Skype extension for Firefox: {AB2CE124-6272-4b12-94A9-7303C7397BD1} - c:\program files\mozilla firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
---- FIREFOX POLICIES ----
user_pref(security.warn_viewing_mixed,false);
user_pref(security.warn_viewing_mixed.show_once,false);
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
user_pref(security.warn_submit_insecure,false);
FF - user.js: security.warn_submit_insecure.show_once - false
FF - user.js: network.http.accept-encoding -
.
============= SERVICES / DRIVERS ===============
.
R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2011-5-17 207280]
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [2011-5-17 51984]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [2011-5-17 59664]
R1 kl2;kl2;c:\windows\system32\drivers\kl2.sys [2010-6-9 11352]
R1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\drivers\klim6.sys [2010-4-22 22104]
R1 pctgntdi;pctgntdi;c:\windows\system32\drivers\pctgntdi.sys [2011-5-17 233136]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [2009-11-2 19984]
R3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\drivers\ManyCam.sys [2008-1-14 21632]
R3 pbfilter;pbfilter;c:\program files\peerblock\pbfilter.sys [2011-1-13 20080]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2009-11-26 34384]
S2 dualshock3;SIXAXIS/DUALSHOCK3 DX (USB) Beta;c:\windows\system32\drivers\dualshock3.sys [2010-10-21 22912]
S3 libusb0;libusb0;c:\windows\system32\drivers\libusb0.sys [2010-10-21 16896]
S3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\drivers\MijXfilt.sys [2010-8-12 51712]
S3 pctplsg;pctplsg;c:\windows\system32\drivers\pctplsg.sys [2011-5-17 70408]
S3 PPJoyBus;Parallel Port Joystick Bus device driver;c:\windows\system32\drivers\PPJoyBus.sys [2004-1-23 13952]
S3 PPortJoystick;Parallel Port Joystick device driver;c:\windows\system32\drivers\PPortJoy.sys [2004-1-23 28800]
S3 qcusbser;ACER Android USB Device for Legacy Serial Communication;c:\windows\system32\drivers\qcusbser.sys [2009-8-14 105984]
S3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [2011-5-17 33552]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2009-2-13 11520]
.
=============== File Associations ===============
.
exefile="c:\windows\system32\config\systemprofile\appdata\local\yrq.exe" -a "%1" %*
.
=============== Created Last 30 ================
.
2011-05-21 00:08:39 -------- d-----w- c:\users\beku\appdata\local\{3A046776-28B0-4A88-B871-55740302EFC8}
2011-05-19 18:42:45 -------- d-----w- c:\users\beku\appdata\local\{4DAF45B7-89E3-4CB7-BAE1-D01F20A2E0BA}
2011-05-19 06:42:33 -------- d-----w- c:\users\beku\appdata\local\{501D3D8E-A440-4B1F-B3BE-7AD7E800C135}
2011-05-18 18:42:03 -------- d-----w- c:\users\beku\appdata\local\{471DE39A-673A-4F08-BB07-A2EEC87C7757}
2011-05-18 06:41:49 -------- d-----w- c:\users\beku\appdata\local\{CC5B1E7C-1B9C-4796-9FA6-C8771FFDFC7D}
2011-05-18 02:51:33 59664 --s---w- c:\windows\system32\drivers\TfSysMon.sys
2011-05-18 02:51:33 51984 --s---w- c:\windows\system32\drivers\TfFsMon.sys
2011-05-18 02:51:33 33552 --s---w- c:\windows\system32\drivers\TfNetMon.sys
2011-05-18 02:48:11 233136 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2011-05-18 02:48:10 100136 ----a-w- c:\windows\system32\drivers\pctwfpfilter.sys
2011-05-18 02:48:04 87784 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2011-05-18 02:48:04 207280 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2011-05-18 02:47:57 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2011-05-18 02:47:47 -------- d-----w- c:\users\beku\appdata\roaming\PC Tools
2011-05-18 02:47:47 -------- d-----w- c:\program files\Spyware Doctor
2011-05-18 02:47:47 -------- d-----w- c:\program files\common files\PC Tools
2011-05-18 02:47:47 -------- d-----w- c:\progra~2\PC Tools
2011-05-17 18:41:22 -------- d-----w- c:\users\beku\appdata\local\{5FA5DDE2-0E11-4F38-954B-2C68F0B644E6}
2011-05-17 14:44:53 388096 ----a-r- c:\users\beku\appdata\roaming\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-05-17 14:44:30 -------- d-----w- c:\program files\Trend Micro
2011-05-17 06:27:54 -------- d-----w- c:\users\beku\appdata\local\{A48921E5-F30F-45B5-846F-DD1E348A6E34}
2011-05-16 18:27:26 -------- d-----w- c:\users\beku\appdata\local\{B3C2E842-7DD4-4928-B693-23C4A281DBAB}
2011-05-16 16:11:34 -------- d-----w- c:\users\beku\appdata\roaming\Malwarebytes
2011-05-16 16:11:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-16 16:11:08 -------- d-----w- c:\progra~2\Malwarebytes
2011-05-16 16:11:02 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-16 16:11:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-16 06:25:41 -------- d-----w- c:\users\beku\appdata\local\{19D7CF5A-1F27-41AD-B4B1-2583405290D3}
2011-05-15 05:24:39 -------- d-----w- c:\users\beku\appdata\local\{8E7F8405-22F1-4D0E-89AA-AEBA8EA68CF9}
2011-05-13 23:09:39 -------- d-----w- c:\users\beku\appdata\local\{7941AC1E-55EE-44C5-BCC2-6C3E07BD0103}
2011-05-13 11:09:27 -------- d-----w- c:\users\beku\appdata\local\{CAFECCD8-A8B8-49F4-9DDB-F23B5A0744AF}
2011-05-12 23:09:15 -------- d-----w- c:\users\beku\appdata\local\{AFD6A145-8534-44A3-9E7E-983652C6B182}
2011-05-12 11:09:04 -------- d-----w- c:\users\beku\appdata\local\{9DA855A0-FB4C-44ED-93B6-D76F59DD70C6}
2011-05-11 23:08:52 -------- d-----w- c:\users\beku\appdata\local\{112360C8-DB31-4F7B-AE06-86BA02D82F3C}
2011-05-11 11:08:40 -------- d-----w- c:\users\beku\appdata\local\{B988C456-5BDB-4D80-893A-E9DAE88FCBA5}
2011-05-10 23:08:29 -------- d-----w- c:\users\beku\appdata\local\{2A369E43-6E62-4837-BDCD-1963EB230FF1}
2011-05-10 11:08:17 -------- d-----w- c:\users\beku\appdata\local\{CC00352F-55EB-42A3-A779-82D6441375EF}
2011-05-09 23:07:52 -------- d-----w- c:\users\beku\appdata\local\{6EE49A78-7552-4BBC-B400-0F0128722FAB}
2011-05-09 02:22:55 -------- d-----w- c:\users\beku\appdata\local\{95898F23-D1D0-45DD-B5DA-83B10FFE8917}
2011-05-08 03:03:19 -------- d-----w- c:\users\beku\appdata\local\{1AFE9EAF-1CEB-440D-9892-494E0E2316FB}
2011-05-07 15:03:07 -------- d-----w- c:\users\beku\appdata\local\{53D2C9F5-E733-42E5-878D-C3AED9AB690D}
2011-05-07 03:02:43 -------- d-----w- c:\users\beku\appdata\local\{870B0064-CAF3-4477-A4D8-B7AECFF428A9}
2011-05-06 15:02:08 -------- d-----w- c:\users\beku\appdata\local\{7DC5947A-716D-4455-B791-DD0A9D800DFC}
2011-05-06 03:01:56 -------- d-----w- c:\users\beku\appdata\local\{CC6494FA-C710-4D30-A3FE-57D1ADC6924A}
2011-05-05 15:01:45 -------- d-----w- c:\users\beku\appdata\local\{A5663F90-5F85-48E0-A02B-D5DA0E17EB44}
2011-05-05 03:01:34 -------- d-----w- c:\users\beku\appdata\local\{2F42736D-4031-4E14-BB43-42CF11E04021}
2011-05-04 15:01:23 -------- d-----w- c:\users\beku\appdata\local\{9E1CC630-51F9-46E1-92AE-158653FD8E09}
2011-05-04 03:01:56 6792528 ----a-w- c:\progra~2\microsoft\windows defender\definition updates\{8ccd6014-209c-49f1-8c55-586759407663}\mpengine.dll
2011-05-04 03:01:12 -------- d-----w- c:\users\beku\appdata\local\{46E7B300-6E32-45F8-B3D4-310CAA53253E}
2011-05-04 00:26:21 -------- d-----w- c:\users\beku\appdata\local\{768B3168-7629-4A15-A67A-7FAEA3D5DD0C}
2011-05-03 12:25:58 -------- d-----w- c:\users\beku\appdata\local\{142CE3B2-5243-483A-BD30-2D56E71C5084}
2011-05-03 00:22:31 -------- d-----w- c:\users\beku\appdata\local\{197B7210-596C-4021-B1AB-2E3B0B16B6FE}
2011-05-01 19:25:47 -------- d-----w- c:\users\beku\appdata\local\{04DC1D39-787F-4C19-9AEF-B1F16F1AEE2A}
2011-05-01 07:25:36 -------- d-----w- c:\users\beku\appdata\local\{7C449354-23F9-4C61-8374-ACA48E82CE34}
2011-04-30 19:25:24 -------- d-----w- c:\users\beku\appdata\local\{154B610A-54B9-4303-8474-282BCDC542EC}
2011-04-30 02:00:31 -------- d-----w- c:\users\beku\appdata\local\{40F92F79-C586-4A39-83D1-2E04EDA676B0}
2011-04-29 14:00:20 -------- d-----w- c:\users\beku\appdata\local\{EEFC8E92-AD8B-47CC-99EE-54F8EC29650F}
2011-04-28 20:32:39 -------- d-----w- c:\users\beku\appdata\local\{1239C9BC-6149-4D5F-9C39-6B4EA014D8EC}
2011-04-28 02:51:36 -------- d-----w- c:\users\beku\appdata\local\{689648A0-D4A8-4712-AA1C-498ACCC48EDA}
2011-04-27 14:51:11 -------- d-----w- c:\users\beku\appdata\local\{42A642ED-849E-48FA-9F3B-D2B259AB49AC}
2011-04-26 14:50:47 -------- d-----w- c:\users\beku\appdata\local\{0C24E723-69B6-427F-90C8-97FD1C33305E}
2011-04-26 02:50:10 -------- d-----w- c:\users\beku\appdata\local\{A5E7691C-77E0-4A17-98B1-629EE736EC64}
2011-04-25 14:49:59 -------- d-----w- c:\users\beku\appdata\local\{F3C9BAEA-2E64-4766-92AE-E9CD6096F19B}
2011-04-25 02:49:48 -------- d-----w- c:\users\beku\appdata\local\{3ED2ED7A-4EF2-48A3-9A96-05F28083D2B7}
2011-04-24 14:49:37 -------- d-----w- c:\users\beku\appdata\local\{99C862F3-13CB-4E31-A703-F12440738081}
2011-04-24 02:49:26 -------- d-----w- c:\users\beku\appdata\local\{65190C51-845F-4B07-92B2-8165437102C9}
2011-04-23 14:49:15 -------- d-----w- c:\users\beku\appdata\local\{A6102038-6008-4453-BAB2-C63B338C6899}
2011-04-23 02:49:03 -------- d-----w- c:\users\beku\appdata\local\{0ABBF5A3-3C0C-4C97-BCA9-B86F8DFE21E9}
2011-04-22 14:48:52 -------- d-----w- c:\users\beku\appdata\local\{BAA7B93C-25F9-41F9-9BB3-4D4E5C3E7424}
2011-04-22 04:27:29 -------- d-----w- c:\program files\Yahoo!
2011-04-22 02:48:32 -------- d-----w- c:\users\beku\appdata\local\{493116C0-E3CC-42A8-A534-C6E2BCAE2DC4}
2011-04-21 14:44:55 -------- d-----w- c:\users\beku\appdata\local\{872E48C1-8127-453F-BA42-3006856E9CA5}
2011-04-21 02:44:44 -------- d-----w- c:\users\beku\appdata\local\{A44BE39C-21E6-4512-BB9F-70DB1A12903A}
.
==================== Find3M ====================
.
2011-03-14 08:43:26 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2011-02-26 04:36:43 1682 --sha-w- c:\progra~2\KGyGaAvL.sys
2011-02-22 14:13:01 288768 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2011-02-22 13:33:12 1068544 ----a-w- c:\windows\system32\DWrite.dll
2011-02-22 13:33:09 797696 ----a-w- c:\windows\system32\FntCache.dll
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500KS-00MJB0 rev.02.01C03 -> Harddisk0\DR0 -> \Device\Ide\IdePort1 P1T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys PCTCore.sys acpi.sys hal.dll >>UNKNOWN [0x8942A439]<<
c:\windows\system32\drivers\PCTCore.sys PC Tools Kernel Driver Suite
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x894307d0]; MOV EAX, [0x8943084c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x84E92912] -> \Device\Harddisk0\DR0[0x88F93AC8]
3 CLASSPNP[0x8BBAC8B3] -> ntkrnlpa!IofCallDriver[0x84E92912] -> [0x88E90888]
5 PCTCore[0x8550488F] -> ntkrnlpa!IofCallDriver[0x84E92912] -> [0x8866C918]
7 acpi[0x807C16BC] -> ntkrnlpa!IofCallDriver[0x84E92912] -> [0x8867D2A0]
\Driver\atapi[0x89199E38] -> IRP_MJ_CREATE -> 0x8942A439
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; MOV ES, AX; MOV DS, AX; MOV SI, 0x7c00; MOV DI, 0x600; MOV CX, 0x200; CLD ; REP MOVSB ; PUSH AX; PUSH 0x61c; RETF ; STI ; PUSHA ; MOV CX, 0x147; MOV BP, 0x62a; ROR BYTE [BP+0x0], CL; INC BP; }
detected disk devices:
\Device\Ide\IdeDeviceP1T0L0-3 -> \??\IDE#DiskWDC_WD2500KS-00MJB0_____________________02.01C03#5&2e6a01c1&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
user != kernel MBR !!!
sectors 488397166 (+255): user != kernel
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
============= FINISH: 20:56:16.17 ===============

Attached Files



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 20 May 2011 - 08:27 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

:multiple Anti Virus programs:

It looks like you are operating your computer with multiple Anti Virus programs running in memory at once:

AV: Kaspersky Anti-Virus
AV: Spyware Doctor with AntiVirus


Anti-virus programs take up an enormous amount of your computer's resources when they are actively scanning your computer. Having two anti-virus programs running at the same time can cause your computer to run very slow, become unstable and even, in rare cases, crash.

