Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows - No Disk


  • This topic is locked This topic is locked
17 replies to this topic

#1 Dicedawg

Dicedawg

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 17 July 2011 - 03:33 AM

Dear Bleeping Geeks and fellow Techies, I am in need of some help. I have a problem that I cannot seem to rid as I usually do with your excellent tutorials and self help examples over the last 2 years. I hate opening a new thread if one is already established and did not see this one, so here is the background for this nasty li'l "ick" that has invaded my Desktop PC.

A bit of background info, I am pursuing a Masters degree online and do a pile of online research on my Windows XP self-built unit (2008) with 2 GB RAM, 3.2 GHZ AMD processor and 140 GB with 81 Gigs free Disk Space. I use BullGuard Anti-Virus and have had several issues in the past with a pest that causes delays in Icon starts and having to twice double-click them, til at last they do not initiate at all. I haven't had a problem of that nature since over a year ago.

This current problem went directly to not initiating at all with other apps and any of the four browsers I have, IE, Chrome, FireFox & Safari. The browsers initiate but then become non-responsive.

I got the invite/upgrade for MalwareBytes' AntiMalware 30 day offer several days ago, accepted and was thrilled to see the announcements of both incoming and outgoing blockage. During one of my rampage researches, after closing many screens, I noticed a "Norton Free Scan" Dialog box that only had an OK button - no way out! I knew it was a fake and hit Ctrl-Alt-Del to try and rid it, having to finally do a manual ShutDown. The next morning after start-up and opening Firefox, the page shot up announcing I had not completed the scan and didn't I want to continue (shooting from the hip here, most of this is gone from memory and no Screenshots as I thought I was knowledgeable enough to handle it!).
I immediately tried to run the AntiMalware program which went to hourglass but never initiated. Spybot S&D initiated, but upon start of the SCAN, this nasty popup would appear, stopping the SB S&D scan with a "Windows Warning message" dialog box stating:

In Blue header: Windows - No Disk
Below Header, (Beside Red X): Exception Processing Message c0000013 Parameters 75b6bf7c 4 75b6bf7c 75b6bf7c
3 buttons: Cancel, Try Again, Continue

The first two did virtually nothing and If I pressed Continue it would allow SB to continue one or a few lines, before it popped up again. I got up to 90,000 out of 800,000 some odd files that S&D compares before I got tired of that game and gave up. The "Windows - No Disk" Dialog box would not go away even with CTRL-ALT-DEL so the PC would have to be Hard Stopped.

I tried several other tools and nothing...
I tried it in Safe mode with no luck and finally did a restore point from 7 days earlier. Launched into safe mode and then ran MalwareBytes which turned up no malware or virus, Ran BullGuard Anti-virus and got no virus or malware reported,ran SB S&D and suddenly the pop-ups started again!
Ran CFIX.exe for 5 hours finally realizing it was hung.
I'm on day three trying to resolve this and finally got GMER to run successfully, waiting for those results now.
Writing this from my much hated Laptop! Did not transfer the screen shot as I do not want to risk spreading this little bugger. So if you got any insight, on this matter, I'd appreciate the help.

Kindest regards,

The Dawg

Edited by hamluis, 17 July 2011 - 06:19 AM.
Moved from XP to Am I Infected.

DiceDawg

Pickleball Rocks!  :bananas: 


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 17 July 2011 - 11:04 AM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 17 July 2011 - 11:20 PM

Thanks Broni, I will have the info asap!
Hate having to do homework on the laptop!

DiceDawg

Pickleball Rocks!  :bananas: 


#4 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 18 July 2011 - 05:57 AM

Thanks again for your help Broni, I finally got Bullguard to work, but it found nothing so I ran TrendMicro's HouseCall - Free Online Virus Scan and again found nothing.
As soon as I started SecurityCheck, the Windows No Disk Dialog Box popped up, but only once.
While waiting for help, I ran through your Spy-ware Removal Tab and embarrassingly enough found that "System Repair" seemed like the item that was invading me. So I followed those instructions and found maybe a little relief. I would have thought my search efforts would have found that.

