Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Still infected


  • Please log in to reply
30 replies to this topic

#1 billder

billder

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 26 June 2011 - 01:14 PM

Dell Inspiron with XP Service pack 2. Ran Malwarebytes in safe mode. Following is the log

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5363

Windows 5.1.2600 Service Pack 2 (Safe Mode)
Internet Explorer 6.0.2900.2180

6/24/2011 10:27:03 PM
mbam-log-2011-06-24 (22-27-03).txt

Scan type: Full scan (C:\|)
Objects scanned: 176603
Time elapsed: 58 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 17
Registry Values Infected: 6
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 40

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ 11F#`I (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{13B605DF-1E8A-69E3-30F0-9C4603AF0367} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{3C2D2A1E-031F-4397-9614-87C932A848E0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04A38F6B-006F-4247-BA4C-02A139D5531C} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MiniBugTransporter.MiniBugTransporterX.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MiniBugTransporter.MiniBugTransporterX (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3D782BB3-F2A5-11D3-BF4C-000000000000} (Adware.ActivShopper) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{2A7DB8D1-43BE-4AD3-A81E-9BB8C9D00073} (Adware.Delphinmediaviewer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2BB15D36-43BE-4743-A3A0-3308F4B1A610} (Adware.Delphinmediaviewer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{daa873d4-958c-453c-81ca-3fe6f3676a87} (Rootkit.ADS) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CompBar.GetPriceBar (Adware.ActivShopper) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CompBar.GetPriceBar.1 (Adware.ActivShopper) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\1074975285 (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\AMeOpt (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{782EFECF-07F2-F82F-8EDE-F319601EAE66} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{782EFECF-07F2-F82F-8EDE-F319601EAE66} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass (Trojan.Downloader) -> Value: lsass -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\216.tmp (Trojan.Agent) -> Value: 216.tmp -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\216.tmp.exe (Trojan.Agent) -> Value: 216.tmp.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\217.tmp (Trojan.Agent) -> Value: 217.tmp -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\217.tmp.exe (Trojan.Agent) -> Value: 217.tmp.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{782EFECF-07F2-F82F-8EDE-F319601EAE66} (Trojan.BHO) -> Value: {782EFECF-07F2-F82F-8EDE-F319601EAE66} -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\WINDOWS\elitetoolbar (Adware.EliteBar) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\system32\elitenmc32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\d3tt.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\d3aj.dll (Trojan.BHO) -> Quarantined and deleted successfully.
c:\program files\AWS\weatherbug\minibugtransporter.dll (Adware.Minibug) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\addyf.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\csrss_log.dat (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteamg32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteamp32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitedno32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitedza32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteekx32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteevo32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitefbn32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitefpl32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitegjo32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitegvm32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitehaf32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteick32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitejcy32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitejwd32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitemdy32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\eliteohy32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitetiv32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitewra32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitewsh32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitexab32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitexdh32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitexdk32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\elitexix32.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\javazw32.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\WinNB57.dll (Adware.Mirar) -> Quarantined and deleted successfully.
c:\WINDOWS\system32:dsaa.dll (Rootkit.ADS) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\msxl32.dll (Trojan.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\netia32.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\WINDOWS\desktop.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\jennifer franz\local settings\Temp\216.tmp.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\jennifer franz\local settings\Temp\217.tmp.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\elitetoolbar\elitelist (Adware.EliteBar) -> Quarantined and deleted successfully.
c:\WINDOWS\elitetoolbar\elitetoolbar version 60.dll (Adware.EliteBar) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\d3vf.dll (Trojan.BHO) -> Quarantined and deleted successfully.



Still have a program called pokapoka79.exe that I believe is causing my problems. Still acts like I have a virus.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 26 June 2011 - 03:48 PM

Any particular reason why you ran MBAM from Safe Mode?
MBAM should be run from normal mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 26 June 2011 - 05:11 PM

it would load but not open. i could see it in task manager processes. the only way i could run it was in safe mode

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 26 June 2011 - 05:32 PM

I see....

Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/


  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
  • Close SUPERAntiSpyware.
Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

  • Open SUPERAntiSpyware.
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Post SUPERAntiSpyware log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 26 June 2011 - 08:41 PM

I am not able to connect to the internet so I saved the program on a thumb drive and installed it from there. Was not able to update. Went into safe mode and tried to run it but the window never opens. I can see it running from task manager.

