Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus, maleware, spyware, and everything else removal


  • This topic is locked This topic is locked
28 replies to this topic

#1 B14CKL15T3D

B14CKL15T3D

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 03:35 PM

My computer keeps redirecting me from google, it's really slow, I keep getting random pop-ups from it just sitting here not doing anything. MBAM doesn't pick up anything, neither does SUPERanti-spyware, or avast!. none of them get anything.

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 05:07 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

I would like to get a better look at your system, please do the following so I can get some more detailed logs.


DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.

Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply




Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".

information and logs:

In your next post I need the following

1.logs from DDS
2.RKUnHooker
3.let me know of any problems you may have had
[/list]
Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 06:48 PM

I didn't have any problems with any of these programs, I didn't even get that warning from RKUnHooker.




.
DDS (Ver_11-05-19.01) - NTFSx86
Internet Explorer: 8.0.7600.16385
Run by slick at 8:29:34 on 2011-05-24
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.3070.2211 [GMT 9:00]
.
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Spyware Doctor *Enabled/Updated* {94076BB2-F3DA-227F-9A1E-F060FF73600F}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Program Files\Creative\Shared Files\CTAudSvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\Dwm.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\taskhost.exe
C:\Program Files\Seagate\DiscWizard\DiscWizardMonitor.exe
C:\Program Files\Seagate\DiscWizard\TimounterMonitor.exe
C:\Program Files\Common Files\Seagate\Schedule2\schedhlp.exe
C:\Program Files\iHome\Keyboard Driver\StartAutorun.exe
C:\Program Files\PowerISO\PWRISOVM.EXE
C:\Windows\System32\spool\drivers\w32x86\3\EKIJ5000MUI.exe
C:\Windows\Pixart\PAP7501\GUCI_AVS.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\System32\StikyNot.exe
C:\Windows\System32\ctfmon.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\iHome\Keyboard Driver\KMConfig.exe
C:\Program Files\iHome\Keyboard Driver\KMProcess.exe
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\iHome\Keyboard Driver\KMWDSrv.exe
C:\Program Files\Kodak\AiO\Center\ekdiscovery.exe
C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\iPod\bin\iPodService.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Users\slick\AppData\Roaming\mjusbsp\magicJack.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
\\?\C:\Windows\system32\wbem\WMIADAP.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\msiexec.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\slick\Desktop\dds.scr
C:\Windows\system32\WSCRIPT.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = about:blank
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Skype Plug-In: {ae805869-2e5c-4ed4-8f7b-f1f7851a4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {DE9C389F-3316-41A7-809B-AA305ED9D922} - No File
TB: {472734EA-242A-422B-ADF8-83D1E48CC825} - No File
uRun: [cdloader] "c:\users\slick\appdata\roaming\mjusbsp\cdloader2.exe" MAGICJACK
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [RESTART_STICKY_NOTES] c:\windows\system32\StikyNot.exe
uRun: [CrazyRemote] c:\program files\crazyremote\CrazyRemote.exe
uRun: [CrazyRemoteCommand] c:\program files\crazyremote\CrazyRemoteCommand.exe
uRun: [ctfmon.exe] "c:\windows\system32\ctfmon.exe"
uRun: [Urucipulukel] rundll32.exe "c:\users\slick\appdata\local\werofhct.dll",Startup
mRun: [DiscWizardMonitor.exe] "c:\program files\seagate\discwizard\DiscWizardMonitor.exe"
mRun: [AcronisTimounterMonitor] "c:\program files\seagate\discwizard\TimounterMonitor.exe"
mRun: [Seagate Scheduler2 Service] "c:\program files\common files\seagate\schedule2\schedhlp.exe"
mRun: [KMCONFIG] "c:\program files\ihome\keyboard driver\StartAutorun.exe" KMConfig.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [PWRISOVM.EXE] "c:\program files\poweriso\PWRISOVM.EXE"
mRun: [Conime] %windir%\system32\conime.exe
mRun: [EKIJ5000StatusMonitor] c:\windows\system32\spool\drivers\w32x86\3\EKIJ5000MUI.exe
mRun: [PAP7501_Monitor] "c:\windows\pixart\pap7501\GUCI_AVS.exe"
mRun: [ArcSoft Connection Service] "c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [AdobeAAMUpdater-1.0] "c:\program files\common files\adobe\oobe\pdapp\uwa\UpdaterStartupUtility.exe"
mRun: [SwitchBoard] c:\program files\common files\adobe\switchboard\SwitchBoard.exe
mRun: [AdobeCS5ServiceManager] "c:\program files\common files\adobe\cs5servicemanager\CS5ServiceManager.exe" -launchedbylogin
mRun: [Hpumeb] rundll32.exe "c:\users\slick\appdata\local\onasetube.dll",Startup