Prior to running your instructions I disabled MBAM and BullGuard. Upon trying to Download the newer version of MBAM, it noticed I was already a user and only would allow a subscription. So I used the one on my PC and updated it before running it.

Attached please find the log files requested for assistance.

Thanks again, in advance

The Dawg

DiceDawg

Pickleball Rocks!  :bananas: 


#5 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 18 July 2011 - 06:03 AM

Now I am really feeling stupid or very sleepy, I don't seem to be able to find the upload button for the log files?

DiceDawg

Pickleball Rocks!  :bananas: 


#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 18 July 2011 - 10:56 AM

You have to paste all logs.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 18 July 2011 - 02:05 PM

Security Checkup log:

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

BullGuard
Antivirus out of date! (On Access scanning disabled!)
```````````````````````````````
Anti-malware/Other Utilities Check:

MVPS Hosts File
Out of date HijackThis installed!
Malwarebytes' Anti-Malware
HijackThis 1.99.1
CCleaner
Java™ 6 Update 26
Out of date Java installed!
Adobe Flash Player 10.3.181.26
Adobe Reader 9.4.5
Out of date Adobe Reader installed!
Mozilla Firefox (3.6.18)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Malwarebytes' Anti-Malware mbamservice.exe
Malwarebytes' Anti-Malware mbamgui.exe
``````````End of Log````````````
---------------------------------------------------------------------
MiniToolBox by Farbar
Ran by K (administrator) on 18-07-2011 at 00:38:55
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

127.0.0.1 localhost
# Start of entries inserted by Spybot - Search & Destroy
Deleted these Entries - The DAWG!
# End of entries inserted by Spybot - Search & Destroy

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : kae-desktop

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-E0-4D-71-47-0A

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.0.3

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.0.1

DHCP Server . . . . . . . . . . . : 192.168.0.1

DNS Servers . . . . . . . . . . . : 65.32.5.111

65.32.5.112

Lease Obtained. . . . . . . . . . : Monday, July 18, 2011 12:20:53 AM

Lease Expires . . . . . . . . . . : Monday, July 18, 2011 1:20:53 AM

Server: dns-redir-lb-01.tampabay.rr.com
Address: 65.32.5.111

Name: google.com
Addresses: 74.125.45.99, 74.125.45.103, 74.125.45.104, 74.125.45.105
74.125.45.106, 74.125.45.147



Pinging google.com [74.125.67.103] with 32 bytes of data:



Reply from 74.125.67.103: bytes=32 time=30ms TTL=54

Reply from 74.125.67.103: bytes=32 time=31ms TTL=54



Ping statistics for 74.125.67.103:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 30ms, Maximum = 31ms, Average = 30ms

Server: dns-redir-lb-01.tampabay.rr.com
Address: 65.32.5.111

Name: yahoo.com
Addresses: 69.147.125.65, 72.30.2.43, 98.137.149.56, 209.191.122.70
67.195.160.76



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=36ms TTL=55

Reply from 209.191.122.70: bytes=32 time=36ms TTL=55



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 36ms, Maximum = 36ms, Average = 36ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 e0 4d 71 47 0a ...... VIA Compatable Fast Ethernet Adapter - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.3 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.0.3 192.168.0.3 20
192.168.0.0 255.255.255.0 192.168.0.3 192.168.0.3 20
192.168.0.3 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.0.255 255.255.255.255 192.168.0.3 192.168.0.3 20
224.0.0.0 240.0.0.0 192.168.0.3 192.168.0.3 20
255.255.255.255 255.255.255.255 192.168.0.3 192.168.0.3 1
Default Gateway: 192.168.0.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/17/2011 06:17:37 PM) (Source: ESENT) (User: )
Description: wuaueng.dll (2716) SUS20ClientDataStore: Error -1032 (0xfffffbf8) occurred while opening logfile H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log.

Error: (07/17/2011 06:17:37 PM) (Source: ESENT) (User: )
Description: wuauclt (2716) An attempt to open the file "H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).

Error: (07/17/2011 06:17:27 PM) (Source: ESENT) (User: )
Description: wuaueng.dll (2716) SUS20ClientDataStore: Error -1032 (0xfffffbf8) occurred while opening logfile H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log.