Please remove one of them.





Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 20 May 2011 - 11:20 PM

ok problems first, i can't enable windows defender and SCVHOST is still eating up over 50% of my CPU almost constantly, plus i keep getting ads starting new pages when ever i open my internet browser or come back from not using it for a bit but it was still opened in the background when i click on it it'll open ads, doesn't matter which one IE or firefox.

and now the combofix log

ComboFix 11-05-19.02 - Beku 20/05/2011 23:18:17.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.2.1033.18.2046.1025 [GMT -4:00]
Running from: c:\users\Beku\Desktop\ComboFix.exe
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Beku\AppData\Local\{33538A2B-DF0E-44DC-9BFC-164E2E1D7038}
c:\users\Beku\AppData\Local\{33538A2B-DF0E-44DC-9BFC-164E2E1D7038}\chrome\content\overlay.xul
c:\users\Beku\AppData\Local\{33538A2B-DF0E-44DC-9BFC-164E2E1D7038}\install.rdf
c:\users\Beku\AppData\Local\Tempals_inst.exe
c:\users\Beku\AppData\Roaming\225CF0A5F164DB41C55BD7EA720A0859
c:\users\Beku\AppData\Roaming\225CF0A5F164DB41C55BD7EA720A0859\enemies-names.txt
c:\users\Beku\AppData\Roaming\Adobe\plugs
c:\users\Beku\AppData\Roaming\Adobe\shed
c:\users\Beku\AppData\Roaming\PnkBstrB.exe
c:\users\Beku\AppData\Roaming\Sun\mxd1.txt
c:\windows\system32\624893730.dat
.
.
\\.\PhysicalDrive0 - Bootkit TDL4 was found and disinfected
.
((((((((((((((((((((((((( Files Created from 2011-04-21 to 2011-05-21 )))))))))))))))))))))))))))))))
.
.
2011-05-21 03:32 . 2011-05-21 03:35 -------- d-----w- c:\users\Beku\AppData\Local\temp
2011-05-21 03:32 . 2011-05-21 03:32 -------- d-----w- c:\users\Default\AppData\Local\temp
2011-05-21 00:08 . 2011-05-21 00:08 -------- d-----w- c:\users\Beku\AppData\Local\{3A046776-28B0-4A88-B871-55740302EFC8}
2011-05-19 18:42 . 2011-05-19 18:42 -------- d-----w- c:\users\Beku\AppData\Local\{4DAF45B7-89E3-4CB7-BAE1-D01F20A2E0BA}
2011-05-19 06:42 . 2011-05-19 06:42 -------- d-----w- c:\users\Beku\AppData\Local\{501D3D8E-A440-4B1F-B3BE-7AD7E800C135}
2011-05-18 18:42 . 2011-05-18 18:42 -------- d-----w- c:\users\Beku\AppData\Local\{471DE39A-673A-4F08-BB07-A2EEC87C7757}
2011-05-18 06:41 . 2011-05-18 06:41 -------- d-----w- c:\users\Beku\AppData\Local\{CC5B1E7C-1B9C-4796-9FA6-C8771FFDFC7D}
2011-05-18 02:47 . 2011-05-21 02:56 -------- d-----w- c:\programdata\PC Tools
2011-05-17 18:41 . 2011-05-17 18:41 -------- d-----w- c:\users\Beku\AppData\Local\{5FA5DDE2-0E11-4F38-954B-2C68F0B644E6}
2011-05-17 14:44 . 2011-05-17 14:44 388096 ----a-r- c:\users\Beku\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-05-17 14:44 . 2011-05-17 14:44 -------- d-----w- c:\program files\Trend Micro
2011-05-17 06:27 . 2011-05-17 06:28 -------- d-----w- c:\users\Beku\AppData\Local\{A48921E5-F30F-45B5-846F-DD1E348A6E34}
2011-05-16 18:27 . 2011-05-16 18:27 -------- d-----w- c:\users\Beku\AppData\Local\{B3C2E842-7DD4-4928-B693-23C4A281DBAB}
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\users\Beku\AppData\Roaming\Malwarebytes
2011-05-16 16:11 . 2010-12-20 22:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\programdata\Malwarebytes
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-16 16:11 . 2010-12-20 22:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-16 06:25 . 2011-05-16 06:27 -------- d-----w- c:\users\Beku\AppData\Local\{19D7CF5A-1F27-41AD-B4B1-2583405290D3}
2011-05-15 05:24 . 2011-05-15 05:25 -------- d-----w- c:\users\Beku\AppData\Local\{8E7F8405-22F1-4D0E-89AA-AEBA8EA68CF9}
2011-05-13 23:09 . 2011-05-13 23:09 -------- d-----w- c:\users\Beku\AppData\Local\{7941AC1E-55EE-44C5-BCC2-6C3E07BD0103}
2011-05-13 11:09 . 2011-05-13 11:09 -------- d-----w- c:\users\Beku\AppData\Local\{CAFECCD8-A8B8-49F4-9DDB-F23B5A0744AF}
2011-05-12 23:09 . 2011-05-12 23:09 -------- d-----w- c:\users\Beku\AppData\Local\{AFD6A145-8534-44A3-9E7E-983652C6B182}
2011-05-12 11:09 . 2011-05-12 11:09 -------- d-----w- c:\users\Beku\AppData\Local\{9DA855A0-FB4C-44ED-93B6-D76F59DD70C6}
2011-05-11 23:08 . 2011-05-11 23:09 -------- d-----w- c:\users\Beku\AppData\Local\{112360C8-DB31-4F7B-AE06-86BA02D82F3C}
2011-05-11 11:08 . 2011-05-11 11:08 -------- d-----w- c:\users\Beku\AppData\Local\{B988C456-5BDB-4D80-893A-E9DAE88FCBA5}
2011-05-10 23:08 . 2011-05-10 23:08 -------- d-----w- c:\users\Beku\AppData\Local\{2A369E43-6E62-4837-BDCD-1963EB230FF1}
2011-05-10 11:08 . 2011-05-10 11:08 -------- d-----w- c:\users\Beku\AppData\Local\{CC00352F-55EB-42A3-A779-82D6441375EF}
2011-05-09 23:07 . 2011-05-09 23:08 -------- d-----w- c:\users\Beku\AppData\Local\{6EE49A78-7552-4BBC-B400-0F0128722FAB}
2011-05-09 02:22 . 2011-05-09 02:23 -------- d-----w- c:\users\Beku\AppData\Local\{95898F23-D1D0-45DD-B5DA-83B10FFE8917}
2011-05-08 03:03 . 2011-05-08 03:03 -------- d-----w- c:\users\Beku\AppData\Local\{1AFE9EAF-1CEB-440D-9892-494E0E2316FB}
2011-05-07 15:03 . 2011-05-07 15:03 -------- d-----w- c:\users\Beku\AppData\Local\{53D2C9F5-E733-42E5-878D-C3AED9AB690D}
2011-05-07 03:02 . 2011-05-07 03:03 -------- d-----w- c:\users\Beku\AppData\Local\{870B0064-CAF3-4477-A4D8-B7AECFF428A9}
2011-05-06 15:02 . 2011-05-06 15:02 -------- d-----w- c:\users\Beku\AppData\Local\{7DC5947A-716D-4455-B791-DD0A9D800DFC}
2011-05-06 03:01 . 2011-05-06 03:02 -------- d-----w- c:\users\Beku\AppData\Local\{CC6494FA-C710-4D30-A3FE-57D1ADC6924A}
2011-05-05 15:01 . 2011-05-05 15:01 -------- d-----w- c:\users\Beku\AppData\Local\{A5663F90-5F85-48E0-A02B-D5DA0E17EB44}
2011-05-05 03:01 . 2011-05-05 03:01 -------- d-----w- c:\users\Beku\AppData\Local\{2F42736D-4031-4E14-BB43-42CF11E04021}
2011-05-04 15:01 . 2011-05-04 15:01 -------- d-----w- c:\users\Beku\AppData\Local\{9E1CC630-51F9-46E1-92AE-158653FD8E09}
2011-05-04 03:01 . 2011-03-15 04:05 6792528 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{8CCD6014-209C-49F1-8C55-586759407663}\mpengine.dll
2011-05-04 03:01 . 2011-05-04 03:01 -------- d-----w- c:\users\Beku\AppData\Local\{46E7B300-6E32-45F8-B3D4-310CAA53253E}
2011-05-04 00:26 . 2011-05-04 00:26 -------- d-----w- c:\users\Beku\AppData\Local\{768B3168-7629-4A15-A67A-7FAEA3D5DD0C}
2011-05-03 12:25 . 2011-05-03 12:26 -------- d-----w- c:\users\Beku\AppData\Local\{142CE3B2-5243-483A-BD30-2D56E71C5084}
2011-05-03 00:22 . 2011-05-03 00:23 -------- d-----w- c:\users\Beku\AppData\Local\{197B7210-596C-4021-B1AB-2E3B0B16B6FE}
2011-05-01 19:25 . 2011-05-01 19:25 -------- d-----w- c:\users\Beku\AppData\Local\{04DC1D39-787F-4C19-9AEF-B1F16F1AEE2A}
2011-05-01 07:25 . 2011-05-01 07:25 -------- d-----w- c:\users\Beku\AppData\Local\{7C449354-23F9-4C61-8374-ACA48E82CE34}
2011-04-30 19:25 . 2011-04-30 19:25 -------- d-----w- c:\users\Beku\AppData\Local\{154B610A-54B9-4303-8474-282BCDC542EC}
2011-04-30 02:00 . 2011-04-30 02:00 -------- d-----w- c:\users\Beku\AppData\Local\{40F92F79-C586-4A39-83D1-2E04EDA676B0}
2011-04-29 14:00 . 2011-04-29 14:00 -------- d-----w- c:\users\Beku\AppData\Local\{EEFC8E92-AD8B-47CC-99EE-54F8EC29650F}
2011-04-28 20:32 . 2011-04-28 20:32 -------- d-----w- c:\users\Beku\AppData\Local\{1239C9BC-6149-4D5F-9C39-6B4EA014D8EC}
2011-04-28 02:51 . 2011-04-28 02:51 -------- d-----w- c:\users\Beku\AppData\Local\{689648A0-D4A8-4712-AA1C-498ACCC48EDA}
2011-04-27 18:26 . 2011-04-27 18:26 -------- d-----w- c:\programdata\WindowsSearch
2011-04-27 14:51 . 2011-04-27 14:51 -------- d-----w- c:\users\Beku\AppData\Local\{42A642ED-849E-48FA-9F3B-D2B259AB49AC}
2011-04-26 14:50 . 2011-04-27 02:51 -------- d-----w- c:\users\Beku\AppData\Local\{0C24E723-69B6-427F-90C8-97FD1C33305E}
2011-04-26 02:50 . 2011-04-26 02:50 -------- d-----w- c:\users\Beku\AppData\Local\{A5E7691C-77E0-4A17-98B1-629EE736EC64}
2011-04-25 14:49 . 2011-04-25 14:50 -------- d-----w- c:\users\Beku\AppData\Local\{F3C9BAEA-2E64-4766-92AE-E9CD6096F19B}
2011-04-25 02:49 . 2011-04-25 02:49 -------- d-----w- c:\users\Beku\AppData\Local\{3ED2ED7A-4EF2-48A3-9A96-05F28083D2B7}
2011-04-24 14:49 . 2011-04-24 14:49 -------- d-----w- c:\users\Beku\AppData\Local\{99C862F3-13CB-4E31-A703-F12440738081}
2011-04-24 02:49 . 2011-04-24 02:49 -------- d-----w- c:\users\Beku\AppData\Local\{65190C51-845F-4B07-92B2-8165437102C9}
2011-04-23 14:49 . 2011-04-23 14:49 -------- d-----w- c:\users\Beku\AppData\Local\{A6102038-6008-4453-BAB2-C63B338C6899}
2011-04-23 02:49 . 2011-04-23 02:49 -------- d-----w- c:\users\Beku\AppData\Local\{0ABBF5A3-3C0C-4C97-BCA9-B86F8DFE21E9}
2011-04-22 14:48 . 2011-04-22 14:49 -------- d-----w- c:\users\Beku\AppData\Local\{BAA7B93C-25F9-41F9-9BB3-4D4E5C3E7424}
2011-04-22 04:30 . 2011-04-26 07:41 -------- d-----w- c:\programdata\Yahoo!
2011-04-22 04:27 . 2011-04-22 04:30 -------- d-----w- c:\program files\Yahoo!
2011-04-22 02:48 . 2011-04-22 02:48 -------- d-----w- c:\users\Beku\AppData\Local\{493116C0-E3CC-42A8-A534-C6E2BCAE2DC4}