dRun: [DevconDefaultDB] c:\windows\system32\READREG /SILENT /FAIL=1
uPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
LSA: Authentication Packages = msv1_0 relog_ap
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\slick\appdata\roaming\mozilla\firefox\profiles\at440o8n.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.facebook.com/
FF - prefs.js: network.proxy.http - 165.230.49.115
FF - prefs.js: network.proxy.http_port - 3128
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\mozilla firefox\plugins\npdnu.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdnupdater2.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: XULRunner: {7AFF6EE6-5449-4253-9535-A76C2BAE1D81} - c:\users\slick\appdata\local\{7AFF6EE6-5449-4253-9535-A76C2BAE1D81}
.
---- FIREFOX POLICIES ----
FF - user.js: network.protocol-handler.warn-external.dnupdate - false
============= SERVICES / DRIVERS ===============
.
R2 KMWDSERVICE;Keyboard And Mouse Communication Service;c:\program files\ihome\keyboard driver\KMWDSrv.exe [2008-6-24 208896]
R2 Kodak AiO Network Discovery Service;Kodak AiO Network Discovery Service;c:\program files\kodak\aio\center\ekdiscovery.exe [2010-9-13 308656]
R2 SgtSch2Svc;Seagate Scheduler2 Service;c:\program files\common files\seagate\schedule2\schedul2.exe [2009-10-17 431456]
R3 COMMONFX.SYS;COMMONFX.SYS;c:\windows\system32\drivers\COMMONFX.sys [2009-6-24 99352]
R3 CTAUDFX.SYS;CTAUDFX.SYS;c:\windows\system32\drivers\CTAUDFX.sys [2009-6-24 555032]
R3 CTSBLFX.SYS;CTSBLFX.SYS;c:\windows\system32\drivers\CTSBLFX.sys [2009-6-24 566296]
RUnknown SASDIFSV;SASDIFSV; [x]
RUnknown SASENUM;SASENUM; [x]
RUnknown SASKUTIL;SASKUTIL; [x]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-14 229888]
S3 COMMONFX;COMMONFX;c:\windows\system32\drivers\COMMONFX.sys [2009-6-24 99352]
S3 Creative Audio Engine Licensing Service;Creative Audio Engine Licensing Service;c:\program files\common files\creative labs shared\service\CTAELicensing.exe [2009-8-12 79360]
S3 CTAUDFX;CTAUDFX;c:\windows\system32\drivers\CTAUDFX.sys [2009-6-24 555032]
S3 CTERFXFX.SYS;CTERFXFX.SYS;c:\windows\system32\drivers\CTERFXFX.sys [2009-6-24 100888]
S3 CTERFXFX;CTERFXFX;c:\windows\system32\drivers\CTERFXFX.sys [2009-6-24 100888]
S3 CTSBLFX;CTSBLFX;c:\windows\system32\drivers\CTSBLFX.sys [2009-6-24 566296]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [2010-1-26 14216]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [2010-1-26 8456]
S3 GUCI_AVS;USB2.0 UVC VGA;c:\windows\system32\drivers\GUCI_AVS.sys [2011-1-7 592640]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 spvads;SoundPlane Audio Device (S);c:\windows\system32\drivers\spvads.sys [2011-2-6 48128]
S3 SwitchBoard;SwitchBoard;c:\program files\common files\adobe\switchboard\SwitchBoard.exe [2010-2-19 517096]
.
=============== Created Last 30 ================
.
2011-05-23 23:28:29 -------- d-----w- c:\windows\system32\appmgmt
2011-04-27 21:21:23 -------- d-----w- c:\programdata\AVAST Software
2011-04-27 21:21:23 -------- d-----w- c:\program files\AVAST Software
2011-04-24 13:21:57 65602 ----a-w- c:\windows\system32\cook3260.dll
2011-04-24 13:21:57 217127 ----a-w- c:\windows\system32\drv43260.dll
2011-04-24 13:21:57 208935 ----a-w- c:\windows\system32\drv33260.dll
2011-04-24 13:21:57 176165 ----a-w- c:\windows\system32\drv23260.dll
2011-04-24 13:21:57 102439 ----a-w- c:\windows\system32\sipr3260.dll
2011-04-24 13:21:56 626688 ----a-w- c:\windows\system32\vp7vfw.dll
2011-04-24 13:21:56 1184984 ----a-w- c:\windows\system32\wvc1dmod.dll
2011-04-24 13:21:54 -------- d-----w- c:\program files\VSO
2011-04-24 11:30:27 -------- d-----w- c:\program files\Xilisoft
2011-04-24 10:12:58 -------- d-----w- c:\program files\Easy Avi Divx Xvid to DVD Burner
.
==================== Find3M ====================
.
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.1.7600 Disk: HDS728080PLA380 rev.PF2OA69A -> Harddisk1\DR1 -> \Device\Ide\IdeDeviceP4T0L0-5
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys halmacpi.dll >>UNKNOWN [0x865A2439]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x865a87b8]; MOV EAX, [0x865a8834]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x82E8A458] -> \Device\Harddisk1\DR1[0x8656B808]
3 CLASSPNP[0x837DD59E] -> ntkrnlpa!IofCallDriver[0x82E8A458] -> [0x86090918]
5 ACPI[0x835AD3B2] -> ntkrnlpa!IofCallDriver[0x82E8A458] -> \IdeDeviceP3T0L0-3[0x860C4908]
\Driver\atapi[0x8659C678] -> IRP_MJ_CREATE -> 0x865A2439
kernel: MBR read successfully
_asm { ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; ADD [BX+SI], AL; }
detected disk devices:
\Device\Ide\IdeDeviceP3T0L0-3 -> \??\IDE#DiskHDS728080PLA380_________________________PF2OA69A#5&2ac95b46&0&1.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
user != kernel MBR !!!
sectors 160834365 (+255): user != kernel
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
============= FINISH: 8:30:32.63 ===============