Error: (07/17/2011 06:17:27 PM) (Source: ESENT) (User: )
Description: wuauclt (2716) An attempt to open the file "H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).

Error: (07/17/2011 06:17:13 PM) (Source: ESENT) (User: )
Description: wuaueng.dll (472) SUS20ClientDataStore: Error -1032 (0xfffffbf8) occurred while opening logfile H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log.

Error: (07/17/2011 06:17:13 PM) (Source: ESENT) (User: )
Description: wuauclt (472) An attempt to open the file "H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).

Error: (07/17/2011 06:17:03 PM) (Source: ESENT) (User: )
Description: wuaueng.dll (472) SUS20ClientDataStore: Error -1032 (0xfffffbf8) occurred while opening logfile H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log.

Error: (07/17/2011 06:17:03 PM) (Source: ESENT) (User: )
Description: wuauclt (472) An attempt to open the file "H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).

Error: (07/17/2011 06:16:50 PM) (Source: ESENT) (User: )
Description: wuaueng.dll (2012) SUS20ClientDataStore: Error -1032 (0xfffffbf8) occurred while opening logfile H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log.

Error: (07/17/2011 06:16:50 PM) (Source: ESENT) (User: )
Description: wuauclt (2012) An attempt to open the file "H:\WINDOWS\SoftwareDistribution\DataStore\Logs\edb.log" for read only access failed with system error 32 (0x00000020): "The process cannot access the file because it is being used by another process. ". The open file operation will fail with error -1032 (0xfffffbf8).


System errors:
=============
Error: (07/16/2011 09:12:49 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (07/16/2011 08:53:30 PM) (Source: DCOM) (User: Administrator)
Description: DCOM got error "%%1084" attempting to start the service StiSvc with arguments ""
in order to run the server:
{A1F4E726-8CF1-11D1-BF92-0060081ED811}

Error: (07/16/2011 08:37:31 PM) (Source: DCOM) (User: Administrator)
Description: DCOM got error "%%1084" attempting to start the service StiSvc with arguments ""
in order to run the server:
{A1F4E726-8CF1-11D1-BF92-0060081ED811}

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
AFD
BdSpy
Fips
i8042prt
intelppm
IPSec
MRxSmb
NetBIOS
NetBT
NovaShieldFilterDriver
NovaShieldTDIDriver
RasAcd
Rdbss
Tcpip
WS2IFSL

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error:
%%31

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The Bonjour Service service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The Apple Mobile Device service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The Cisco AnyConnect VPN Agent service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error:
%%31

Error: (07/16/2011 08:37:25 PM) (Source: Service Control Manager) (User: )
Description: The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31


Microsoft Office Sessions:
=========================
Error: (07/02/2010 11:48:44 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 6, Application Name: Microsoft Office Outlook, Application Version: 12.0.6514.5000, Microsoft Office Version: 12.0.6425.1000. This session lasted 128541 seconds with 8580 seconds of active time. This session ended with a crash.

Error: (06/23/2010 06:33:43 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6524.5003, Microsoft Office Version: 12.0.6425.1000. This session lasted 2690 seconds with 1080 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 49%
Total physical RAM: 2046.42 MB
Available physical RAM: 1033.71 MB
Total Pagefile: 3939.36 MB
Available Pagefile: 3261.53 MB
Total Virtual: 2047.88 MB
Available Virtual: 1994.99 MB

========================= Partitions: =====================================

7 Drive h: () (Fixed) (Total:141.6 GB) (Free:80.71 GB) NTFS
8 Drive i: () (Fixed) (Total:7.44 GB) (Free:7.4 GB) NTFS
9 Drive j: (PEN DRIVE) (Removable) (Total:0.24 GB) (Free:0.17 GB) FAT