2011-04-21 14:44 . 2011-04-21 14:44 -------- d-----w- c:\users\Beku\AppData\Local\{872E48C1-8127-453F-BA42-3006856E9CA5}
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-03 15:49 . 2011-04-12 21:11 0 ----a-w- c:\users\Beku\AppData\Local\Yluxuqecuzoz.bin
2011-03-14 08:43 . 2007-03-30 22:01 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2011-03-11 03:08 . 2010-06-24 16:33 18328 ----a-w- c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
2011-02-26 04:36 . 2010-11-27 10:27 1682 --sha-w- c:\programdata\KGyGaAvL.sys
2011-02-22 14:13 . 2011-03-22 22:48 288768 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2011-02-22 13:33 . 2011-03-22 22:48 1068544 ----a-w- c:\windows\system32\DWrite.dll
2011-02-22 13:33 . 2011-03-22 22:48 797696 ----a-w- c:\windows\system32\FntCache.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"MsnMsgr"="c:\program files\Windows Live\Messenger\MsnMsgr.Exe" [2010-11-10 4240760]
"PeerBlock"="c:\program files\peerblock\peerblock.exe" [2010-11-07 1866864]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-12-27 395640]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-10-10 69632]
"Launch LgDeviceAgent"="c:\program files\Logitech\GamePanel Software\LgDevAgt.exe" [2009-08-13 357384]
"Launch LGDCore"="c:\program files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" [2009-08-13 3161608]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-01-22 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2006-11-02 8704]
.
c:\users\Beku\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
CCC.lnk - c:\program files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe [2006-9-29 49152]
CurseClientStartup.ccip [2011-5-14 0]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
SetPointII.lnk - c:\program files\Logitech\SetPoint II\SetpointII.exe [2008-11-13 323584]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"HideSCAHealth"= 1 (0x1)
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^WDDMStatus.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\WDDMStatus.lnk
backup=c:\windows\pss\WDDMStatus.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^WDSmartWare.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\WDSmartWare.lnk
backup=c:\windows\pss\WDSmartWare.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-06-03 00:50 1144104 ----a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-01-05 20:18 413696 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Sidebar]
2009-04-11 06:28 1233920 ----a-w- c:\program files\Windows Sidebar\sidebar.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-02-18 15:43 248040 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\uTorrent]
2010-12-27 00:09 395640 ----a-w- c:\program files\uTorrent\uTorrent.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinampAgent]
2008-01-15 22:54 37376 ----a-w- c:\program files\Winamp\winampa.exe
.
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [x]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [x]
R2 Bonjourpla;Bonjour Service Bonjourpla;c:\windows\system32\amdpcom32a.exe [2008-01-19 65024]
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 dualshock3;SIXAXIS/DUALSHOCK3 DX (USB) Beta;c:\windows\system32\DRIVERS\dualshock3.sys [2010-02-16 22912]
R3 libusb0;libusb0; [x]
R3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\DRIVERS\MijXfilt.sys [2010-07-01 51712]
R3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des [2010-03-21 3532120]
R3 PPJoyBus;Parallel Port Joystick Bus device driver;c:\windows\system32\drivers\PPJoyBus.sys [2004-10-24 13952]
R3 PPortJoystick;Parallel Port Joystick device driver;c:\windows\system32\drivers\PPortJoy.sys [2004-10-24 28800]
R3 qcusbser;ACER Android USB Device for Legacy Serial Communication;c:\windows\system32\DRIVERS\qcusbser.sys [2009-08-14 105984]
R3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [x]
R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam.sys [2009-02-13 11520]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
R4 sptd;sptd;c:\windows\System32\Drivers\sptd.sys [2010-04-02 717296]
S2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe [2008-01-19 21504]
S2 WDDMService;WD SmartWare Drive Manager;c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe [2010-01-21 110592]
S2 WDSmartWareBackgroundService;WD SmartWare Background Service;c:\program files\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe [2009-06-16 20480]
S3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\DRIVERS\ManyCam.sys [2008-01-14 21632]
S3 pbfilter;pbfilter;c:\program files\peerblock\pbfilter.sys [2010-11-07 20080]
S3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2009-11-26 34384]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
Akamai REG_MULTI_SZ Akamai
.
Contents of the 'Scheduled Tasks' folder
.
2011-05-21 c:\windows\Tasks\User_Feed_Synchronization-{6FF51A12-3098-4D20-8A6A-0A2CE274DC3B}.job
- c:\windows\system32\msfeedssync.exe [2008-05-25 07:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.ca/
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\users\Beku\AppData\Roaming\Mozilla\Firefox\Profiles\r8meblql.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca/
FF - prefs.js: network.proxy.http - 74.15.178.62
FF - prefs.js: network.proxy.type - 1
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TVU Web Player: firefox@tvunetworks.com - %profile%\extensions\firefox@tvunetworks.com
FF - Ext: vShare: vshare@toolbar - %profile%\extensions\vshare@toolbar
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Skype extension for Firefox: {AB2CE124-6272-4b12-94A9-7303C7397BD1} - c:\program files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
user_pref(security.warn_viewing_mixed,false);
user_pref(security.warn_viewing_mixed.show_once,false);
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
user_pref(security.warn_submit_insecure,false);
FF - user.js: security.warn_submit_insecure.show_once - false
FF - user.js: network.http.accept-encoding -
.
.
------- File Associations -------
.
exefile="c:\windows\system32\config\systemprofile\AppData\Local\yrq.exe" -a "%1" %*
.
- - - - ORPHANS REMOVED - - - -
.
MSConfigStartUp-BitTorrent DNA - c:\users\Beku\Program Files\DNA\btdna.exe
MSConfigStartUp-igndlm - c:\program files\Download Manager\DLM.exe
HKLM_ActiveSetup-ccc-core-static - msiexec
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-05-20 23:35
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500KS-00MJB0 rev.02.01C03 -> Harddisk0\DR0 -> \Device\Ide\IdePort1 P1T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x889CB439]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x889d17d0]; MOV EAX, [0x889d184c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x84E57912] -> \Device\Harddisk0\DR0[0x88431AC8]
3 CLASSPNP[0x8ABA28B3] -> ntkrnlpa!IofCallDriver[0x84E57912] -> [0x87BE5598]
5 acpi[0x8068A6BC] -> ntkrnlpa!IofCallDriver[0x84E57912] -> [0x87C24390]
\Driver\atapi[0x8873ADD0] -> IRP_MJ_CREATE -> 0x889CB439
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; MOV ES, AX; MOV DS, AX; MOV SI, 0x7c00; MOV DI, 0x600; MOV CX, 0x200; CLD ; REP MOVSB ; PUSH AX; PUSH 0x61c; RETF ; STI ; PUSHA ; MOV CX, 0x147; MOV BP, 0x62a; ROR BYTE [BP+0x0], CL; INC BP; }
detected disk devices:
\Device\Ide\IdeDeviceP1T0L0-3 -> \??\IDE#DiskWDC_WD2500KS-00MJB0_____________________02.01C03#5&2e6a01c1&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
user != kernel MBR !!!
copy of MBR has been found in sector 9 !
sectors 488397166 (+255): user != kernel
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3318982196-3104161032-715442344-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:29,1d,48,f9,46,fb,df,41,83,0d,4e,9d,75,b1,84,91,96,62,ff,25,21,76,ed,
8f,3d,1a,8f,c7,f0,1a,e6,d1,d1,82,b7,6d,f5,65,c6,1c,4b,71,2c,7c,42,2a,66,53,\
"??"=hex:eb,1f,2d,b0,11,61,84,98,d8,d0,2d,fb,cd,d2,c6,97
.
[HKEY_USERS\S-1-5-21-3318982196-3104161032-715442344-1000\Software\SecuROM\License information*]
"datasecu"=hex:a6,b5,27,89,a5,17,87,dd,58,46,0f,78,28,fa,84,58,89,9f,c5,83,f2,
c4,74,f0,c1,02,b9,73,02,27,b8,93,46,3c,6b,d7,c3,0e,55,c7,b2,b5,a1,b7,49,2f,\
"rkeysecu"=hex:7d,80,d4,35,aa,72,d6,e3,bb,26,3f,58,8e,57,ef,c0
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(3908)
c:\program files\Bonjour\mdnsNSP.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\conime.exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\windows\ehome\ehmsas.exe
c:\windows\system32\WUDFHost.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\windows\servicing\TrustedInstaller.exe
.
**************************************************************************
.
Completion time: 2011-05-20 23:44:34 - machine was rebooted
ComboFix-quarantined-files.txt 2011-05-21 03:44
.
Pre-Run: 68,205,641,728 bytes free
Post-Run: 68,164,665,344 bytes free
.
- - End Of File - - C348AAFC678B1E92CD319BE6CA0311C2