.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_11-05-19.01)
.
Microsoft Windows 7 Ultimate
Boot Device: \Device\HarddiskVolume1
Install Date: 8/12/2009 7:54:12 AM
System Uptime: 5/24/2011 8:22:36 AM (0 hours ago)
.
Motherboard: DFI Inc. | | NF4-U-SLI
Processor: AMD Athlon™ 64 Processor 3200+ | Socket 939 | 2000/201mhz
.
==== Disk Partitions =========================
.
C: is FIXED (NTFS) - 77 GiB total, 41.046 GiB free.
D: is CDROM ()
E: is FIXED (NTFS) - 932 GiB total, 640.858 GiB free.
F: is CDROM ()
G: is CDROM ()
H: is Removable
I: is CDROM ()
J: is CDROM ()
.
==== Disabled Device Manager Items =============
.
Class GUID:
Description:
Device ID: PCI\VEN_1102&DEV_7003&SUBSYS_00401102&REV_04\4&22A608F1&0&4148
Manufacturer:
Name:
PNP Device ID: PCI\VEN_1102&DEV_7003&SUBSYS_00401102&REV_04\4&22A608F1&0&4148
Service:
.
Class GUID: {4d36e965-e325-11ce-bfc1-08002be10318}
Description: CD-ROM Drive
Device ID: IDE\CDROM_NEC_NR-7700A___________________________1.23____\5&336FC725&0&0.0.0
Manufacturer: (Standard CD-ROM drives)
Name: _NEC NR-7700A ATA Device
PNP Device ID: IDE\CDROM_NEC_NR-7700A___________________________1.23____\5&336FC725&0&0.0.0
Service: cdrom
.
Class GUID: {eec5ad98-8080-425f-922a-dabf3de3f69a}
Description: HardDisk
Device ID: WPDBUSENUMROOT\UMB\2&37C186B&0&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_TIGERJET&PROD_HARDDISK&REV_V2.0#8&29388463&0&A9210503023FED&0#
Manufacturer: TigerJet
Name: H:\
PNP Device ID: WPDBUSENUMROOT\UMB\2&37C186B&0&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_TIGERJET&PROD_HARDDISK&REV_V2.0#8&29388463&0&A9210503023FED&0#
Service: WUDFRd
.
==== System Restore Points ===================
.
RP72: 4/25/2011 12:53:04 AM - Scheduled Checkpoint
RP73: 4/28/2011 6:20:42 AM - avast! Internet Security Setup
RP74: 5/23/2011 11:27:19 AM - Scheduled Checkpoint
RP75: 5/24/2011 8:20:39 AM - avast! Internet Security Setup
RP76: 5/24/2011 8:27:51 AM - Removed SUPERAntiSpyware Professional
.
==== Installed Programs ======================
.
µTorrent
A.V.A
Adobe AIR
Adobe Anchor Service CS3
Adobe Asset Services CS3
Adobe Bridge CS3
Adobe Bridge Start Meeting
Adobe Camera Raw 4.0
Adobe CMaps
Adobe Color - Photoshop Specific
Adobe Color EU Extra Settings
Adobe Color JA Extra Settings
Adobe Color NA Recommended Settings
Adobe Community Help
Adobe Default Language CS3
Adobe Device Central CS3
Adobe Download Manager
Adobe ExtendScript Toolkit 2
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Fonts All
Adobe Help Viewer CS3
Adobe Linguistics CS3
Adobe Media Player
Adobe PDF Library Files
Adobe Photoshop CS3
Adobe Photoshop CS5
Adobe Reader 8.1.0
Adobe Setup
Adobe Shockwave Player 11.5
Adobe Stock Photos CS3
Adobe Type Support
Adobe Update Manager CS3
Adobe Version Cue CS3 Client
Adobe WinSoft Linguistics Plugin
Adobe XMP Panels CS3
AIM 7
aiofw
aioprnt
aioscnnr
Apple Application Support
Apple Mobile Device Support
Apple Software Update
ArcSoft MediaImpression
ATI Catalyst Install Manager
AVI to DVD Converter
Bonjour
Catalyst Control Center - Branding
Catalyst Control Center Core Implementation
Catalyst Control Center Graphics Full Existing
Catalyst Control Center Graphics Full New
Catalyst Control Center Graphics Light
Catalyst Control Center Graphics Previews Common
Catalyst Control Center Graphics Previews Vista
Catalyst Control Center HydraVision Full
Catalyst Control Center InstallProxy
Catalyst Control Center Localization All
ccc-core-static
ccc-utility
CCC Help Chinese Standard
CCC Help Chinese Traditional
CCC Help Czech
CCC Help Danish
CCC Help Dutch
CCC Help English
CCC Help Finnish
CCC Help French
CCC Help German
CCC Help Greek
CCC Help Hungarian
CCC Help Italian
CCC Help Japanese
CCC Help Korean
CCC Help Norwegian
CCC Help Polish
CCC Help Portuguese
CCC Help Russian
CCC Help Spanish
CCC Help Swedish
CCC Help Thai
CCC Help Turkish
CCleaner (remove only)
center
ConvertXtoDVD 4.1.7.343
Counter-Strike: Source
Creative Audio Console
Creative Graphic Equalizer
Creative Software AutoUpdate
CutePDF Writer 2.8
Download Updater (AOL LLC)
EASEUS Partition Master 4.1.1 Home Edition
Easy Avi/Divx/Xvid to DVD Burner 2.5.1
Foxit Reader
Half-Life 2: Deathmatch
iHome Keyboard Driver
ijji REACTOR
iTunes
Java Auto Updater
Java™ 6 Update 18
K-Lite Codec Pack 6.6.6 (Standard)
KODAK AiO Home Center
magicJack
Microsoft Office Access MUI (English) 2007
Microsoft Office Access Setup Metadata MUI (English) 2007
Microsoft Office Enterprise 2007
Microsoft Office Excel MUI (English) 2007
Microsoft Office Groove MUI (English) 2007
Microsoft Office Groove Setup Metadata MUI (English) 2007
Microsoft Office InfoPath MUI (English) 2007
Microsoft Office OneNote MUI (English) 2007
Microsoft Office Outlook MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Publisher MUI (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Word MUI (English) 2007
Microsoft Silverlight
Microsoft VC9 runtime libraries
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft_VC80_ATL_x86
Microsoft_VC80_CRT_x86
Microsoft_VC80_MFC_x86
Microsoft_VC80_MFCLOC_x86
Microsoft_VC90_ATL_x86
Microsoft_VC90_CRT_x86
Microsoft_VC90_MFC_x86
Mozilla Firefox (3.6.17)
MSXML 4.0 SP2 and SOAP Toolkit 3.0
MyLife Notebook Webcam
OpenAL
Opera 10.51
PDF Settings
PDF Settings CS5
PowerISO
PreReq
QuickTime
Realtek AC'97 Audio
Seagate DiscWizard
Skins
Skype Toolbars
Skype™ 5.0
Smart Defrag
Steam
VLC media player 1.0.1
VLC Setup Helper 3.01
WinAVI MP4 Converter
WinRAR archiver
Xvid 1.2.2 final uninstall
.
==== Event Viewer Messages From Past Week ========
.
5/24/2011 8:22:03 AM, Error: Service Control Manager [7038] - The upnphost service was unable to log on as NT AUTHORITY\LocalService with the currently configured password due to the following error: The security account manager (SAM) or local security authority (LSA) server was in the wrong state to perform the security operation. To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
5/24/2011 8:22:03 AM, Error: Service Control Manager [7038] - The upnphost service was unable to log on as NT AUTHORITY\LocalService with the currently configured password due to the following error: The request is not supported. To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
5/24/2011 8:22:03 AM, Error: Service Control Manager [7000] - The UPnP Device Host service failed to start due to the following error: The service did not start due to a logon failure.
5/24/2011 8:22:03 AM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1069" attempting to start the service upnphost with arguments "" in order to run the server: {204810B9-73B2-11D4-BF42-00B0D0118B56}
.
==== End Of File ===========================







RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows 7
Version 6.1.7600
Number of processors #1
==============================================
>Drivers
==============================================
0x9161B000 C:\Windows\system32\DRIVERS\atikmdag.sys 4788224 bytes (ATI Technologies Inc., ATI Radeon Kernel Mode Driver)
0x82E4E000 C:\Windows\system32\ntkrnlpa.exe 4259840 bytes (Microsoft Corporation, NT Kernel & System)
0x82E4E000 PnpManager 4259840 bytes
0x82E4E000 RAW 4259840 bytes
0x82E4E000 WMIxWDM 4259840 bytes
0x90A02000 C:\Windows\system32\drivers\RTKVAC.SYS 4124672 bytes (Realtek Semiconductor Corp., Realtek AC'97 Audio Driver (WDM))
0x82400000 Win32k 2400256 bytes
0x82400000 C:\Windows\System32\win32k.sys 2400256 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0x8B628000 C:\Windows\System32\drivers\tcpip.sys 1347584 bytes (Microsoft Corporation, TCP/IP Driver)
0x8B201000 C:\Windows\System32\Drivers\Ntfs.sys 1241088 bytes (Microsoft Corporation, NT File System Driver)
0x9329C000 C:\Windows\system32\drivers\ha10kx2k.sys 1089536 bytes (Creative Technology Ltd, Creative EMU10KX HAL (WDM))
0x91AAC000 C:\Windows\System32\drivers\dxgkrnl.sys 749568 bytes (Microsoft Corporation, DirectX Graphics Kernel)
0x8B414000 C:\Windows\system32\drivers\ndis.sys 749568 bytes (Microsoft Corporation, NDIS 6.20 driver)
0x8347A000 C:\Windows\system32\CI.dll 700416 bytes (Microsoft Corporation, Code Integrity Module)
0x908E0000 C:\Windows\system32\DRIVERS\ltmdmnt.sys 659456 bytes (Agere Systems, Agere Windows Modem)
0x95202000 C:\Windows\system32\drivers\ctac32k.sys 638976 bytes (Creative Technology Ltd, Creative AC3 SW Decoder Device Driver (WDM))
0x9D4C7000 C:\Windows\system32\drivers\peauth.sys 618496 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver)
0x95344000 C:\Windows\System32\drivers\CTSBLFX.SYS 581632 bytes (Creative Technology Ltd, Creative SB FX Plug-in)
0x952B9000 C:\Windows\System32\drivers\CTAUDFX.SYS 569344 bytes (Creative Technology Ltd, Creative SB FX Plug-in)
0x82940000 C:\Windows\system32\drivers\HTTP.sys 544768 bytes (Microsoft Corporation, HTTP Protocol Stack)
0x90824000 C:\Windows\system32\drivers\ctaud2k.sys 524288 bytes (Creative Technology Ltd, Creative WDM Audio Device Driver)
0x83525000 C:\Windows\system32\drivers\Wdf01000.sys 462848 bytes (Microsoft Corporation, Kernel Mode Driver Framework Runtime)
0x8B52E000 C:\Windows\system32\DRIVERS\timntr.sys 438272 bytes (Acronis, Acronis True Image Backup Archive Explorer)
0x90025000 C:\Windows\system32\drivers\csc.sys 409600 bytes (Microsoft Corporation, Windows Client Side Caching Driver)
0x8B36E000 C:\Windows\System32\Drivers\cng.sys 380928 bytes (Microsoft Corporation, Kernel Cryptography, Next Generation)
0x8FA9D000 C:\Windows\system32\drivers\afd.sys 368640 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x8B599000 C:\Windows\system32\DRIVERS\tdrpman.sys 364544 bytes (Acronis, Acronis Try&Decide and Restore Points Volume Filter Driver)
0x9098E000 C:\Windows\system32\DRIVERS\nvm62x32.sys 348160 bytes (NVIDIA Corporation, NVIDIA MCP Networking Function Driver.)
0x9F039000 C:\Windows\System32\DRIVERS\srv.sys 331776 bytes (Microsoft Corporation, Server driver)
0x9D596000 C:\Windows\System32\DRIVERS\srv2.sys 323584 bytes (Microsoft Corporation, Smb 2.0 Server driver)
0x826B0000 C:\Windows\System32\ATMFD.DLL 315392 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0x900EC000 C:\Windows\system32\DRIVERS\USBPORT.SYS 307200 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0x8368A000 C:\Windows\System32\drivers\volmgrx.sys 307200 bytes (Microsoft Corporation, Volume Manager Extension Driver)
0x835A4000 C:\Windows\system32\DRIVERS\ACPI.sys 294912 bytes (Microsoft Corporation, ACPI Driver for NT)
0x9322D000 C:\Windows\system32\DRIVERS\usbhub.sys 278528 bytes (Microsoft Corporation, Default Hub Driver for USB)
0x83438000 C:\Windows\system32\CLFS.SYS 270336 bytes (Microsoft Corporation, Common Log File System Driver)
0x8FBB5000 C:\Windows\system32\DRIVERS\rdbss.sys 266240 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x8B7AB000 C:\Windows\system32\DRIVERS\volsnap.sys 258048 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0x8B4CB000 C:\Windows\system32\drivers\NETIO.SYS 253952 bytes (Microsoft Corporation, Network I/O Subsystem)
0x9D459000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 241664 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr)
0x91B63000 C:\Windows\System32\drivers\dxgmms1.sys 233472 bytes (Microsoft Corporation, DirectX Graphics MMS)
0x82E17000 ACPI_HAL 225280 bytes
0x82E17000 C:\Windows\system32\halmacpi.dll 225280 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0x908A4000 C:\Windows\system32\drivers\ctoss2k.sys 212992 bytes (Creative Technology Ltd., Creative OS Services Driver (WDM))
0x83735000 C:\Windows\system32\drivers\fltmgr.sys 212992 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0x9018E000 C:\Windows\system32\drivers\ks.sys 212992 bytes (Microsoft Corporation, Kernel CSA Library)
0x837A7000 C:\Windows\System32\DRIVERS\fvevol.sys 204800 bytes (Microsoft Corporation, BitLocker Drive Encryption Driver)
0x8FAF7000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver)
0x8B771000 C:\Windows\System32\drivers\fwpkclnt.sys 200704 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API)
0x933A6000 C:\Windows\system32\drivers\emupia2k.sys 192512 bytes (Creative Technology Ltd, E-mu Plug-in Architecture Driver (WDM))
0x90146000 C:\Windows\system32\drivers\portcls.sys 192512 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x8377A000 C:\Windows\System32\drivers\rdyboost.sys 184320 bytes (Microsoft Corporation, ReadyBoost Driver)
0x901C2000 C:\Windows\system32\DRIVERS\1394ohci.sys 180224 bytes (Microsoft Corporation, 1394 OpenHCI Driver)
0x93271000 C:\Windows\system32\drivers\hap16v2k.sys 176128 bytes (Creative Technology Ltd, Creative EMU10KX-P16v HAL (WDM))
0x8B330000 C:\Windows\System32\Drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider)
0x82916000 C:\Windows\System32\Drivers\fastfat.SYS 172032 bytes (Microsoft Corporation, Fast FAT File System Driver)