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 26 June 2011 - 08:48 PM

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 26 June 2011 - 10:17 PM

As I was running a scan, a blue screen popped up saying windows needs to shut down with this

DRIVER_IRQL_NOT_LESS_OR_EQUAL

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 26 June 2011 - 10:34 PM

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 27 June 2011 - 09:18 AM

Ran in safe mode with "devices" un-checked but stops when it gets to C:\WINDOWS\system32. Have tried it a couple of times with the same result.

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 27 June 2011 - 10:37 AM

Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can download, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 27 June 2011 - 12:51 PM

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 2)
Number of processors #1
==============================================
>Drivers
==============================================
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2180992 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2180992 bytes
0x804D7000 RAW 2180992 bytes
0x804D7000 WMIxWDM 2180992 bytes
0xBF800000 Win32k 1839104 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1839104 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xFC012000 C:\WINDOWS\System32\DRIVERS\HSF_DP.sys 1064960 bytes (Conexant Systems, Inc., HSF_DP driver)
0xBFA0E000 C:\WINDOWS\System32\ati3d1ag.dll 831488 bytes (ATI Technologies Inc. , ati3d1ag.dll)
0xFBF77000 C:\WINDOWS\System32\DRIVERS\HSF_CNXT.sys 634880 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0xFC396000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xFC25B000 C:\WINDOWS\System32\DRIVERS\ati2mtag.sys 540672 bytes (ATI Technologies Inc., ATI Radeon Miniport Driver)
0xF661E000 C:\WINDOWS\System32\DRIVERS\mrxsmb.sys 450560 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF674B000 C:\WINDOWS\System32\DRIVERS\tcpip.sys 360448 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF46A0000 C:\WINDOWS\System32\DRIVERS\srv.sys 339968 bytes (Microsoft Corporation, Server driver)
0xFC1E1000 C:\WINDOWS\System32\DRIVERS\SynTP.sys 274432 bytes (Synaptics, Inc., Synaptics Touchpad Driver)
0xF44CF000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xBF9D3000 C:\WINDOWS\System32\ati2dvag.dll 241664 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xF6993000 C:\WINDOWS\System32\Drivers\cdudf_xp.SYS 241664 bytes (Roxio, CD-UDF NT Filesystem Driver)
0xFC169000 C:\WINDOWS\system32\drivers\STAC97.sys 221184 bytes (SigmaTel, Inc., SigmaTel Audio Driver (WDM))
0xFBE7B000 C:\WINDOWS\System32\DRIVERS\update.sys 212992 bytes (Microsoft Corporation, Update Driver)
0xF68CE000 C:\WINDOWS\System32\Drivers\UdfReadr_xp.SYS 208896 bytes (Roxio, CD-UDF NT Filesystem Reader Driver)
0xFC116000 C:\WINDOWS\System32\DRIVERS\HSFHWICH.sys 192512 bytes (Conexant Systems, Inc., HSFHWICH WDM driver)
0xFC4D1000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF4A55000 C:\WINDOWS\System32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xFC369000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF66B4000 C:\WINDOWS\System32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF6723000 C:\WINDOWS\System32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xFC145000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF51E2000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 143360 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xFC1BE000 C:\WINDOWS\System32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xFC224000 C:\WINDOWS\System32\DRIVERS\USBPORT.SYS 143360 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF6701000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xF66DF000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0xF65FD000 C:\WINDOWS\System32\DRIVERS\ipnat.sys 135168 bytes (Microsoft Corporation, IP Network Address Translator)
0xFC44C000 fltmgr.sys 126976 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xFC483000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xFC19F000 C:\WINDOWS\System32\Drivers\pwd_2k.SYS 126976 bytes (Roxio, Win2000 Framework for Packet Write Driver)
0xFC4A2000 pcmcia.sys 122880 bytes (Microsoft Corporation, PCMCIA Bus Driver)
0xFC34E000 Mup.sys 110592 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xFC46B000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF51CA000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xFC423000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xFBF60000 C:\WINDOWS\System32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xF4A18000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xFC247000 C:\WINDOWS\System32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0x806EC000 C:\WINDOWS\system32\hal.dll 81280 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF686E000 C:\WINDOWS\System32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF9C1000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xFC43A000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xFC4C0000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xFBEAF000 C:\WINDOWS\System32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF41F4000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xFC680000 C:\WINDOWS\System32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xFBF10000 C:\WINDOWS\System32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xFC6A0000 C:\WINDOWS\System32\Drivers\Cdr4_xp.SYS 61440 bytes (Roxio, CDR4_XP CDR Helper)
0xFC6F0000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xFC630000 C:\WINDOWS\System32\DRIVERS\odysseyIM3.sys 61440 bytes (Funk Software, Inc., Odyssey Intermediate Driver)
0xFC530000 ohci1394.sys 61440 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xFC6E0000 C:\WINDOWS\System32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF591A000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xFC640000 C:\WINDOWS\System32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xFC540000 C:\WINDOWS\System32\DRIVERS\1394BUS.SYS 53248 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xFC6D0000 C:\WINDOWS\System32\DRIVERS\cdrom.sys 53248 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xFC580000 C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xFC6B0000 C:\WINDOWS\System32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xFC710000 C:\WINDOWS\System32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xFC560000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xFC610000 C:\WINDOWS\System32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xFC590000 agp440.sys 45056 bytes (Microsoft Corporation, 440 NT AGP Filter)