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 21 May 2011 - 05:27 AM

I want you to run this tool for me next.

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 21 May 2011 - 10:56 AM

2011/05/21 11:33:28.0494 6412 TDSS rootkit removing tool 2.5.1.0 May 13 2011 13:20:29
2011/05/21 11:33:28.0910 6412 ================================================================================
2011/05/21 11:33:28.0910 6412 SystemInfo:
2011/05/21 11:33:28.0910 6412
2011/05/21 11:33:28.0911 6412 OS Version: 6.0.6002 ServicePack: 2.0
2011/05/21 11:33:28.0911 6412 Product type: Workstation
2011/05/21 11:33:28.0911 6412 ComputerName: BEKU-PC
2011/05/21 11:33:28.0912 6412 UserName: Beku
2011/05/21 11:33:28.0912 6412 Windows directory: C:\Windows
2011/05/21 11:33:28.0912 6412 System windows directory: C:\Windows
2011/05/21 11:33:28.0912 6412 Processor architecture: Intel x86
2011/05/21 11:33:28.0912 6412 Number of processors: 2
2011/05/21 11:33:28.0913 6412 Page size: 0x1000
2011/05/21 11:33:28.0913 6412 Boot type: Normal boot
2011/05/21 11:33:28.0913 6412 ================================================================================
2011/05/21 11:33:29.0495 6412 Initialize success
2011/05/21 11:33:46.0074 7976 ================================================================================
2011/05/21 11:33:46.0074 7976 Scan started
2011/05/21 11:33:46.0074 7976 Mode: Manual;
2011/05/21 11:33:46.0074 7976 ================================================================================
2011/05/21 11:33:47.0244 7976 ACPI (82b296ae1892fe3dbee00c9cf92f8ac7) C:\Windows\system32\drivers\acpi.sys
2011/05/21 11:33:47.0388 7976 adp94xx (2edc5bbac6c651ece337bde8ed97c9fb) C:\Windows\system32\drivers\adp94xx.sys
2011/05/21 11:33:47.0494 7976 adpahci (b84088ca3cdca97da44a984c6ce1ccad) C:\Windows\system32\drivers\adpahci.sys
2011/05/21 11:33:47.0567 7976 adpu160m (7880c67bccc27c86fd05aa2afb5ea469) C:\Windows\system32\drivers\adpu160m.sys
2011/05/21 11:33:47.0637 7976 adpu320 (9ae713f8e30efc2abccd84904333df4d) C:\Windows\system32\drivers\adpu320.sys
2011/05/21 11:33:47.0803 7976 AFD (a201207363aa900abf1a388468688570) C:\Windows\system32\drivers\afd.sys
2011/05/21 11:33:47.0903 7976 agp440 (ef23439cdd587f64c2c1b8825cead7d8) C:\Windows\system32\drivers\agp440.sys
2011/05/21 11:33:47.0979 7976 aic78xx (ae1fdf7bf7bb6c6a70f67699d880592a) C:\Windows\system32\drivers\djsvs.sys
2011/05/21 11:33:48.0100 7976 aliide (90395b64600ebb4552e26e178c94b2e4) C:\Windows\system32\drivers\aliide.sys
2011/05/21 11:33:48.0163 7976 amdagp (2b13e304c9dfdfa5eb582f6a149fa2c7) C:\Windows\system32\drivers\amdagp.sys
2011/05/21 11:33:48.0247 7976 amdide (0577df1d323fe75a739c787893d300ea) C:\Windows\system32\drivers\amdide.sys
2011/05/21 11:33:48.0315 7976 AmdK7 (dc487885bcef9f28eece6fac0e5ddfc5) C:\Windows\system32\drivers\amdk7.sys
2011/05/21 11:33:48.0387 7976 AmdK8 (0ca0071da4315b00fc1328ca86b425da) C:\Windows\system32\drivers\amdk8.sys
2011/05/21 11:33:48.0543 7976 arc (5f673180268bb1fdb69c99b6619fe379) C:\Windows\system32\drivers\arc.sys
2011/05/21 11:33:48.0608 7976 arcsas (957f7540b5e7f602e44648c7de5a1c05) C:\Windows\system32\drivers\arcsas.sys
2011/05/21 11:33:48.0721 7976 AsyncMac (53b202abee6455406254444303e87be1) C:\Windows\system32\DRIVERS\asyncmac.sys
2011/05/21 11:33:48.0778 7976 atapi (1f05b78ab91c9075565a9d8a4b880bc4) C:\Windows\system32\drivers\atapi.sys
2011/05/21 11:33:49.0051 7976 ati2mtag (6733656c24f4c6a29317c3dd9ac5980a) C:\Windows\system32\DRIVERS\ati2mtag.sys
2011/05/21 11:33:49.0465 7976 atikmdag (a23efb72057fed7128eb558866055fdf) C:\Windows\system32\DRIVERS\atikmdag.sys
2011/05/21 11:33:49.0701 7976 Beep (67e506b75bd5326a3ec7b70bd014dfb6) C:\Windows\system32\drivers\Beep.sys
2011/05/21 11:33:49.0942 7976 bowser (74b442b2be1260b7588c136177ceac66) C:\Windows\system32\DRIVERS\bowser.sys
2011/05/21 11:33:50.0021 7976 BrFiltLo (9f9acc7f7ccde8a15c282d3f88b43309) C:\Windows\system32\drivers\brfiltlo.sys
2011/05/21 11:33:50.0087 7976 BrFiltUp (56801ad62213a41f6497f96dee83755a) C:\Windows\system32\drivers\brfiltup.sys
2011/05/21 11:33:50.0185 7976 Brserid (b304e75cff293029eddf094246747113) C:\Windows\system32\drivers\brserid.sys
2011/05/21 11:33:50.0250 7976 BrSerWdm (203f0b1e73adadbbb7b7b1fabd901f6b) C:\Windows\system32\drivers\brserwdm.sys
2011/05/21 11:33:50.0345 7976 BrUsbMdm (bd456606156ba17e60a04e18016ae54b) C:\Windows\system32\drivers\brusbmdm.sys
2011/05/21 11:33:50.0406 7976 BrUsbSer (af72ed54503f717a43268b3cc5faec2e) C:\Windows\system32\drivers\brusbser.sys
2011/05/21 11:33:50.0483 7976 BTHMODEM (ad07c1ec6665b8b35741ab91200c6b68) C:\Windows\system32\drivers\bthmodem.sys
2011/05/21 11:33:50.0666 7976 cdfs (7add03e75beb9e6dd102c3081d29840a) C:\Windows\system32\DRIVERS\cdfs.sys
2011/05/21 11:33:50.0763 7976 cdrom (6b4bffb9becd728097024276430db314) C:\Windows\system32\DRIVERS\cdrom.sys
2011/05/21 11:33:50.0858 7976 circlass (da8e0afc7baa226c538ef53ac2f90897) C:\Windows\system32\drivers\circlass.sys
2011/05/21 11:33:50.0936 7976 CLFS (d7659d3b5b92c31e84e53c1431f35132) C:\Windows\system32\CLFS.sys
2011/05/21 11:33:51.0062 7976 cmdide (45201046c776ffdaf3fc8a0029c581c8) C:\Windows\system32\drivers\cmdide.sys
2011/05/21 11:33:51.0126 7976 Compbatt (82b8c91d327cfecf76cb58716f7d4997) C:\Windows\system32\drivers\compbatt.sys
2011/05/21 11:33:51.0212 7976 crcdisk (2a213ae086bbec5e937553c7d9a2b22c) C:\Windows\system32\drivers\crcdisk.sys
2011/05/21 11:33:51.0289 7976 Crusoe (22a7f883508176489f559ee745b5bf5d) C:\Windows\system32\drivers\crusoe.sys
2011/05/21 11:33:51.0448 7976 DfsC (218d8ae46c88e82014f5d73d0236d9b2) C:\Windows\system32\Drivers\dfsc.sys
2011/05/21 11:33:51.0620 7976 disk (5d4aefc3386920236a548271f8f1af6a) C:\Windows\system32\drivers\disk.sys
2011/05/21 11:33:51.0765 7976 drmkaud (97fef831ab90bee128c9af390e243f80) C:\Windows\system32\drivers\drmkaud.sys
2011/05/21 11:33:51.0879 7976 dualshock3 (258dfa13d4fe319dfa5b7608e96a3dcb) C:\Windows\system32\DRIVERS\dualshock3.sys
2011/05/21 11:33:51.0973 7976 DXGKrnl (c68ac676b0ef30cfbb1080adce49eb1f) C:\Windows\System32\drivers\dxgkrnl.sys
2011/05/21 11:33:52.0090 7976 e1express (908ed85b7806e8af3af5e9b74f7809d4) C:\Windows\system32\DRIVERS\e1e6032.sys
2011/05/21 11:33:52.0203 7976 E1G60 (f88fb26547fd2ce6d0a5af2985892c48) C:\Windows\system32\DRIVERS\E1G60I32.sys
2011/05/21 11:33:52.0406 7976 Ecache (7f64ea048dcfac7acf8b4d7b4e6fe371) C:\Windows\system32\drivers\ecache.sys
2011/05/21 11:33:52.0559 7976 elxstor (e8f3f21a71720c84bcf423b80028359f) C:\Windows\system32\drivers\elxstor.sys
2011/05/21 11:33:52.0767 7976 exfat (22b408651f9123527bcee54b4f6c5cae) C:\Windows\system32\drivers\exfat.sys
2011/05/21 11:33:52.0842 7976 fastfat (1e9b9a70d332103c52995e957dc09ef8) C:\Windows\system32\drivers\fastfat.sys
2011/05/21 11:33:52.0908 7976 fdc (afe1e8b9782a0dd7fb46bbd88e43f89a) C:\Windows\system32\DRIVERS\fdc.sys
2011/05/21 11:33:53.0018 7976 FileInfo (a8c0139a884861e3aae9cfe73b208a9f) C:\Windows\system32\drivers\fileinfo.sys
2011/05/21 11:33:53.0086 7976 Filetrace (0ae429a696aecbc5970e3cf2c62635ae) C:\Windows\system32\drivers\filetrace.sys
2011/05/21 11:33:53.0183 7976 flpydisk (85b7cf99d532820495d68d747fda9ebd) C:\Windows\system32\DRIVERS\flpydisk.sys
2011/05/21 11:33:53.0286 7976 FltMgr (01334f9ea68e6877c4ef05d3ea8abb05) C:\Windows\system32\drivers\fltmgr.sys
2011/05/21 11:33:53.0799 7976 Fs_Rec (65ea8b77b5851854f0c55c43fa51a198) C:\Windows\system32\drivers\Fs_Rec.sys
2011/05/21 11:33:54.0141 7976 gagp30kx (4e1cd0a45c50a8882616cae5bf82f3c5) C:\Windows\system32\drivers\gagp30kx.sys
2011/05/21 11:33:54.0337 7976 GEARAspiWDM (ab8a6a87d9d7255c3884d5b9541a6e80) C:\Windows\system32\DRIVERS\GEARAspiWDM.sys
2011/05/21 11:33:54.0487 7976 HdAudAddService (3f90e001369a07243763bd5a523d8722) C:\Windows\system32\drivers\HdAudio.sys
2011/05/21 11:33:54.0698 7976 HDAudBus (062452b7ffd68c8c042a6261fe8dff4a) C:\Windows\system32\DRIVERS\HDAudBus.sys
2011/05/21 11:33:54.0846 7976 HidBth (1338520e78d90154ed6be8f84de5fceb) C:\Windows\system32\drivers\hidbth.sys
2011/05/21 11:33:54.0922 7976 HidIr (ff3160c3a2445128c5a6d9b076da519e) C:\Windows\system32\drivers\hidir.sys
2011/05/21 11:33:55.0028 7976 HidUsb (cca4b519b17e23a00b826c55716809cc) C:\Windows\system32\DRIVERS\hidusb.sys
2011/05/21 11:33:55.0129 7976 HpCISSs (df353b401001246853763c4b7aaa6f50) C:\Windows\system32\drivers\hpcisss.sys
2011/05/21 11:33:55.0257 7976 HTTP (f870aa3e254628ebeafe754108d664de) C:\Windows\system32\drivers\HTTP.sys
2011/05/21 11:33:55.0369 7976 i2omp (324c2152ff2c61abae92d09f3cca4d63) C:\Windows\system32\drivers\i2omp.sys
2011/05/21 11:33:55.0652 7976 i8042prt (22d56c8184586b7a1f6fa60be5f5a2bd) C:\Windows\system32\DRIVERS\i8042prt.sys
2011/05/21 11:33:55.0742 7976 iaStorV (c957bf4b5d80b46c5017bf0101e6c906) C:\Windows\system32\drivers\iastorv.sys
2011/05/21 11:33:55.0907 7976 iirsp (2d077bf86e843f901d8db709c95b49a5) C:\Windows\system32\drivers\iirsp.sys
2011/05/21 11:33:56.0033 7976 intelide (83aa759f3189e6370c30de5dc5590718) C:\Windows\system32\drivers\intelide.sys
2011/05/21 11:33:56.0200 7976 intelppm (224191001e78c89dfa78924c3ea595ff) C:\Windows\system32\DRIVERS\intelppm.sys
2011/05/21 11:33:56.0296 7976 IpFilterDriver (62c265c38769b864cb25b4bcf62df6c3) C:\Windows\system32\DRIVERS\ipfltdrv.sys
2011/05/21 11:33:56.0476 7976 IPMIDRV (40f34f8aba2a015d780e4b09138b6c17) C:\Windows\system32\drivers\ipmidrv.sys