========================= Users: ========================================

User accounts for \\KAE-DESKTOP

Administrator Guest HelpAssistant
K SUPPORT_388945a0


== End of log ==
```````````````````````````````````````````````````````````````````````````````````````````````````````
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7186

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/18/2011 12:47:19 AM
mbam-log-2011-07-18 (00-47-19).txt

Scan type: Quick scan
Objects scanned: 202765
Time elapsed: 4 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
----------------------------------------------------------------------------------------------------
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-18 06:10:25
Windows 5.1.2600 Service Pack 3
Running: ljkued7z.exe; Driver: H:\DOCUME~1\K\LOCALS~1\Temp\pwlorpow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwAllocateUserPhysicalPages [0xB461EFAA]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwAllocateVirtualMemory [0xB4617E1E]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwAreMappedFilesTheSame [0xB461F0BD]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwCreateKey [0xB46185F4]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwCreateProcess [0xB46189C8]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwCreateSection [0xB4618B27]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwDeleteKey [0xB4619045]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwDeleteValueKey [0xB4619133]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwExtendSection [0xB4619548]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwMapUserPhysicalPages [0xB461F77D]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwMapViewOfSection [0xB461A023]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwOpenProcess [0xB461A6B3]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwOpenSection [0xB461A7BC]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwProtectVirtualMemory [0xB461AD04]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwQuerySection [0xB461BA1F]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwReadVirtualMemory [0xB461C488]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwRenameKey [0xB463B004]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwReplaceKey [0xB461C72A]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwSetInformationKey [0xB461D121]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwSetInformationProcess [0xB461D23D]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwSetValueKey [0xB461DA07]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwTerminateProcess [0xB461DE41]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwUnmapViewOfSection [0xB461E1AD]
SSDT \SystemRoot\system32\DRIVERS\NSKernel.sys (NovaShield Kernel Module /NovaShield, Inc.) ZwWriteVirtualMemory [0xB461E6B5]

---- Kernel code sections - GMER 1.0.15 ----

.text H:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB6FB4380, 0x566465, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text H:\WINDOWS\system32\SearchIndexer.exe[136] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C H:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \SystemRoot\system32\DRIVERS\ndiswan.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\system32\DRIVERS\raspppoe.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\system32\DRIVERS\psched.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\System32\Drivers\NDProxy.SYS[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisOpenAdapter] [B6EE7182] \SystemRoot\system32\DRIVERS\afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

---- User IAT/EAT - GMER 1.0.15 ----