0xFC600000 C:\WINDOWS\System32\DRIVERS\bcm4sbxp.sys 45056 bytes (Broadcom Corporation, Broadcom Corporation NDIS 5.1 ethernet driver)
0xFC6C0000 C:\WINDOWS\System32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xFC550000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xFC720000 C:\WINDOWS\System32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xFC690000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xFC650000 C:\WINDOWS\System32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF4510000 C:\WINDOWS\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0xFC570000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xFC780000 C:\WINDOWS\System32\Drivers\Fips.SYS 36864 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xFC5D0000 C:\WINDOWS\System32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xFC520000 isapnp.sys 36864 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xFC620000 C:\WINDOWS\System32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xFC750000 C:\WINDOWS\System32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xFBF20000 C:\WINDOWS\System32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xFC908000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xFC858000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xFC7A0000 C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xFC888000 C:\WINDOWS\System32\DRIVERS\usbehci.sys 28672 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xFC920000 C:\WINDOWS\System32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xFC900000 C:\WINDOWS\System32\Drivers\Cdralw2k.SYS 24576 bytes (Roxio, CDRAL for Windows 2000 Kernel Driver)
0xFC890000 C:\WINDOWS\System32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xFC800000 C:\WINDOWS\System32\Drivers\mmc_2K.SYS 24576 bytes (Roxio, CD-R/RW AddOn MMC Driver (W2K))
0xFC8B8000 C:\WINDOWS\System32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xFC868000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xFC820000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xFC850000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xFC7F8000 C:\WINDOWS\System32\DRIVERS\omci.sys 20480 bytes (Dell Computer Corporation, OMCI Device Driver)
0xFC7A8000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xFC7E8000 C:\WINDOWS\System32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xFC7B0000 PxHelp20.sys 20480 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xFC7F0000 C:\WINDOWS\System32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xFC918000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xFC7D0000 C:\WINDOWS\System32\DRIVERS\usbuhci.sys 20480 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xFC8C0000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xFC938000 C:\WINDOWS\System32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xFC309000 C:\WINDOWS\System32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xFC9C4000 C:\WINDOWS\System32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF4C22000 C:\WINDOWS\System32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xFC93C000 ACPIEC.sys 12288 bytes (Microsoft Corporation, ACPI Embedded Controller Driver)
0xFC930000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xFC934000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xFC311000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF4B46000 C:\WINDOWS\System32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xFC2FD000 C:\WINDOWS\System32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xFCA0C000 C:\WINDOWS\System32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xFCA68000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xFCA62000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xFCA66000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xFCA24000 intelide.sys 8192 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0xFCA20000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xFCA6A000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xFCA6C000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xFCA5A000 C:\WINDOWS\System32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xFCA58000 C:\WINDOWS\System32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xFCA22000 C:\WINDOWS\System32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xFCC72000 C:\WINDOWS\System32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xFCB1D000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xFCB7C000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xFCAE9000 C:\WINDOWS\System32\DRIVERS\OPRGHDLR.SYS 4096 bytes (Microsoft Corporation, ACPI Operation Registration Driver)
0xFCAE8000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 27 June 2011 - 01:04 PM

That looks good.

Let's see about your your internet connection....

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 27 June 2011 - 02:41 PM

I can connect to the internet by attaching a ethernet cable to my hi-speed. However, when I did this, updates started immediately and I was concerned it was the virus. I disconnected the cable and opened task manage. I could see iexplorer.exe trying to load with the "pokapoka79.exe" virus program showing activity also. My fear is the virus is trying to connect somewhere via internet. Therefore, I do not want to connect until the malware or virus' have been taken care of.

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:29 AM

Posted 27 June 2011 - 05:08 PM

That's fine. Keep it that way until I say, it's OK to reconnect.

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 billder

billder
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:01:29 AM

Posted 28 June 2011 - 02:56 PM

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 2
Out of date service pack!!
Internet Explorer 6 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users