2011/05/21 11:33:56.0605 7976 IPNAT (8793643a67b42cec66490b2a0cf92d68) C:\Windows\system32\DRIVERS\ipnat.sys
2011/05/21 11:33:56.0670 7976 IRENUM (109c0dfb82c3632fbd11949b73aeeac9) C:\Windows\system32\drivers\irenum.sys
2011/05/21 11:33:56.0734 7976 isapnp (350fca7e73cf65bcef43fae1e4e91293) C:\Windows\system32\drivers\isapnp.sys
2011/05/21 11:33:56.0933 7976 iScsiPrt (232fa340531d940aac623b121a595034) C:\Windows\system32\DRIVERS\msiscsi.sys
2011/05/21 11:33:56.0990 7976 iteatapi (bced60d16156e428f8df8cf27b0df150) C:\Windows\system32\drivers\iteatapi.sys
2011/05/21 11:33:57.0066 7976 iteraid (06fa654504a498c30adca8bec4e87e7e) C:\Windows\system32\drivers\iteraid.sys
2011/05/21 11:33:57.0137 7976 kbdclass (37605e0a8cf00cbba538e753e4344c6e) C:\Windows\system32\DRIVERS\kbdclass.sys
2011/05/21 11:33:57.0205 7976 kbdhid (ede59ec70e25c24581add1fbec7325f7) C:\Windows\system32\DRIVERS\kbdhid.sys
2011/05/21 11:33:57.0347 7976 KSecDD (86165728af9bf72d6442a894fdfb4f8b) C:\Windows\system32\Drivers\ksecdd.sys
2011/05/21 11:33:57.0610 7976 LHidFilt (dd83dc92463fce6324fd30a13d17d0da) C:\Windows\system32\DRIVERS\LHidFilt.Sys
2011/05/21 11:33:57.0717 7976 libusb0 (020dfdb1927c996c990e70ed86cfdb06) C:\Windows\system32\drivers\libusb0.sys
2011/05/21 11:33:57.0781 7976 lltdio (d1c5883087a0c3f1344d9d55a44901f6) C:\Windows\system32\DRIVERS\lltdio.sys
2011/05/21 11:33:57.0917 7976 LMouFilt (8fe0008e183ff0293a925b78a5581c5f) C:\Windows\system32\DRIVERS\LMouFilt.Sys
2011/05/21 11:33:57.0996 7976 LSI_FC (a2262fb9f28935e862b4db46438c80d2) C:\Windows\system32\drivers\lsi_fc.sys
2011/05/21 11:33:58.0094 7976 LSI_SAS (30d73327d390f72a62f32c103daf1d6d) C:\Windows\system32\drivers\lsi_sas.sys
2011/05/21 11:33:58.0182 7976 LSI_SCSI (e1e36fefd45849a95f1ab81de0159fe3) C:\Windows\system32\drivers\lsi_scsi.sys
2011/05/21 11:33:58.0319 7976 luafv (8f5c7426567798e62a3b3614965d62cc) C:\Windows\system32\drivers\luafv.sys
2011/05/21 11:33:58.0412 7976 LUsbFilt (0dec219cb6efcbc872f88f9aec320ea6) C:\Windows\system32\Drivers\LUsbFilt.Sys
2011/05/21 11:33:58.0496 7976 ManyCam (c6d085c7045200143528136a43a65fde) C:\Windows\system32\DRIVERS\ManyCam.sys
2011/05/21 11:33:58.0606 7976 megasas (d153b14fc6598eae8422a2037553adce) C:\Windows\system32\drivers\megasas.sys
2011/05/21 11:33:58.0799 7976 Modem (e13b5ea0f51ba5b1512ec671393d09ba) C:\Windows\system32\drivers\modem.sys
2011/05/21 11:33:58.0867 7976 monitor (0a9bb33b56e294f686abb7c1e4e2d8a8) C:\Windows\system32\DRIVERS\monitor.sys
2011/05/21 11:33:58.0962 7976 MotioninJoyXFilter (ec47036e1eddaa81e879d801f66cce67) C:\Windows\system32\DRIVERS\MijXfilt.sys
2011/05/21 11:33:59.0033 7976 mouclass (5bf6a1326a335c5298477754a506d263) C:\Windows\system32\DRIVERS\mouclass.sys
2011/05/21 11:33:59.0095 7976 mouhid (93b8d4869e12cfbe663915502900876f) C:\Windows\system32\DRIVERS\mouhid.sys
2011/05/21 11:33:59.0214 7976 MountMgr (bdafc88aa6b92f7842416ea6a48e1600) C:\Windows\system32\drivers\mountmgr.sys
2011/05/21 11:33:59.0322 7976 mpio (583a41f26278d9e0ea548163d6139397) C:\Windows\system32\drivers\mpio.sys
2011/05/21 11:33:59.0384 7976 mpsdrv (22241feba9b2defa669c8cb0a8dd7d2e) C:\Windows\system32\drivers\mpsdrv.sys
2011/05/21 11:33:59.0459 7976 Mraid35x (4fbbb70d30fd20ec51f80061703b001e) C:\Windows\system32\drivers\mraid35x.sys
2011/05/21 11:33:59.0533 7976 MRxDAV (82cea0395524aacfeb58ba1448e8325c) C:\Windows\system32\drivers\mrxdav.sys
2011/05/21 11:33:59.0623 7976 mrxsmb (454341e652bdf5e01b0f2140232b073e) C:\Windows\system32\DRIVERS\mrxsmb.sys
2011/05/21 11:33:59.0686 7976 mrxsmb10 (2a4901aff069944fa945ed5bbf4dcde3) C:\Windows\system32\DRIVERS\mrxsmb10.sys
2011/05/21 11:33:59.0749 7976 mrxsmb20 (28b3f1ab44bdd4432c041581412f17d9) C:\Windows\system32\DRIVERS\mrxsmb20.sys
2011/05/21 11:33:59.0828 7976 msahci (742aed7939e734c36b7e8d6228ce26b7) C:\Windows\system32\drivers\msahci.sys
2011/05/21 11:33:59.0885 7976 msdsm (3fc82a2ae4cc149165a94699183d3028) C:\Windows\system32\drivers\msdsm.sys
2011/05/21 11:34:00.0018 7976 Msfs (a9927f4a46b816c92f461acb90cf8515) C:\Windows\system32\drivers\Msfs.sys
2011/05/21 11:34:00.0071 7976 msisadrv (0f400e306f385c56317357d6dea56f62) C:\Windows\system32\drivers\msisadrv.sys
2011/05/21 11:34:00.0184 7976 MSKSSRV (d8c63d34d9c9e56c059e24ec7185cc07) C:\Windows\system32\drivers\MSKSSRV.sys
2011/05/21 11:34:00.0319 7976 MSPCLOCK (1d373c90d62ddb641d50e55b9e78d65e) C:\Windows\system32\drivers\MSPCLOCK.sys
2011/05/21 11:34:00.0447 7976 MSPQM (b572da05bf4e098d4bba3a4734fb505b) C:\Windows\system32\drivers\MSPQM.sys
2011/05/21 11:34:00.0653 7976 MsRPC (b49456d70555de905c311bcda6ec6adb) C:\Windows\system32\drivers\MsRPC.sys
2011/05/21 11:34:00.0751 7976 mssmbios (e384487cb84be41d09711c30ca79646c) C:\Windows\system32\DRIVERS\mssmbios.sys
2011/05/21 11:34:00.0893 7976 MSTEE (7199c1eec1e4993caf96b8c0a26bd58a) C:\Windows\system32\drivers\MSTEE.sys
2011/05/21 11:34:00.0954 7976 Mup (6a57b5733d4cb702c8ea4542e836b96c) C:\Windows\system32\Drivers\mup.sys
2011/05/21 11:34:01.0080 7976 NativeWifiP (85c44fdff9cf7e72a40dcb7ec06a4416) C:\Windows\system32\DRIVERS\nwifi.sys
2011/05/21 11:34:01.0191 7976 NDIS (1357274d1883f68300aeadd15d7bbb42) C:\Windows\system32\drivers\ndis.sys
2011/05/21 11:34:01.0299 7976 NdisTapi (0e186e90404980569fb449ba7519ae61) C:\Windows\system32\DRIVERS\ndistapi.sys
2011/05/21 11:34:01.0369 7976 Ndisuio (d6973aa34c4d5d76c0430b181c3cd389) C:\Windows\system32\DRIVERS\ndisuio.sys
2011/05/21 11:34:01.0425 7976 NdisWan (818f648618ae34f729fdb47ec68345c3) C:\Windows\system32\DRIVERS\ndiswan.sys
2011/05/21 11:34:01.0488 7976 NDProxy (71dab552b41936358f3b541ae5997fb3) C:\Windows\system32\drivers\NDProxy.sys
2011/05/21 11:34:01.0571 7976 NetBIOS (bcd093a5a6777cf626434568dc7dba78) C:\Windows\system32\DRIVERS\netbios.sys
2011/05/21 11:34:01.0645 7976 netbt (ecd64230a59cbd93c85f1cd1cab9f3f6) C:\Windows\system32\DRIVERS\netbt.sys
2011/05/21 11:34:01.0790 7976 nfrd960 (2e7fb731d4790a1bc6270accefacb36e) C:\Windows\system32\drivers\nfrd960.sys
2011/05/21 11:34:01.0888 7976 Npfs (d36f239d7cce1931598e8fb90a0dbc26) C:\Windows\system32\drivers\Npfs.sys
2011/05/21 11:34:02.0136 7976 nsiproxy (609773e344a97410ce4ebf74a8914fcf) C:\Windows\system32\drivers\nsiproxy.sys
2011/05/21 11:34:02.0264 7976 Ntfs (6a4a98cee84cf9e99564510dda4baa47) C:\Windows\system32\drivers\Ntfs.sys
2011/05/21 11:34:02.0356 7976 ntrigdigi (e875c093aec0c978a90f30c9e0dfbb72) C:\Windows\system32\drivers\ntrigdigi.sys
2011/05/21 11:34:02.0418 7976 Null (c5dbbcda07d780bda9b685df333bb41e) C:\Windows\system32\drivers\Null.sys
2011/05/21 11:34:02.0486 7976 nvraid (e69e946f80c1c31c53003bfbf50cbb7c) C:\Windows\system32\drivers\nvraid.sys
2011/05/21 11:34:02.0543 7976 nvstor (9e0ba19a28c498a6d323d065db76dffc) C:\Windows\system32\drivers\nvstor.sys
2011/05/21 11:34:02.0652 7976 nv_agp (07c186427eb8fcc3d8d7927187f260f7) C:\Windows\system32\drivers\nv_agp.sys
2011/05/21 11:34:02.0872 7976 ohci1394 (6f310e890d46e246e0e261a63d9b36b4) C:\Windows\system32\DRIVERS\ohci1394.sys
2011/05/21 11:34:02.0999 7976 Parport (8a79fdf04a73428597e2caf9d0d67850) C:\Windows\system32\DRIVERS\parport.sys
2011/05/21 11:34:03.0058 7976 partmgr (57389fa59a36d96b3eb09d0cb91e9cdc) C:\Windows\system32\drivers\partmgr.sys
2011/05/21 11:34:03.0128 7976 Parvdm (6c580025c81caf3ae9e3617c22cad00e) C:\Windows\system32\DRIVERS\parvdm.sys
2011/05/21 11:34:03.0254 7976 pbfilter (2f6e885c432927a186c2e352c8a1cbf4) C:\Program Files\peerblock\pbfilter.sys
2011/05/21 11:34:03.0390 7976 pci (941dc1d19e7e8620f40bbc206981efdb) C:\Windows\system32\drivers\pci.sys
2011/05/21 11:34:03.0466 7976 pciide (1636d43f10416aeb483bc6001097b26c) C:\Windows\system32\drivers\pciide.sys
2011/05/21 11:34:03.0543 7976 pcmcia (e6f3fb1b86aa519e7698ad05e58b04e5) C:\Windows\system32\drivers\pcmcia.sys
2011/05/21 11:34:03.0670 7976 PEAUTH (6349f6ed9c623b44b52ea3c63c831a92) C:\Windows\system32\drivers\peauth.sys
2011/05/21 11:34:03.0975 7976 PPJoyBus (89045b00bd36cfe3910e3cb6762c2db0) C:\Windows\system32\drivers\PPJoyBus.sys
2011/05/21 11:34:04.0074 7976 PPortJoystick (f1228587245ad1db17f918d518d85bc1) C:\Windows\system32\drivers\PPortJoy.sys
2011/05/21 11:34:04.0148 7976 PptpMiniport (ecfffaec0c1ecd8dbc77f39070ea1db1) C:\Windows\system32\DRIVERS\raspptp.sys
2011/05/21 11:34:04.0232 7976 Processor (0e3cef5d28b40cf273281d620c50700a) C:\Windows\system32\drivers\processr.sys
2011/05/21 11:34:04.0355 7976 PSched (99514faa8df93d34b5589187db3aa0ba) C:\Windows\system32\DRIVERS\pacer.sys
2011/05/21 11:34:04.0463 7976 qcusbser (59b96dbe2acb872cc1c9f4c14dbb7690) C:\Windows\system32\DRIVERS\qcusbser.sys
2011/05/21 11:34:04.0581 7976 ql2300 (ccdac889326317792480c0a67156a1ec) C:\Windows\system32\drivers\ql2300.sys
2011/05/21 11:34:04.0711 7976 ql40xx (81a7e5c076e59995d54bc1ed3a16e60b) C:\Windows\system32\drivers\ql40xx.sys
2011/05/21 11:34:04.0795 7976 QWAVEdrv (9f5e0e1926014d17486901c88eca2db7) C:\Windows\system32\drivers\qwavedrv.sys
2011/05/21 11:34:05.0014 7976 R300 (a23efb72057fed7128eb558866055fdf) C:\Windows\system32\DRIVERS\atikmdag.sys
2011/05/21 11:34:05.0158 7976 RasAcd (147d7f9c556d259924351feb0de606c3) C:\Windows\system32\DRIVERS\rasacd.sys
2011/05/21 11:34:05.0260 7976 Rasl2tp (a214adbaf4cb47dd2728859ef31f26b0) C:\Windows\system32\DRIVERS\rasl2tp.sys
2011/05/21 11:34:05.0349 7976 RasPppoe (509a98dd18af4375e1fc40bc175f1def) C:\Windows\system32\DRIVERS\raspppoe.sys
2011/05/21 11:34:05.0432 7976 RasSstp (2005f4a1e05fa09389ac85840f0a9e4d) C:\Windows\system32\DRIVERS\rassstp.sys