0x83634000 C:\Windows\system32\DRIVERS\pci.sys 172032 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0x933D5000 C:\Windows\system32\drivers\ctsfm2k.sys 167936 bytes (Creative Technology Ltd, SoundFont® Manager (WDM))
0x837D9000 C:\Windows\system32\DRIVERS\CLASSPNP.SYS 151552 bytes (Microsoft Corporation, SCSI Class System Dll)
0x8B509000 C:\Windows\System32\Drivers\ksecpkg.sys 151552 bytes (Microsoft Corporation, Kernel Security Support Provider Interface Packages)
0x83709000 C:\Windows\system32\DRIVERS\ataport.SYS 143360 bytes (Microsoft Corporation, ATAPI Driver Extension)
0x9D436000 C:\Windows\system32\DRIVERS\mrxsmb.sys 143360 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0x91BDE000 C:\Windows\system32\DRIVERS\ndiswan.sys 139264 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x8FB8E000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 135168 bytes
0x9D568000 C:\Windows\System32\DRIVERS\srvnet.sys 135168 bytes (Microsoft Corporation, Server Network driver)
0x900AF000 C:\Windows\system32\DRIVERS\tunnel.sys 135168 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x8FA1C000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver)
0x83611000 C:\Windows\system32\DRIVERS\cdrom.sys 126976 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0x8FB30000 C:\Windows\system32\DRIVERS\pacer.sys 126976 bytes (Microsoft Corporation, QoS Packet Scheduler)
0x8B600000 C:\Windows\system32\DRIVERS\snapman.sys 126976 bytes (Acronis, Acronis Snapshot API)
0x82690000 C:\Windows\System32\cdd.dll 122880 bytes (Microsoft Corporation, Canonical Display Driver)
0x9529E000 C:\Windows\System32\drivers\COMMONFX.SYS 110592 bytes (Creative Technology Ltd, Creative Common FX Plug-in)
0x828B4000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA File Virtualization Filter Driver)
0x9D494000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 110592 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector)
0x828D9000 C:\Windows\system32\drivers\WudfPf.sys 106496 bytes (Microsoft Corporation, Windows Driver Foundation - User-mode Driver Framework Platform Driver)
0x829DB000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver)
0x90175000 C:\Windows\system32\drivers\drmk.sys 102400 bytes (Microsoft Corporation, Microsoft Trusted Audio Drivers)
0x90089000 C:\Windows\System32\Drivers\dfsc.sys 98304 bytes (Microsoft Corporation, DFS Namespace Client Driver)
0x91BBB000 C:\Windows\system32\DRIVERS\rasl2tp.sys 98304 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0x91600000 C:\Windows\system32\DRIVERS\raspppoe.sys 98304 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0x909E3000 C:\Windows\system32\DRIVERS\raspptp.sys 94208 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x90800000 C:\Windows\system32\DRIVERS\rassstp.sys 94208 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager)
0x8FA7B000 C:\Windows\system32\DRIVERS\tdx.sys 94208 bytes (Microsoft Corporation, TDI Translation Driver)
0x82824000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0x8287E000 C:\Windows\system32\DRIVERS\USBSTOR.SYS 94208 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0x829C5000 C:\Windows\system32\DRIVERS\cdfs.sys 90112 bytes (Microsoft Corporation, CD-ROM File System Driver)
0x836EA000 C:\Windows\System32\drivers\mountmgr.sys 90112 bytes (Microsoft Corporation, Mount Point Manager)
0x82895000 C:\Windows\system32\drivers\usbaudio.sys 81920 bytes (Microsoft Corporation, USB Audio Class Driver)
0x82848000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 77824 bytes (Microsoft Corporation, Hid Class Library)
0x8B35B000 C:\Windows\System32\Drivers\ksecdd.sys 77824 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0x82903000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6)
0x8FB5D000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x91BA9000 C:\Windows\system32\DRIVERS\AgileVpn.sys 73728 bytes (Microsoft Corporation, RAS Agile Vpn Miniport Call Manager)
0x900D0000 C:\Windows\system32\DRIVERS\amdk8.sys 73728 bytes (Microsoft Corporation, Processor Device Driver)
0x82800000 C:\Windows\System32\drivers\mpsdrv.sys 73728 bytes (Microsoft Corporation, Microsoft Protection Service Driver)
0x8B3E2000 C:\Windows\system32\DRIVERS\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver)
0x83600000 C:\Windows\System32\Drivers\dump_dumpfve.sys 69632 bytes
0x83769000 C:\Windows\system32\drivers\fileinfo.sys 69632 bytes (Microsoft Corporation, FileInfo Filter Driver)
0x953D2000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy)
0x83669000 C:\Windows\System32\drivers\partmgr.sys 69632 bytes (Microsoft Corporation, Partition Management Driver)
0x8341F000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Platform Specific Hardware Error Driver)
0x828F3000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver)
0x8B400000 C:\Windows\System32\Drivers\mup.sys 65536 bytes (Microsoft Corporation, Multiple UNC Provider Driver)
0x8FB70000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Remote Desktop Server Driver)
0x8367A000 C:\Windows\system32\DRIVERS\volmgr.sys 65536 bytes (Microsoft Corporation, Volume Manager Driver)
0x90137000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0x900A1000 C:\Windows\system32\DRIVERS\blbdrive.sys 57344 bytes (Microsoft Corporation, BLB Drive Driver)
0x8FB4F000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver)
0x8FA6D000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver)
0x836DC000 C:\Windows\system32\DRIVERS\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0x8B3CB000 C:\Windows\System32\drivers\pcw.sys 57344 bytes (Microsoft Corporation, Performance Counters for Windows Driver)
0x8FB80000 C:\Windows\System32\Drivers\SCDEmu.SYS 57344 bytes (PowerISO Computing, Inc., PowerISO Virtual Drive)
0x9321F000 C:\Windows\system32\DRIVERS\umbus.sys 57344 bytes (Microsoft Corporation, User-Mode Bus Enumerator)
0x83596000 C:\Windows\system32\drivers\WDFLDR.SYS 57344 bytes (Microsoft Corporation, Kernel Mode Driver Framework Loader)