IAT H:\Program Files\Skype\Phone\Skype.exe[1672] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateFile] [08962F20] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\Program Files\Skype\Phone\Skype.exe[1672] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDeviceIoControlFile] [08962C90] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\Program Files\Skype\Phone\Skype.exe[1672] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtClose] [08962CF0] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\Program Files\Skype\Phone\Skype.exe[1672] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDuplicateObject] [08962CC0] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\WINDOWS\explorer.exe[2392] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateFile] [00C42F20] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\WINDOWS\explorer.exe[2392] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDeviceIoControlFile] [00C42C90] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\WINDOWS\explorer.exe[2392] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtClose] [00C42CF0] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)
IAT H:\WINDOWS\explorer.exe[2392] @ H:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtDuplicateObject] [00C42CC0] H:\WINDOWS\TEMP\logishrd\LVPrcInj01.dll (Camera Helper Library./Logitech Inc.)

---- Devices - GMER 1.0.15 ----

Device \Driver\Tcpip \Device\Ip afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
Device \Driver\Tcpip \Device\Tcp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
Device \Driver\Tcpip \Device\Udp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
Device \Driver\Tcpip \Device\RawIp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)
Device \Driver\Tcpip \Device\IPMULTICAST afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\BTHPORT\Parameters\Keys\001bdc0ff803 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\001bdc0ff803 (not active ControlSet)
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001bdc0ff803
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@AppInit_DLLs H:\WINDOWS\system32\BgGamingMonitor.dll

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk1\DR3 sector 00: rootkit-like behavior

---- EOF - GMER 1.0.15 ----

DiceDawg

Pickleball Rocks!  :bananas: 


#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 18 July 2011 - 02:08 PM

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 18 July 2011 - 04:40 PM

TDSS rootkit removing tool Results:

2011/07/18 17:35:33.0375 2676 TDSS rootkit removing tool 2.5.11.0 Jul 11 2011 16:56:56
2011/07/18 17:35:34.0296 2676 ================================================================================
2011/07/18 17:35:34.0296 2676 SystemInfo:
2011/07/18 17:35:34.0296 2676
2011/07/18 17:35:34.0296 2676 OS Version: 5.1.2600 ServicePack: 3.0
2011/07/18 17:35:34.0296 2676 Product type: Workstation
2011/07/18 17:35:34.0296 2676 ComputerName: KAE-DESKTOP
2011/07/18 17:35:34.0296 2676 UserName: K
2011/07/18 17:35:34.0296 2676 Windows directory: H:\WINDOWS
2011/07/18 17:35:34.0296 2676 System windows directory: H:\WINDOWS
2011/07/18 17:35:34.0296 2676 Processor architecture: Intel x86
2011/07/18 17:35:34.0296 2676 Number of processors: 2
2011/07/18 17:35:34.0296 2676 Page size: 0x1000
2011/07/18 17:35:34.0296 2676 Boot type: Normal boot
2011/07/18 17:35:34.0296 2676 ================================================================================
2011/07/18 17:35:35.0812 2676 Initialize success
2011/07/18 17:35:54.0609 3020 ================================================================================
2011/07/18 17:35:54.0609 3020 Scan started
2011/07/18 17:35:54.0609 3020 Mode: Manual;
2011/07/18 17:35:54.0609 3020 ================================================================================
2011/07/18 17:35:55.0656 3020 ACPI (8fd99680a539792a30e97944fdaecf17) H:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/07/18 17:35:55.0921 3020 ACPIEC (9859c0f6936e723e4892d7141b1327d5) H:\WINDOWS\system32\drivers\ACPIEC.sys
2011/07/18 17:35:56.0375 3020 aec (8bed39e3c35d6a489438b8141717a557) H:\WINDOWS\system32\drivers\aec.sys
2011/07/18 17:35:56.0687 3020 AFD (355556d9e580915118cd7ef736653a89) H:\WINDOWS\System32\drivers\afd.sys
2011/07/18 17:35:56.0937 3020 afw (14ba5ca5d11771ce8e8b6cc6830a2436) H:\WINDOWS\system32\DRIVERS\afw.sys
2011/07/18 17:35:57.0218 3020 afwcore (1f3d61965a9bd278a205d3062176e45c) H:\WINDOWS\system32\DRIVERS\afwcore.sys
2011/07/18 17:35:58.0781 3020 Ambfilt (267fc636801edc5ab28e14036349e3be) H:\WINDOWS\system32\drivers\Ambfilt.sys
2011/07/18 17:36:00.0406 3020 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) H:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/07/18 17:36:00.0671 3020 atapi (9f3a2f5aa6875c72bf062c712cfa2674) H:\WINDOWS\system32\DRIVERS\atapi.sys