2011/05/21 11:34:05.0511 7976 rdbss (b14c9d5b9add2f84f70570bbbfaa7935) C:\Windows\system32\DRIVERS\rdbss.sys
2011/05/21 11:34:05.0608 7976 RDPCDD (89e59be9a564262a3fb6c4f4f1cd9899) C:\Windows\system32\DRIVERS\RDPCDD.sys
2011/05/21 11:34:05.0694 7976 rdpdr (e8bd98d46f2ed77132ba927fccb47d8b) C:\Windows\system32\drivers\rdpdr.sys
2011/05/21 11:34:05.0793 7976 RDPENCDD (9d91fe5286f748862ecffa05f8a0710c) C:\Windows\system32\drivers\rdpencdd.sys
2011/05/21 11:34:05.0883 7976 RDPWD (30bfbdfb7f95559ede971f9ddb9a00ba) C:\Windows\system32\drivers\RDPWD.sys
2011/05/21 11:34:06.0045 7976 rspndr (9c508f4074a39e8b4b31d27198146fad) C:\Windows\system32\DRIVERS\rspndr.sys
2011/05/21 11:34:06.0138 7976 RT25USBAP (9c377dbf9d2d19098db935dc1e8361a3) C:\Windows\system32\DRIVERS\rt25usbap.sys
2011/05/21 11:34:06.0224 7976 sbp2port (3ce8f073a557e172b330109436984e30) C:\Windows\system32\drivers\sbp2port.sys
2011/05/21 11:34:06.0339 7976 SCDEmu (20b2751cd4c8f3fd989739ca661b9f30) C:\Windows\system32\drivers\SCDEmu.sys
2011/05/21 11:34:06.0478 7976 SCREAMINGBDRIVER (a643d6df1b7546256b11fb5d6b5d1375) C:\Windows\system32\drivers\ScreamingBAudio.sys
2011/05/21 11:34:06.0552 7976 secdrv (90a3935d05b494a5a39d37e71f09a677) C:\Windows\system32\drivers\secdrv.sys
2011/05/21 11:34:06.0649 7976 Serenum (ce9ec966638ef0b10b864ddedf62a099) C:\Windows\system32\DRIVERS\serenum.sys
2011/05/21 11:34:06.0752 7976 Serial (6d663022db3e7058907784ae14b69898) C:\Windows\system32\DRIVERS\serial.sys
2011/05/21 11:34:06.0877 7976 sermouse (8af3d28a879bf75db53a0ee7a4289624) C:\Windows\system32\drivers\sermouse.sys
2011/05/21 11:34:07.0044 7976 sffdisk (103b79418da647736ee95645f305f68a) C:\Windows\system32\drivers\sffdisk.sys
2011/05/21 11:34:07.0114 7976 sffp_mmc (8fd08a310645fe872eeec6e08c6bf3ee) C:\Windows\system32\drivers\sffp_mmc.sys
2011/05/21 11:34:07.0186 7976 sffp_sd (9cfa05fcfcb7124e69cfc812b72f9614) C:\Windows\system32\drivers\sffp_sd.sys
2011/05/21 11:34:07.0246 7976 sfloppy (46ed8e91793b2e6f848015445a0ac188) C:\Windows\system32\drivers\sfloppy.sys
2011/05/21 11:34:07.0398 7976 sisagp (d2a595d6eebeeaf4334f8e50efbc9931) C:\Windows\system32\drivers\sisagp.sys
2011/05/21 11:34:07.0459 7976 SiSRaid2 (cedd6f4e7d84e9f98b34b3fe988373aa) C:\Windows\system32\drivers\sisraid2.sys
2011/05/21 11:34:07.0516 7976 SiSRaid4 (df843c528c4f69d12ce41ce462e973a7) C:\Windows\system32\drivers\sisraid4.sys
2011/05/21 11:34:07.0616 7976 Smb (7b75299a4d201d6a6533603d6914ab04) C:\Windows\system32\DRIVERS\smb.sys
2011/05/21 11:34:07.0773 7976 spldr (7aebdeef071fe28b0eef2cdd69102bff) C:\Windows\system32\drivers\spldr.sys
2011/05/21 11:34:07.0891 7976 sptd (71e276f6d189413266ea22171806597b) C:\Windows\System32\Drivers\sptd.sys
2011/05/21 11:34:07.0984 7976 srv (ff3cbc13db84d81f56931bc922cc37c4) C:\Windows\system32\DRIVERS\srv.sys
2011/05/21 11:34:08.0075 7976 srv2 (d15959d9f69f0d39a0153e9c244f20dd) C:\Windows\system32\DRIVERS\srv2.sys
2011/05/21 11:34:08.0146 7976 srvnet (faa0d553a49e85008c6bb3781987c574) C:\Windows\system32\DRIVERS\srvnet.sys
2011/05/21 11:34:08.0278 7976 swenum (7ba58ecf0c0a9a69d44b3dca62becf56) C:\Windows\system32\DRIVERS\swenum.sys
2011/05/21 11:34:08.0388 7976 Symc8xx (192aa3ac01df071b541094f251deed10) C:\Windows\system32\drivers\symc8xx.sys
2011/05/21 11:34:08.0514 7976 Sym_hi (8c8eb8c76736ebaf3b13b633b2e64125) C:\Windows\system32\drivers\sym_hi.sys
2011/05/21 11:34:08.0634 7976 Sym_u3 (8072af52b5fd103bbba387a1e49f62cb) C:\Windows\system32\drivers\sym_u3.sys
2011/05/21 11:34:08.0852 7976 Tcpip (a474879afa4a596b3a531f3e69730dbf) C:\Windows\system32\drivers\tcpip.sys
2011/05/21 11:34:08.0957 7976 Tcpip6 (a474879afa4a596b3a531f3e69730dbf) C:\Windows\system32\DRIVERS\tcpip.sys
2011/05/21 11:34:09.0025 7976 tcpipreg (608c345a255d82a6289c2d468eb41fd7) C:\Windows\system32\drivers\tcpipreg.sys
2011/05/21 11:34:09.0104 7976 TDPIPE (5dcf5e267be67a1ae926f2df77fbcc56) C:\Windows\system32\drivers\tdpipe.sys
2011/05/21 11:34:09.0168 7976 TDTCP (389c63e32b3cefed425b61ed92d3f021) C:\Windows\system32\drivers\tdtcp.sys
2011/05/21 11:34:09.0248 7976 tdx (76b06eb8a01fc8624d699e7045303e54) C:\Windows\system32\DRIVERS\tdx.sys
2011/05/21 11:34:09.0325 7976 TermDD (3cad38910468eab9a6479e2f01db43c7) C:\Windows\system32\DRIVERS\termdd.sys
2011/05/21 11:34:09.0764 7976 tssecsrv (dcf0f056a2e4f52287264f5ab29cf206) C:\Windows\system32\DRIVERS\tssecsrv.sys
2011/05/21 11:34:09.0860 7976 tunmp (caecc0120ac49e3d2f758b9169872d38) C:\Windows\system32\DRIVERS\tunmp.sys
2011/05/21 11:34:09.0928 7976 tunnel (300db877ac094feab0be7688c3454a9c) C:\Windows\system32\DRIVERS\tunnel.sys
2011/05/21 11:34:10.0023 7976 uagp35 (c3ade15414120033a36c0f293d4a4121) C:\Windows\system32\drivers\uagp35.sys
2011/05/21 11:34:10.0119 7976 udfs (d9728af68c4c7693cb100b8441cbdec6) C:\Windows\system32\DRIVERS\udfs.sys
2011/05/21 11:34:10.0243 7976 uliagpkx (75e6890ebfce0841d3291b02e7a8bdb0) C:\Windows\system32\drivers\uliagpkx.sys
2011/05/21 11:34:10.0317 7976 uliahci (3cd4ea35a6221b85dcc25daa46313f8d) C:\Windows\system32\drivers\uliahci.sys
2011/05/21 11:34:10.0421 7976 UlSata (8514d0e5cd0534467c5fc61be94a569f) C:\Windows\system32\drivers\ulsata.sys
2011/05/21 11:34:10.0509 7976 ulsata2 (38c3c6e62b157a6bc46594fada45c62b) C:\Windows\system32\drivers\ulsata2.sys
2011/05/21 11:34:10.0579 7976 umbus (32cff9f809ae9aed85464492bf3e32d2) C:\Windows\system32\DRIVERS\umbus.sys
2011/05/21 11:34:10.0738 7976 USBAAPL (026f7f224f088ee11e383bca448fff81) C:\Windows\system32\Drivers\usbaapl.sys
2011/05/21 11:34:10.0837 7976 usbaudio (32db9517628ff0d070682aab61e688f0) C:\Windows\system32\drivers\usbaudio.sys
2011/05/21 11:34:10.0921 7976 usbccgp (caf811ae4c147ffcd5b51750c7f09142) C:\Windows\system32\DRIVERS\usbccgp.sys
2011/05/21 11:34:10.0999 7976 usbcir (e9476e6c486e76bc4898074768fb7131) C:\Windows\system32\drivers\usbcir.sys
2011/05/21 11:34:11.0085 7976 usbehci (79e96c23a97ce7b8f14d310da2db0c9b) C:\Windows\system32\DRIVERS\usbehci.sys
2011/05/21 11:34:11.0179 7976 usbhub (4673bbcb006af60e7abddbe7a130ba42) C:\Windows\system32\DRIVERS\usbhub.sys
2011/05/21 11:34:11.0239 7976 usbohci (38dbc7dd6cc5a72011f187425384388b) C:\Windows\system32\drivers\usbohci.sys
2011/05/21 11:34:11.0331 7976 usbprint (e75c4b5269091d15a2e7dc0b6d35f2f5) C:\Windows\system32\DRIVERS\usbprint.sys
2011/05/21 11:34:11.0415 7976 USBSTOR (be3da31c191bc222d9ad503c5224f2ad) C:\Windows\system32\DRIVERS\USBSTOR.SYS
2011/05/21 11:34:11.0504 7976 usbuhci (814d653efc4d48be3b04a307eceff56f) C:\Windows\system32\DRIVERS\usbuhci.sys
2011/05/21 11:34:11.0685 7976 vga (7d92be0028ecdedec74617009084b5ef) C:\Windows\system32\DRIVERS\vgapnp.sys
2011/05/21 11:34:11.0758 7976 VgaSave (2e93ac0a1d8c79d019db6c51f036636c) C:\Windows\System32\drivers\vga.sys
2011/05/21 11:34:11.0831 7976 viaagp (045d9961e591cf0674a920b6ba3ba5cb) C:\Windows\system32\drivers\viaagp.sys
2011/05/21 11:34:11.0888 7976 ViaC7 (56a4de5f02f2e88182b0981119b4dd98) C:\Windows\system32\drivers\viac7.sys
2011/05/21 11:34:12.0046 7976 viaide (fd2e3175fcada350c7ab4521dca187ec) C:\Windows\system32\drivers\viaide.sys
2011/05/21 11:34:12.0125 7976 volmgr (69503668ac66c77c6cd7af86fbdf8c43) C:\Windows\system32\drivers\volmgr.sys
2011/05/21 11:34:12.0247 7976 volmgrx (23e41b834759917bfd6b9a0d625d0c28) C:\Windows\system32\drivers\volmgrx.sys
2011/05/21 11:34:12.0388 7976 volsnap (147281c01fcb1df9252de2a10d5e7093) C:\Windows\system32\drivers\volsnap.sys
2011/05/21 11:34:12.0486 7976 vsmraid (d984439746d42b30fc65a4c3546c6829) C:\Windows\system32\drivers\vsmraid.sys
2011/05/21 11:34:12.0637 7976 WacomPen (48dfee8f1af7c8235d4e626f0c4fe031) C:\Windows\system32\drivers\wacompen.sys
2011/05/21 11:34:12.0702 7976 Wanarp (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
2011/05/21 11:34:12.0768 7976 Wanarpv6 (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
2011/05/21 11:34:12.0894 7976 Wd (afc5ad65b991c1e205cf25cfdbf7a6f4) C:\Windows\system32\drivers\wd.sys
2011/05/21 11:34:12.0976 7976 WDC_SAM (d6efaf429fd30c5df613d220e344cce7) C:\Windows\system32\DRIVERS\wdcsam.sys
2011/05/21 11:34:13.0125 7976 Wdf01000 (9950e3d0f08141c7e89e64456ae7dc73) C:\Windows\system32\drivers\Wdf01000.sys
2011/05/21 11:34:13.0573 7976 WmiAcpi (701a9f884a294327e9141d73746ee279) C:\Windows\system32\drivers\wmiacpi.sys
2011/05/21 11:34:13.0776 7976 WpdUsb (de9d36f91a4df3d911626643debf11ea) C:\Windows\system32\DRIVERS\wpdusb.sys
2011/05/21 11:34:13.0889 7976 ws2ifsl (e3a3cb253c0ec2494d4a61f5e43a389c) C:\Windows\system32\drivers\ws2ifsl.sys
2011/05/21 11:34:14.0042 7976 WUDFRd (ac13cb789d93412106b0fb6c7eb2bcb6) C:\Windows\system32\DRIVERS\WUDFRd.sys
2011/05/21 11:34:14.0163 7976 xusb21 (ee9144207ee0211eb5656ba6808ac4a0) C:\Windows\system32\DRIVERS\xusb21.sys
2011/05/21 11:34:14.0259 7976 \HardDisk1 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/05/21 11:34:14.0681 7976 ================================================================================
2011/05/21 11:34:14.0681 7976 Scan finished
2011/05/21 11:34:14.0681 7976 ================================================================================
2011/05/21 11:34:14.0730 6420 Detected object count: 1
2011/05/21 11:34:34.0541 6420 \HardDisk1 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/05/21 11:34:34.0542 6420 \HardDisk1 - ok
2011/05/21 11:34:34.0561 6420 Rootkit.Win32.TDSS.tdl4(\HardDisk1) - User select action: Cure
2011/05/21 11:35:29.0326 6264 Deinitialize success