0x91B9C000 C:\Windows\system32\DRIVERS\CompositeBus.sys 53248 bytes (Microsoft Corporation, Multi-Transport Composite Bus Enumerator)
0x953ED000 C:\Windows\System32\Drivers\crashdmp.sys 53248 bytes (Microsoft Corporation, Crash Dump Driver)
0x901EE000 C:\Windows\system32\DRIVERS\kbdclass.sys 53248 bytes (Microsoft Corporation, Keyboard Class Driver)
0x90981000 C:\Windows\system32\drivers\modem.sys 53248 bytes (Microsoft Corporation, Modem Device Driver)
0x90000000 C:\Windows\system32\DRIVERS\mouclass.sys 53248 bytes (Microsoft Corporation, Mouse Class Driver)
0x9D589000 C:\Windows\System32\drivers\tcpipreg.sys 53248 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver)
0x8FA3D000 C:\Windows\System32\drivers\watchdog.sys 53248 bytes (Microsoft Corporation, Watchdog Driver)
0x90019000 C:\Windows\System32\drivers\discache.sys 49152 bytes (Microsoft Corporation, System Indexer/Cache Driver)
0x82867000 C:\Windows\system32\DRIVERS\kbdhid.sys 49152 bytes (Microsoft Corporation, HID Keyboard Filter Driver)
0x8FA10000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x93200000 C:\Windows\System32\Drivers\dump_dumpata.sys 45056 bytes
0x8283D000 C:\Windows\system32\DRIVERS\hidusb.sys 45056 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0x83414000 C:\Windows\system32\mcupdate_AuthenticAMD.dll 45056 bytes (Microsoft Corporation, AMD Microcode Update Library)
0x828A9000 C:\Windows\system32\DRIVERS\monitor.sys 45056 bytes (Microsoft Corporation, Monitor Driver)
0x82873000 C:\Windows\system32\DRIVERS\mouhid.sys 45056 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0x8FA62000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver)
0x91BD3000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x8FA92000 C:\Windows\system32\DRIVERS\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper)
0x8365E000 C:\Windows\system32\DRIVERS\vdrvroot.sys 45056 bytes (Microsoft Corporation, Virtual Drive Root Enumerator)
0x953E3000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver)
0x8FA00000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver)
0x8FBF6000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy)
0x90817000 C:\Windows\system32\DRIVERS\rdpbus.sys 40960 bytes (Microsoft Corporation, Microsoft RDP Bus Device driver)
0x9D55E000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0x828CF000 C:\Windows\system32\DRIVERS\tifsfilt.sys 40960 bytes (Acronis, Acronis True Image File System Filter)
0x900E2000 C:\Windows\system32\DRIVERS\usbohci.sys 40960 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0x8372C000 C:\Windows\system32\DRIVERS\amdxata.sys 36864 bytes (Advanced Micro Devices, Storage Filter Driver)
0x83700000 C:\Windows\system32\DRIVERS\atapi.sys 36864 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x9320B000 C:\Windows\System32\Drivers\dump_atapi.sys 36864 bytes
0x8B3D9000 C:\Windows\System32\Drivers\Fs_Rec.sys 36864 bytes (Microsoft Corporation, File System Recognizer Driver)
0x9F122000 C:\Windows\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0x82660000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver)
0x8B7A2000 C:\Windows\system32\DRIVERS\vmstorfl.sys 36864 bytes (Microsoft Corporation, Virtual Storage Filter Driver)
0x835EC000 C:\Windows\system32\DRIVERS\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0x90DF1000 C:\Windows\system32\drivers\Afc.sys 32768 bytes (Arcsoft, Inc., Arcsoft® ASPI Shell)
0x83430000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver)
0x908D8000 C:\Windows\system32\drivers\ctprxy2k.sys 32768 bytes (Creative Technology Ltd, Creative Proxy Device Driver (WDM))
0x8B61F000 C:\Windows\System32\drivers\hwpolicy.sys 32768 bytes (Microsoft Corporation, Hardware Policy Driver)
0x835F5000 C:\Windows\system32\DRIVERS\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver)
0x8FA4A000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8FA52000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Encoder Miniport)
0x8FA5A000 C:\Windows\system32\drivers\rdprefmp.sys 32768 bytes (Microsoft Corporation, RDP Reflector Driver Miniport)
0x8B7EA000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor)
0x83407000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver)
0x8285B000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0x9F11B000 C:\Users\slick\AppData\Local\Temp\mbr.sys 28672 bytes
0x83400000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver)
0x836D5000 C:\Windows\system32\DRIVERS\pciide.sys 28672 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x8FB29000 C:\Windows\system32\DRIVERS\wfplwf.sys 28672 bytes (Microsoft Corporation, WFP NDIS 6.20 Lightweight Filter Driver)
0x90DF9000 C:\Windows\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0x8FBAF000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes
0x9F115000 C:\Program Files\SUPERAntiSpyware\SASENUM.SYS 24576 bytes
0x82862000 C:\Windows\system32\DRIVERS\KMWDFILTER.sys 20480 bytes (Windows ® Codename Longhorn DDK provider, KMWDFilter Driver from UASSOFT.COM)
0x867BF000 C:\Windows\system32\kdcom.dll 12288 bytes (Microsoft Corporation, Serial Kernel Debugger)
0x91618000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x8283B000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
==============================================
>Stealth
==============================================
0x01DA0000 Hidden Image-->Inkjet.Localization.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 143360 bytes
0x01E20000 Hidden Image-->Inkjet.Hardware.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 176128 bytes
0x01EC0000 Hidden Image-->Inkjet.DeviceSettings.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 53248 bytes
0x01DD0000 Hidden Image-->Inkjet.Statistics.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 53248 bytes
0x9F0B4F2E Unknown thread object [ ETHREAD 0x87DDC810 ] , 600 bytes
0x01320000 Hidden Image-->Inkjet.Diagnostics.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 61440 bytes
0x012B0000 Hidden Image-->Inkjet.Automation.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 77824 bytes
0x01DF0000 Hidden Image-->Inkjet.Utilities.dll [ EPROCESS 0x87E12AA8 ] PID: 2644, 86016 bytes