2011/07/18 17:36:01.0093 3020 Atmarpc (9916c1225104ba14794209cfa8012159) H:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/07/18 17:36:01.0343 3020 audstub (d9f724aa26c010a217c97606b160ed68) H:\WINDOWS\system32\DRIVERS\audstub.sys
2011/07/18 17:36:01.0593 3020 BdSpy (42175a3b56922a8c9a294fa6f0b18344) H:\WINDOWS\system32\DRIVERS\BdSpy.sys
2011/07/18 17:36:01.0812 3020 Beep (da1f27d85e0d1525f6621372e7b685e9) H:\WINDOWS\system32\drivers\Beep.sys
2011/07/18 17:36:02.0171 3020 BthEnum (b279426e3c0c344893ed78a613a73bde) H:\WINDOWS\system32\DRIVERS\BthEnum.sys
2011/07/18 17:36:02.0406 3020 BthPan (80602b8746d3738f5886ce3d67ef06b6) H:\WINDOWS\system32\DRIVERS\bthpan.sys
2011/07/18 17:36:02.0734 3020 BTHPORT (662bfd909447dd9cc15b1a1c366583b4) H:\WINDOWS\system32\Drivers\BTHport.sys
2011/07/18 17:36:03.0015 3020 BTHUSB (61364cd71ef63b0f038b7e9df00f1efa) H:\WINDOWS\system32\Drivers\BTHUSB.sys
2011/07/18 17:36:03.0406 3020 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) H:\WINDOWS\system32\drivers\cbidf2k.sys
2011/07/18 17:36:03.0625 3020 CCDECODE (0be5aef125be881c4f854c554f2b025c) H:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/07/18 17:36:04.0062 3020 Cdaudio (c1b486a7658353d33a10cc15211a873b) H:\WINDOWS\system32\drivers\Cdaudio.sys
2011/07/18 17:36:04.0296 3020 Cdfs (c885b02847f5d2fd45a24e219ed93b32) H:\WINDOWS\system32\drivers\Cdfs.sys
2011/07/18 17:36:04.0515 3020 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) H:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/07/18 17:36:06.0093 3020 Disk (044452051f3e02e7963599fc8f4f3e25) H:\WINDOWS\system32\DRIVERS\disk.sys
2011/07/18 17:36:06.0546 3020 dmboot (d992fe1274bde0f84ad826acae022a41) H:\WINDOWS\system32\drivers\dmboot.sys
2011/07/18 17:36:07.0046 3020 dmio (7c824cf7bbde77d95c08005717a95f6f) H:\WINDOWS\system32\drivers\dmio.sys
2011/07/18 17:36:07.0265 3020 dmload (e9317282a63ca4d188c0df5e09c6ac5f) H:\WINDOWS\system32\drivers\dmload.sys
2011/07/18 17:36:07.0531 3020 DMusic (8a208dfcf89792a484e76c40e5f50b45) H:\WINDOWS\system32\drivers\DMusic.sys
2011/07/18 17:36:07.0968 3020 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) H:\WINDOWS\system32\drivers\drmkaud.sys
2011/07/18 17:36:08.0265 3020 Fastfat (38d332a6d56af32635675f132548343e) H:\WINDOWS\system32\drivers\Fastfat.sys
2011/07/18 17:36:08.0531 3020 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) H:\WINDOWS\system32\DRIVERS\fdc.sys
2011/07/18 17:36:08.0765 3020 FET5X86V (52fa46ae36caafc6e1ff4fd617dfd25d) H:\WINDOWS\system32\DRIVERS\fetnd5bv.sys
2011/07/18 17:36:09.0031 3020 FETNDIS (e9648254056bce81a85380c0c3647dc4) H:\WINDOWS\system32\DRIVERS\fetnd5.sys
2011/07/18 17:36:09.0250 3020 FilterService (b73ec688c29f81f9da0fcf63682b3ecb) H:\WINDOWS\system32\DRIVERS\lvuvcflt.sys
2011/07/18 17:36:09.0468 3020 Fips (d45926117eb9fa946a6af572fbe1caa3) H:\WINDOWS\system32\drivers\Fips.sys
2011/07/18 17:36:09.0687 3020 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) H:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/07/18 17:36:09.0937 3020 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) H:\WINDOWS\system32\drivers\fltmgr.sys
2011/07/18 17:36:10.0187 3020 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) H:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/07/18 17:36:10.0437 3020 Ftdisk (6ac26732762483366c3969c9e4d2259d) H:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/07/18 17:36:10.0687 3020 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) H:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
2011/07/18 17:36:10.0906 3020 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) H:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/07/18 17:36:11.0187 3020 HDAudBus (573c7d0a32852b48f3058cfd8026f511) H:\WINDOWS\system32\DRIVERS\HDAudBus.sys
2011/07/18 17:36:11.0437 3020 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) H:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/07/18 17:36:11.0953 3020 HTTP (f80a415ef82cd06ffaf0d971528ead38) H:\WINDOWS\system32\Drivers\HTTP.sys
2011/07/18 17:36:12.0593 3020 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) H:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/07/18 17:36:12.0859 3020 Imapi (083a052659f5310dd8b6a6cb05edcf8e) H:\WINDOWS\system32\DRIVERS\imapi.sys