also discovered a new issue concerning windows update saying that it cannot check for updates

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 21 May 2011 - 12:07 PM

Scan with exeHelper:

Please download exeHelper to your desktop.

  • Double-click on exeHelper.com to run the fix.
  • A black window should pop up, press any key to close once the fix is completed.
  • Post the contents of exehelperlog.txt (Will be created in the directory where you ran exeHelper.com, and should open at the end of the scan)

Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).




I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

KillAll::


File::
c:\users\Beku\AppData\Local\Yluxuqecuzoz.bin

Folder::
c:\users\Beku\AppData\Local\{3A046776-28B0-4A88-B871-55740302EFC8}
c:\users\Beku\AppData\Local\{4DAF45B7-89E3-4CB7-BAE1-D01F20A2E0BA}
C:\users\Beku\AppData\Local\{501D3D8E-A440-4B1F-B3BE-7AD7E800C135}
c:\users\Beku\AppData\Local\{471DE39A-673A-4F08-BB07-A2EEC87C7757}
c:\users\Beku\AppData\Local\{CC5B1E7C-1B9C-4796-9FA6-C8771FFDFC7D}
c:\users\Beku\AppData\Local\{5FA5DDE2-0E11-4F38-954B-2C68F0B644E6}
c:\users\Beku\AppData\Local\{19D7CF5A-1F27-41AD-B4B1-2583405290D3}
c:\users\Beku\AppData\Local\{8E7F8405-22F1-4D0E-89AA-AEBA8EA68CF9}
c:\users\Beku\AppData\Local\{7941AC1E-55EE-44C5-BCC2-6C3E07BD0103}
c:\users\Beku\AppData\Local\{CAFECCD8-A8B8-49F4-9DDB-F23B5A0744AF}
c:\users\Beku\AppData\Local\{AFD6A145-8534-44A3-9E7E-983652C6B182}
c:\users\Beku\AppData\Local\{9DA855A0-FB4C-44ED-93B6-D76F59DD70C6}
c:\users\Beku\AppData\Local\{112360C8-DB31-4F7B-AE06-86BA02D82F3C}
c:\users\Beku\AppData\Local\{B988C456-5BDB-4D80-893A-E9DAE88FCBA5}
c:\users\Beku\AppData\Local\{2A369E43-6E62-4837-BDCD-1963EB230FF1}
c:\users\Beku\AppData\Local\{CC00352F-55EB-42A3-A779-82D6441375EF}
c:\users\Beku\AppData\Local\{6EE49A78-7552-4BBC-B400-0F0128722FAB}
c:\users\Beku\AppData\Local\{95898F23-D1D0-45DD-B5DA-83B10FFE8917}
c:\users\Beku\AppData\Local\{1AFE9EAF-1CEB-440D-9892-494E0E2316FB}
c:\users\Beku\AppData\Local\{53D2C9F5-E733-42E5-878D-C3AED9AB690D}
c:\users\Beku\AppData\Local\{870B0064-CAF3-4477-A4D8-B7AECFF428A9}
c:\users\Beku\AppData\Local\{7DC5947A-716D-4455-B791-DD0A9D800DFC}
c:\users\Beku\AppData\Local\{CC6494FA-C710-4D30-A3FE-57D1ADC6924A}
c:\users\Beku\AppData\Local\{A5663F90-5F85-48E0-A02B-D5DA0E17EB44}
c:\users\Beku\AppData\Local\{2F42736D-4031-4E14-BB43-42CF11E04021}
c:\users\Beku\AppData\Local\{9E1CC630-51F9-46E1-92AE-158653FD8E09}
c:\users\Beku\AppData\Local\{46E7B300-6E32-45F8-B3D4-310CAA53253E}
c:\users\Beku\AppData\Local\{768B3168-7629-4A15-A67A-7FAEA3D5DD0C}
c:\users\Beku\AppData\Local\{142CE3B2-5243-483A-BD30-2D56E71C5084}
c:\users\Beku\AppData\Local\{197B7210-596C-4021-B1AB-2E3B0B16B6FE}
c:\users\Beku\AppData\Local\{04DC1D39-787F-4C19-9AEF-B1F16F1AEE2A}
c:\users\Beku\AppData\Local\{7C449354-23F9-4C61-8374-ACA48E82CE34}
c:\users\Beku\AppData\Local\{154B610A-54B9-4303-8474-282BCDC542EC}
c:\users\Beku\AppData\Local\{40F92F79-C586-4A39-83D1-2E04EDA676B0}
c:\users\Beku\AppData\Local\{EEFC8E92-AD8B-47CC-99EE-54F8EC29650F}
c:\users\Beku\AppData\Local\{1239C9BC-6149-4D5F-9C39-6B4EA014D8EC}
c:\users\Beku\AppData\Local\{689648A0-D4A8-4712-AA1C-498ACCC48EDA}
c:\users\Beku\AppData\Local\{42A642ED-849E-48FA-9F3B-D2B259AB49AC}
c:\users\Beku\AppData\Local\{0C24E723-69B6-427F-90C8-97FD1C33305E}
c:\users\Beku\AppData\Local\{A5E7691C-77E0-4A17-98B1-629EE736EC64}
c:\users\Beku\AppData\Local\{F3C9BAEA-2E64-4766-92AE-E9CD6096F19B}
c:\users\Beku\AppData\Local\{3ED2ED7A-4EF2-48A3-9A96-05F28083D2B7}
c:\users\Beku\AppData\Local\{99C862F3-13CB-4E31-A703-F12440738081}
c:\users\Beku\AppData\Local\{65190C51-845F-4B07-92B2-8165437102C9}
c:\users\Beku\AppData\Local\{A6102038-6008-4453-BAB2-C63B338C6899}
c:\users\Beku\AppData\Local\{0ABBF5A3-3C0C-4C97-BCA9-B86F8DFE21E9}
c:\users\Beku\AppData\Local\{BAA7B93C-25F9-41F9-9BB3-4D4E5C3E7424}
c:\users\Beku\AppData\Local\{493116C0-E3CC-42A8-A534-C6E2BCAE2DC4}
c:\users\Beku\AppData\Local\{872E48C1-8127-453F-BA42-3006856E9CA5}