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 07:03 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 07:20 PM

I couldn't run it, I kept getting the blue screen saying my hard drive is being wiped.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 07:31 PM

Hello

I would like you to download these programs if you don't have them yet to the desktop and have them ready to use .

RKill - exeHelper - Malwarebytes' Anti-Malware
Unhide.exe


After you have them on your desktop restart your computer and as soon as you can start with RKill

:Rkill:

  • Double click on Rkill.
  • A command window will open then disappear upon completion, this is normal.
  • Please leave Rkill on the Desktop until otherwise advised.
Note: You will likely see a message from this rogue telling you the file is infected. Ignore the message. Leave the message OPEN, do not close the message. Run rkill repeatedly until it's able to do it's job. This may take a few tries. You'll be able to tell rkill has done it's job when your desktop (explorer.exe) cycles off and then on again.

Once the tool has run, do NOT reboot the machine,
If for some reason the machine reboots, repeat the process. Again, try not to restart the machine.

Scan with exeHelper:

Please download exeHelper to your desktop.

  • Double-click on exeHelper.com to run the fix.
  • A black window should pop up, press any key to close once the fix is completed.
  • Post the contents of exehelperlog.txt (Will be created in the directory where you ran exeHelper.com, and should open at the end of the scan)

Note: If the window shows a message that says "Error deleting file", please re-run the program


Next I want you to run the unhide.exe program just double click to run it.

: Malwarebytes' Anti-Malware :

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Let me have these logs and let me know how the computer is doing

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 08:01 PM

At first i got the blue screen again while running rkill, so i started it again and everything went smoothly. When i deleted all the things from MBAM when i restarted the computer i got two windows that popped up saying they cant run. one of the messages said that c:\Users\slick\AppData\Local\onasetube.dll couldn't start but i don't remember what the other one said.






This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 05/24/2011 at 9:43:55.
Operating System: Windows 7 Ultimate


Processes terminated by Rkill or while it was running:



Rkill completed on 05/24/2011 at 9:44:03.



exeHelper by Raktor
Build 20100414
Run at 09:45:39 on 05/24/11
Now searching...
Checking for numerical processes...
Checking for sysguard processes...
Checking for bad processes...
Checking for bad files...
Checking for bad registry entries...
Resetting filetype association for .exe
Resetting filetype association for .com
Resetting userinit and shell values...
Resetting policies...
--Finished--





Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6658

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

5/24/2011 9:53:01 AM
mbam-log-2011-05-24 (09-53-01).txt

Scan type: Quick scan
Objects scanned: 150872
Time elapsed: 4 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\Users\slick\AppData\Local\onasetube.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Users\slick\AppData\Local\werofhct.dll (Trojan.Hiloti) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hpumeb (Trojan.Hiloti) -> Value: Hpumeb -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Urucipulukel (Trojan.Hiloti) -> Value: Urucipulukel -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Users\slick\AppData\Local\flj.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Users\slick\AppData\Local\onasetube.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Users\slick\AppData\Local\werofhct.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Users\slick\AppData\Local\Temp\w0y0iua3.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\Users\slick\AppData\Local\Temp\p1d8obl7.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\Users\slick\local settings\application data\onasetube.dll (Trojan.Hiloti) -> Delete on reboot.
c:\Users\slick\local settings\application data\werofhct.dll (Trojan.Hiloti) -> Delete on reboot.

I'm pretty sure this is the other one that had the pop-up. c:\Users\slick\AppData\Local\werofhct.dll

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 08:18 PM

hello


Now lets see if combofix will run



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 08:23 PM

nope still got the blue screen.

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 08:49 PM

Hello

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.

after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 09:16 PM

Same thing happened I tried three times.

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 09:33 PM

Please download Kaspersky Virus Removal Tool and SAVE it to your desktop

  • Right click and run as admin (xp please double click to run)
  • select lang
  • click on next
  • accept the license aggreement
  • select location and click on next
  • in autoscan make sure the first three boxes are checked and the box next to the C:/ drive
  • click on start scan
  • when complete click on report
  • in the three drop down boxes choose autoscan - do not group and important events
  • click on save and save to desktop
  • copy and paste this report in your next post

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 23 May 2011 - 11:33 PM

I didn't know if i should delete anything or not so i just skipped everything.





Autoscan: completed 1 minute ago (events: 50, objects: 294187, time: 01:38:18)
5/24/2011 11:52:44 AM Task started
5/24/2011 12:00:22 PM Detected: Trojan-Downloader.Java.OpenConnection.dz C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\537dd90b-616c7df2
5/24/2011 12:00:22 PM Detected: Trojan-Downloader.Java.OpenConnection.dz C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\33df908a-63d4b248
5/24/2011 12:01:36 PM Detected: Trojan-Downloader.Win32.Mufanom.bhdg C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\34b75915-617ab5c5
5/24/2011 12:14:02 PM Untreated: Trojan-Downloader.Java.OpenConnection.dz C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\537dd90b-616c7df2 Skipped by user
5/24/2011 12:14:03 PM Detected: Exploit.Java.CVE-2010-0840.d C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\610ac5a0-5059abd2/lang_driver/restore.class
5/24/2011 12:14:05 PM Untreated: Trojan-Downloader.Win32.Mufanom.bhdg C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\34b75915-617ab5c5 Skipped by user
5/24/2011 12:14:06 PM Detected: Trojan-Downloader.Win32.Mufanom.bhra C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4a4a27e5-7896af55
5/24/2011 12:14:06 PM Untreated: Exploit.Java.CVE-2010-0840.d C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\610ac5a0-5059abd2/lang_driver/restore.class Skipped by user
5/24/2011 12:14:07 PM Detected: Trojan-Downloader.Java.OpenConnection.eh C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/huiak.class
5/24/2011 12:14:08 PM Untreated: Trojan-Downloader.Java.OpenConnection.dz C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\33df908a-63d4b248 Skipped by user
5/24/2011 12:14:08 PM Untreated: Trojan-Downloader.Win32.Mufanom.bhra C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4a4a27e5-7896af55 Skipped by user
5/24/2011 12:14:11 PM Detected: Exploit.Java.CVE-2010-0840.d C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\38ac60fb-471e9c23/langdriver/translator.class
5/24/2011 12:14:12 PM Untreated: Trojan-Downloader.Java.OpenConnection.eh C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/huiak.class Skipped by user
5/24/2011 12:14:12 PM Untreated: Exploit.Java.CVE-2010-0840.d C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\38ac60fb-471e9c23/langdriver/translator.class Skipped by user
5/24/2011 12:14:13 PM Detected: Trojan-Downloader.Java.OpenConnection.eh C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/Stremer.class
5/24/2011 12:14:13 PM Untreated: Trojan-Downloader.Java.OpenConnection.eh C:\Documents and Settings\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/Stremer.class Skipped by user
5/24/2011 12:56:00 PM Detected: Trojan-Downloader.Java.OpenConnection.dz C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\33df908a-63d4b248
5/24/2011 12:56:00 PM Untreated: Trojan-Downloader.Java.OpenConnection.dz C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\33df908a-63d4b248 Skipped by user
5/24/2011 12:56:00 PM Detected: Trojan-Downloader.Java.OpenConnection.dz C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\537dd90b-616c7df2
5/24/2011 12:56:00 PM Untreated: Trojan-Downloader.Java.OpenConnection.dz C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\537dd90b-616c7df2 Skipped by user
5/24/2011 12:56:00 PM Detected: Trojan-Downloader.Win32.Mufanom.bhdg C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\34b75915-617ab5c5
5/24/2011 12:56:00 PM Untreated: Trojan-Downloader.Win32.Mufanom.bhdg C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\34b75915-617ab5c5 Skipped by user
5/24/2011 12:56:01 PM Detected: Exploit.Java.CVE-2010-0840.d C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\610ac5a0-5059abd2/lang_driver/restore.class
5/24/2011 12:56:01 PM Untreated: Exploit.Java.CVE-2010-0840.d C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\610ac5a0-5059abd2/lang_driver/restore.class Skipped by user
5/24/2011 12:56:01 PM Detected: Trojan-Downloader.Win32.Mufanom.bhra C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4a4a27e5-7896af55
5/24/2011 12:56:01 PM Untreated: Trojan-Downloader.Win32.Mufanom.bhra C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4a4a27e5-7896af55 Skipped by user
5/24/2011 12:56:01 PM Detected: Trojan-Downloader.Java.OpenConnection.eh C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/huiak.class
5/24/2011 12:56:01 PM Untreated: Trojan-Downloader.Java.OpenConnection.eh C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/huiak.class Skipped by user
5/24/2011 12:56:01 PM Detected: Trojan-Downloader.Java.OpenConnection.eh C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/Stremer.class
5/24/2011 12:56:01 PM Untreated: Trojan-Downloader.Java.OpenConnection.eh C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\219f4e9-3f4fa758/durdom/Stremer.class Skipped by user
5/24/2011 12:56:01 PM Detected: Exploit.Java.CVE-2010-0840.d C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\38ac60fb-471e9c23/langdriver/translator.class
5/24/2011 12:56:01 PM Untreated: Exploit.Java.CVE-2010-0840.d C:\Users\slick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\38ac60fb-471e9c23/langdriver/translator.class Skipped by user
5/24/2011 1:04:24 PM Detected: Trojan.Java.Agent.am C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/b.class
5/24/2011 1:04:24 PM Untreated: Trojan.Java.Agent.am C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/b.class Skipped by user
5/24/2011 1:04:24 PM Detected: Trojan-Downloader.Java.OpenConnection.cg C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/KAVS.class
5/24/2011 1:04:24 PM Untreated: Trojan-Downloader.Java.OpenConnection.cg C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/KAVS.class Skipped by user
5/24/2011 1:04:24 PM Detected: Exploit.Java.CVE-2010-0840.d C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\4932f721-3d79ae4c/lang_driver/restore.class
5/24/2011 1:04:24 PM Untreated: Exploit.Java.CVE-2010-0840.d C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\4932f721-3d79ae4c/lang_driver/restore.class Skipped by user
5/24/2011 1:04:24 PM Detected: Trojan-Downloader.Java.Agent.ji C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/purok.class
5/24/2011 1:04:24 PM Untreated: Trojan-Downloader.Java.Agent.ji C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\36cabf66-315c8b1e/bpac/purok.class Skipped by user
5/24/2011 1:08:28 PM Detected: HEUR:Trojan.Win32.Generic C:\Windows\Temp\jar_cache2933949412862053063.tmp
5/24/2011 1:08:37 PM Detected: HEUR:Trojan.Win32.Generic C:\Windows\Temp\axwxgxtc.exe
5/24/2011 1:18:05 PM Untreated: HEUR:Trojan.Win32.Generic C:\Windows\Temp\jar_cache2933949412862053063.tmp Skipped by user
5/24/2011 1:18:05 PM Untreated: HEUR:Trojan.Win32.Generic C:\Windows\Temp\axwxgxtc.exe Skipped by user
5/24/2011 1:18:06 PM Detected: MEM:Rootkit.Win32.TDSS.fa Unknown application
5/24/2011 1:18:06 PM Untreated: MEM:Rootkit.Win32.TDSS.fa Unknown application Skipped by user
5/24/2011 1:22:10 PM Detected: MEM:Rootkit.Win32.TDSS.fa System Memory
5/24/2011 1:30:34 PM Untreated: MEM:Rootkit.Win32.TDSS.fa System Memory Skipped by user
5/24/2011 1:31:02 PM Task completed

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:30 PM

Posted 23 May 2011 - 11:42 PM

Hello

There is a rootkit in there so I want you to run it again and let it fix what it want to fix


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 B14CKL15T3D

B14CKL15T3D
  • Topic Starter

  • Members
  • 65 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:30 PM

Posted 24 May 2011 - 12:39 AM

I did everything it recommended me to do and when it was finished it restarted my computer no warning just restarted itself and the program popped up when it started back up. I clicked on report but nothing was in there.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users