Driver::
libusb0


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 22 May 2011 - 12:55 AM

ComboFix 11-05-21.03 - Beku 21/05/2011 22:28:29.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.2.1033.18.2046.1072 [GMT -4:00]
Running from: c:\users\Beku\Desktop\ComboFix.exe
Command switches used :: c:\users\Beku\Desktop\CFScript.txt
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\users\Beku\AppData\Local\Yluxuqecuzoz.bin"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Beku\AppData\Local\{04DC1D39-787F-4C19-9AEF-B1F16F1AEE2A}
c:\users\Beku\AppData\Local\{0ABBF5A3-3C0C-4C97-BCA9-B86F8DFE21E9}
c:\users\Beku\AppData\Local\{0C24E723-69B6-427F-90C8-97FD1C33305E}
c:\users\Beku\AppData\Local\{112360C8-DB31-4F7B-AE06-86BA02D82F3C}
c:\users\Beku\AppData\Local\{1239C9BC-6149-4D5F-9C39-6B4EA014D8EC}
c:\users\Beku\AppData\Local\{142CE3B2-5243-483A-BD30-2D56E71C5084}
c:\users\Beku\AppData\Local\{154B610A-54B9-4303-8474-282BCDC542EC}
c:\users\Beku\AppData\Local\{197B7210-596C-4021-B1AB-2E3B0B16B6FE}
c:\users\Beku\AppData\Local\{19D7CF5A-1F27-41AD-B4B1-2583405290D3}
c:\users\Beku\AppData\Local\{1AFE9EAF-1CEB-440D-9892-494E0E2316FB}
c:\users\Beku\AppData\Local\{2A369E43-6E62-4837-BDCD-1963EB230FF1}
c:\users\Beku\AppData\Local\{2F42736D-4031-4E14-BB43-42CF11E04021}
c:\users\Beku\AppData\Local\{3A046776-28B0-4A88-B871-55740302EFC8}
c:\users\Beku\AppData\Local\{3ED2ED7A-4EF2-48A3-9A96-05F28083D2B7}
c:\users\Beku\AppData\Local\{40F92F79-C586-4A39-83D1-2E04EDA676B0}
c:\users\Beku\AppData\Local\{42A642ED-849E-48FA-9F3B-D2B259AB49AC}
c:\users\Beku\AppData\Local\{46E7B300-6E32-45F8-B3D4-310CAA53253E}
c:\users\Beku\AppData\Local\{471DE39A-673A-4F08-BB07-A2EEC87C7757}
c:\users\Beku\AppData\Local\{493116C0-E3CC-42A8-A534-C6E2BCAE2DC4}
c:\users\Beku\AppData\Local\{4DAF45B7-89E3-4CB7-BAE1-D01F20A2E0BA}
c:\users\Beku\AppData\Local\{501D3D8E-A440-4B1F-B3BE-7AD7E800C135}
c:\users\Beku\AppData\Local\{53D2C9F5-E733-42E5-878D-C3AED9AB690D}
c:\users\Beku\AppData\Local\{5FA5DDE2-0E11-4F38-954B-2C68F0B644E6}
c:\users\Beku\AppData\Local\{65190C51-845F-4B07-92B2-8165437102C9}
c:\users\Beku\AppData\Local\{689648A0-D4A8-4712-AA1C-498ACCC48EDA}
c:\users\Beku\AppData\Local\{6EE49A78-7552-4BBC-B400-0F0128722FAB}
c:\users\Beku\AppData\Local\{768B3168-7629-4A15-A67A-7FAEA3D5DD0C}
c:\users\Beku\AppData\Local\{7941AC1E-55EE-44C5-BCC2-6C3E07BD0103}
c:\users\Beku\AppData\Local\{7C449354-23F9-4C61-8374-ACA48E82CE34}
c:\users\Beku\AppData\Local\{7DC5947A-716D-4455-B791-DD0A9D800DFC}
c:\users\Beku\AppData\Local\{870B0064-CAF3-4477-A4D8-B7AECFF428A9}
c:\users\Beku\AppData\Local\{872E48C1-8127-453F-BA42-3006856E9CA5}
c:\users\Beku\AppData\Local\{8E7F8405-22F1-4D0E-89AA-AEBA8EA68CF9}
c:\users\Beku\AppData\Local\{95898F23-D1D0-45DD-B5DA-83B10FFE8917}
c:\users\Beku\AppData\Local\{99C862F3-13CB-4E31-A703-F12440738081}
c:\users\Beku\AppData\Local\{9DA855A0-FB4C-44ED-93B6-D76F59DD70C6}
c:\users\Beku\AppData\Local\{9E1CC630-51F9-46E1-92AE-158653FD8E09}
c:\users\Beku\AppData\Local\{A5663F90-5F85-48E0-A02B-D5DA0E17EB44}
c:\users\Beku\AppData\Local\{A5E7691C-77E0-4A17-98B1-629EE736EC64}
c:\users\Beku\AppData\Local\{A6102038-6008-4453-BAB2-C63B338C6899}
c:\users\Beku\AppData\Local\{AFD6A145-8534-44A3-9E7E-983652C6B182}
c:\users\Beku\AppData\Local\{B988C456-5BDB-4D80-893A-E9DAE88FCBA5}
c:\users\Beku\AppData\Local\{BAA7B93C-25F9-41F9-9BB3-4D4E5C3E7424}
c:\users\Beku\AppData\Local\{CAFECCD8-A8B8-49F4-9DDB-F23B5A0744AF}
c:\users\Beku\AppData\Local\{CC00352F-55EB-42A3-A779-82D6441375EF}
c:\users\Beku\AppData\Local\{CC5B1E7C-1B9C-4796-9FA6-C8771FFDFC7D}
c:\users\Beku\AppData\Local\{CC6494FA-C710-4D30-A3FE-57D1ADC6924A}
c:\users\Beku\AppData\Local\{EEFC8E92-AD8B-47CC-99EE-54F8EC29650F}
c:\users\Beku\AppData\Local\{F3C9BAEA-2E64-4766-92AE-E9CD6096F19B}
c:\windows\system32\624893730.dat
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_libusb0
.
.
((((((((((((((((((((((((( Files Created from 2011-04-22 to 2011-05-22 )))))))))))))))))))))))))))))))
.
.
2011-05-22 02:45 . 2011-05-22 02:49 -------- d-----w- c:\users\Beku\AppData\Local\temp
2011-05-22 02:45 . 2011-05-22 02:45 -------- d-----w- c:\users\Default\AppData\Local\temp
2011-05-22 02:07 . 2011-05-22 02:07 -------- d-----w- c:\users\Beku\AppData\Local\{3ADD2139-706D-4D00-82A9-1C5043AD30C0}
2011-05-21 15:50 . 2011-03-10 17:03 1162240 ----a-w- c:\windows\system32\mfc42u.dll
2011-05-21 15:50 . 2011-03-10 17:03 1136640 ----a-w- c:\windows\system32\mfc42.dll
2011-05-21 12:09 . 2011-05-21 12:09 -------- d-----w- c:\users\Beku\AppData\Local\{0E15EE08-3FD9-446D-86C6-EEDC04C58946}
2011-05-18 02:47 . 2011-05-21 02:56 -------- d-----w- c:\programdata\PC Tools
2011-05-17 14:44 . 2011-05-17 14:44 388096 ----a-r- c:\users\Beku\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-05-17 14:44 . 2011-05-17 14:44 -------- d-----w- c:\program files\Trend Micro
2011-05-17 06:27 . 2011-05-17 06:28 -------- d-----w- c:\users\Beku\AppData\Local\{A48921E5-F30F-45B5-846F-DD1E348A6E34}
2011-05-16 18:27 . 2011-05-16 18:27 -------- d-----w- c:\users\Beku\AppData\Local\{B3C2E842-7DD4-4928-B693-23C4A281DBAB}
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\users\Beku\AppData\Roaming\Malwarebytes
2011-05-16 16:11 . 2010-12-20 22:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\programdata\Malwarebytes
2011-05-16 16:11 . 2011-05-16 16:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-16 16:11 . 2010-12-20 22:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-04 03:01 . 2011-03-15 04:05 6792528 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{8CCD6014-209C-49F1-8C55-586759407663}\mpengine.dll
2011-04-27 18:26 . 2011-04-27 18:26 -------- d-----w- c:\programdata\WindowsSearch
2011-04-22 04:30 . 2011-04-26 07:41 -------- d-----w- c:\programdata\Yahoo!
2011-04-22 04:27 . 2011-04-22 04:30 -------- d-----w- c:\program files\Yahoo!
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-03 15:49 . 2011-04-12 21:11 0 ----a-w- c:\users\Beku\AppData\Local\Yluxuqecuzoz.bin
2011-03-14 08:43 . 2007-03-30 22:01 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
2011-03-11 03:08 . 2010-06-24 16:33 18328 ----a-w- c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
2011-02-26 04:36 . 2010-11-27 10:27 1682 --sha-w- c:\programdata\KGyGaAvL.sys
2011-02-22 14:13 . 2011-03-22 22:48 288768 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2011-02-22 13:33 . 2011-03-22 22:48 1068544 ----a-w- c:\windows\system32\DWrite.dll
2011-02-22 13:33 . 2011-03-22 22:48 797696 ----a-w- c:\windows\system32\FntCache.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"MsnMsgr"="c:\program files\Windows Live\Messenger\MsnMsgr.Exe" [2010-11-10 4240760]
"PeerBlock"="c:\program files\peerblock\peerblock.exe" [2010-11-07 1866864]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-12-27 395640]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-10-10 69632]
"Launch LgDeviceAgent"="c:\program files\Logitech\GamePanel Software\LgDevAgt.exe" [2009-08-13 357384]
"Launch LGDCore"="c:\program files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" [2009-08-13 3161608]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-01-22 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2006-11-02 8704]
.
c:\users\Beku\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
CCC.lnk - c:\program files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe [2006-9-29 49152]
CurseClientStartup.ccip [2011-5-14 0]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
SetPointII.lnk - c:\program files\Logitech\SetPoint II\SetpointII.exe [2008-11-13 323584]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"HideSCAHealth"= 1 (0x1)
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^WDDMStatus.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\WDDMStatus.lnk
backup=c:\windows\pss\WDDMStatus.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^WDSmartWare.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\WDSmartWare.lnk
backup=c:\windows\pss\WDSmartWare.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-06-03 00:50 1144104 ----a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-01-05 20:18 413696 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Sidebar]
2009-04-11 06:28 1233920 ----a-w- c:\program files\Windows Sidebar\sidebar.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-02-18 15:43 248040 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\uTorrent]
2010-12-27 00:09 395640 ----a-w- c:\program files\uTorrent\uTorrent.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinampAgent]
2008-01-15 22:54 37376 ----a-w- c:\program files\Winamp\winampa.exe
.
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [x]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [x]
R2 Bonjourpla;Bonjour Service Bonjourpla;c:\windows\system32\amdpcom32a.exe [2008-01-19 65024]
R2 dualshock3;SIXAXIS/DUALSHOCK3 DX (USB) Beta;c:\windows\system32\DRIVERS\dualshock3.sys [2010-02-16 22912]
R3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\DRIVERS\MijXfilt.sys [2010-07-01 51712]
R3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des [2010-03-21 3532120]
R3 PPJoyBus;Parallel Port Joystick Bus device driver;c:\windows\system32\drivers\PPJoyBus.sys [2004-10-24 13952]
R3 PPortJoystick;Parallel Port Joystick device driver;c:\windows\system32\drivers\PPortJoy.sys [2004-10-24 28800]
R3 qcusbser;ACER Android USB Device for Legacy Serial Communication;c:\windows\system32\DRIVERS\qcusbser.sys [2009-08-14 105984]
R3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [x]
R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam.sys [2009-02-13 11520]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
R4 sptd;sptd;c:\windows\System32\Drivers\sptd.sys [2010-04-02 717296]
S2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe [2008-01-19 21504]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
S2 WDDMService;WD SmartWare Drive Manager;c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe [2010-01-21 110592]
S2 WDSmartWareBackgroundService;WD SmartWare Background Service;c:\program files\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe [2009-06-16 20480]
S3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\DRIVERS\ManyCam.sys [2008-01-14 21632]
S3 pbfilter;pbfilter;c:\program files\peerblock\pbfilter.sys [2010-11-07 20080]
S3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2009-11-26 34384]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
Akamai REG_MULTI_SZ Akamai
.
Contents of the 'Scheduled Tasks' folder
.
2011-05-22 c:\windows\Tasks\User_Feed_Synchronization-{6FF51A12-3098-4D20-8A6A-0A2CE274DC3B}.job
- c:\windows\system32\msfeedssync.exe [2008-05-25 07:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.ca/
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\users\Beku\AppData\Roaming\Mozilla\Firefox\Profiles\r8meblql.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca/
FF - prefs.js: network.proxy.http - 74.15.178.62
FF - prefs.js: network.proxy.type - 1
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: TVU Web Player: firefox@tvunetworks.com - %profile%\extensions\firefox@tvunetworks.com
FF - Ext: vShare: vshare@toolbar - %profile%\extensions\vshare@toolbar
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Skype extension for Firefox: {AB2CE124-6272-4b12-94A9-7303C7397BD1} - c:\program files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
user_pref(security.warn_viewing_mixed,false);
user_pref(security.warn_viewing_mixed.show_once,false);
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
user_pref(security.warn_submit_insecure,false);
FF - user.js: security.warn_submit_insecure.show_once - false
FF - user.js: network.http.accept-encoding -
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-05-21 22:48
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3318982196-3104161032-715442344-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:29,1d,48,f9,46,fb,df,41,83,0d,4e,9d,75,b1,84,91,96,62,ff,25,21,76,ed,
8f,3d,1a,8f,c7,f0,1a,e6,d1,d1,82,b7,6d,f5,65,c6,1c,4b,71,2c,7c,42,2a,66,53,\
"??"=hex:eb,1f,2d,b0,11,61,84,98,d8,d0,2d,fb,cd,d2,c6,97
.
[HKEY_USERS\S-1-5-21-3318982196-3104161032-715442344-1000\Software\SecuROM\License information*]
"datasecu"=hex:a6,b5,27,89,a5,17,87,dd,58,46,0f,78,28,fa,84,58,89,9f,c5,83,f2,
c4,74,f0,c1,02,b9,73,02,27,b8,93,46,3c,6b,d7,c3,0e,55,c7,b2,b5,a1,b7,49,2f,\
"rkeysecu"=hex:7d,80,d4,35,aa,72,d6,e3,bb,26,3f,58,8e,57,ef,c0
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(2060)
c:\program files\Bonjour\mdnsNSP.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\windows\system32\WUDFHost.exe
c:\windows\system32\conime.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
c:\program files\Windows Media Player\wmpnetwk.exe
.
**************************************************************************
.
Completion time: 2011-05-21 22:56:31 - machine was rebooted
ComboFix-quarantined-files.txt 2011-05-22 02:56
ComboFix2.txt 2011-05-21 03:44
.
Pre-Run: 66,557,157,376 bytes free
Post-Run: 66,306,101,248 bytes free
.U
- - End Of File - - 598097BE8082AF32F3B3C3DA25B854F3
exeHelper by Raktor
Build 20100414
Run at 22:18:16 on 05/21/11
Now searching...
Checking for numerical processes...
Checking for sysguard processes...
Checking for bad processes...
Checking for bad files...
Checking for bad registry entries...
Resetting filetype association for .exe
Resetting filetype association for .com
Resetting userinit and shell values...
Resetting policies...
--Finished--

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 22 May 2011 - 02:27 AM

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realise. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.

FBI Cyber Education Letter
File sharing infects 500,000 computers
USAToday
infoworld


These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Lets see if we can fix windows update


please go here Fix Windows Update and click on the Fix It Button



uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 8.2.6
Java™ 6 Update 2
Java™ 6 Update 3
Java™ 6 Update 5
Java™ 6 Update 7
Java™ SE Runtime Environment 6
Java™ SE Runtime Environment 6 Update 1


and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 22 May 2011 - 10:24 AM

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6640

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

22/05/2011 11:02:04 AM
mbam-log-2011-05-22 (11-02-04).txt

Scan type: Quick scan
Objects scanned: 150734
Time elapsed: 5 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Bonjourpla (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Windows\system32\config\systemprofile\AppData\Local\yrq.exe" -a "iexplore.exe) Good: (iexplore.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Windows\System32\amdpcom32a.exe (Spyware.Passwords.XGen) -> Delete on reboot.
c:\Windows\System32\config\systemprofile\local settings\application data\yrq.exe (Malware.Gen) -> Quarantined and deleted successfully.

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 11:09:54 AM, on 22/05/2011
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16421)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files\Logitech\GamePanel Software\LGDevAgt.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\peerblock\peerblock.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\NOTEPAD.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Launch LgDeviceAgent] "C:\Program Files\Logitech\GamePanel Software\LgDevAgt.exe"
O4 - HKLM\..\Run: [Launch LGDCore] "C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" /SHOWHIDE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [PeerBlock] C:\Program Files\peerblock\peerblock.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O4 - Startup: CCC.lnk = ?
O4 - Startup: CurseClientStartup.ccip
O4 - Global Startup: SetPointII.lnk = ?
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {CB50428B-657F-47DF-9B32-671F82AA73F7} - http://www.photodex.com/pxplay.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O16 - DPF: {E6F480FC-BD44-4CBA-B74A-89AF7842937D} (SysInfo Class) - http://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.4.16.0.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O18 - Protocol: vsharechrome - {3F3A4B8A-86FC-43A4-BB00-6D7EBE9D4484} - (no file)
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\Windows\System32\ati2sgag.exe
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
O23 - Service: npkcmsvc - Unknown owner - C:\Nexon\Mabinogi\npkcmsvc.exe (file missing)
O23 - Service: WD SmartWare Drive Manager (WDDMService) - WDC - C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
O23 - Service: WD SmartWare Background Service (WDSmartWareBackgroundService) - Memeo - C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe

--
End of file - 5021 bytes

windows update is working properly now, and svchost doesn't appear to be consuming all my resources any more. when i try to enable Windows Defender via Windows Security Center i get an message that reads "Security Center can't turn on Windows Defender. Please try again later" also when i try to open Windows Defender via Control Panel i receive and error message that reads "Application failed to initialize 0x80070006. The handle is invalid"

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 22 May 2011 - 03:25 PM

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
      O4 - HKLM\..\Run: [Launch LGDCore] "C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" /SHOWHIDE
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKCU\..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
      O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
      O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
      O4 - HKCU\..\Run: [PeerBlock] C:\Program Files\peerblock\peerblock.exe
      O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brakets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Click on copy to clipboard and paste the results here in this topic
  • you may also find here C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 23 May 2011 - 11:13 AM

C:\Qoobox\Quarantine\MBR_HardDisk0.mbr Win32/Olmarik.AJL trojan
C:\Qoobox\Quarantine\C\Users\Beku\AppData\Roaming\225CF0A5F164DB41C55BD7EA720A0859\enemies-names.txt.vir Win32/Adware.AntimalwareDoctor.AE.Gen application

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:23 PM

Posted 23 May 2011 - 01:47 PM

Hello

The Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.


Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


The following procedure will implement some cleanup procedures. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

Any programs and logs that are left over you can just be deleted from the desktop. TFC is a free temp file cleaner that is very easy to use, I would keep this and use before you do any scans or when you want to free up some space.

:DeFogger:

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
Your Emulation drivers are now re-enabled.


:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image


:remove tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.


:Make your Internet Explorer more secure:

  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialise and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.


:Make Firefox more secure:

please visit this page to explain how to make Firefox more secure - How to Secure Firefox


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector


:Turn On Automatic Updates:

Turn On Automatic Updates
1. Click Start, click Run, type sysdm.cpl, and then press ENTER.
2. Click the Automatic Updates tab, and then click to select one of the following options. We recommend that you select the Automatic (recommended) Automatically download recommended updates for my computer and install them

If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your taskbar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.

or visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

:antispyware programs:

I would reccomend the download and installation of some or all of the following programs (all free), and the updating of them regularly:

  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Spyware Blaster - By altering your registry, this program stops harmful sites from installing things like ActiveX Controls on your machines.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often.

Here is some great reading about how to be safer online:

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
and
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Nyunyu

Nyunyu
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:03:23 PM

Posted 24 May 2011 - 09:50 PM

thank you kindly for your time and effort it was of great help to me. the issues seemed to have been resolved although i still have that problem with windows defender not being able to start but i guess i can work around it.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users