2011/07/18 17:36:15.0093 3020 IntcAzAudAddService (718f495096df8d94fb66c9c962646372) H:\WINDOWS\system32\drivers\RtkHDAud.sys
2011/07/18 17:36:15.0578 3020 intelppm (8c953733d8f36eb2133f5bb58808b66b) H:\WINDOWS\system32\DRIVERS\intelppm.sys
2011/07/18 17:36:15.0812 3020 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) H:\WINDOWS\system32\drivers\ip6fw.sys
2011/07/18 17:36:16.0062 3020 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) H:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/07/18 17:36:16.0328 3020 IpInIp (b87ab476dcf76e72010632b5550955f5) H:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/07/18 17:36:16.0593 3020 IpNat (cc748ea12c6effde940ee98098bf96bb) H:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/07/18 17:36:16.0875 3020 IPSec (23c74d75e36e7158768dd63d92789a91) H:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/07/18 17:36:17.0109 3020 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) H:\WINDOWS\system32\DRIVERS\irenum.sys
2011/07/18 17:36:17.0343 3020 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) H:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/07/18 17:36:17.0593 3020 Kbdclass (463c1ec80cd17420a542b7f36a36f128) H:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/07/18 17:36:17.0843 3020 kbdhid (9ef487a186dea361aa06913a75b3fa99) H:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/07/18 17:36:18.0109 3020 kmixer (692bcf44383d056aed41b045a323d378) H:\WINDOWS\system32\drivers\kmixer.sys
2011/07/18 17:36:18.0359 3020 KSecDD (b467646c54cc746128904e1654c750c1) H:\WINDOWS\system32\drivers\KSecDD.sys
2011/07/18 17:36:19.0453 3020 lvpopflt (e1158b0cb852db0573922c92e6e564de) H:\WINDOWS\system32\DRIVERS\lvpopflt.sys
2011/07/18 17:36:20.0281 3020 LVPr2Mon (1a7db7a00a4b0d8da24cd691a4547291) H:\WINDOWS\system32\DRIVERS\LVPr2Mon.sys
2011/07/18 17:36:20.0593 3020 LVRS (37072ec9299e825f4335cc554b6fac6a) H:\WINDOWS\system32\DRIVERS\lvrs.sys
2011/07/18 17:36:20.0828 3020 LVUSBSta (be5e104be263921d6842c555db6a5c23) H:\WINDOWS\system32\drivers\LVUSBSta.sys
2011/07/18 17:36:23.0078 3020 LVUVC (a240e42a7402e927a71b6e8aa4629b13) H:\WINDOWS\system32\DRIVERS\lvuvc.sys
2011/07/18 17:36:23.0343 3020 MBAMProtector (3d2c13377763eeac0ca6fb46f57217ed) H:\WINDOWS\system32\drivers\mbam.sys
2011/07/18 17:36:23.0593 3020 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) H:\WINDOWS\system32\drivers\mnmdd.sys
2011/07/18 17:36:23.0828 3020 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) H:\WINDOWS\system32\drivers\Modem.sys
2011/07/18 17:36:24.0484 3020 Monfilt (c7d9f9717916b34c1b00dd4834af485c) H:\WINDOWS\system32\drivers\Monfilt.sys
2011/07/18 17:36:25.0140 3020 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) H:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/07/18 17:36:25.0359 3020 mouhid (b1c303e17fb9d46e87a98e4ba6769685) H:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/07/18 17:36:25.0593 3020 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) H:\WINDOWS\system32\drivers\MountMgr.sys
2011/07/18 17:36:26.0046 3020 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) H:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/07/18 17:36:26.0453 3020 MRxSmb (0dc719e9b15e902346e87e9dcd5751fa) H:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/07/18 17:36:26.0812 3020 Msfs (c941ea2454ba8350021d774daf0f1027) H:\WINDOWS\system32\drivers\Msfs.sys
2011/07/18 17:36:27.0046 3020 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) H:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/07/18 17:36:27.0265 3020 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) H:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/07/18 17:36:27.0484 3020 MSPQM (bad59648ba099da4a17680b39730cb3d) H:\WINDOWS\system32\drivers\MSPQM.sys
2011/07/18 17:36:27.0734 3020 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) H:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/07/18 17:36:27.0968 3020 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) H:\WINDOWS\system32\drivers\MSTEE.sys
2011/07/18 17:36:28.0218 3020 Mup (de6a75f5c270e756c5508d94b6cf68f5) H:\WINDOWS\system32\drivers\Mup.sys
2011/07/18 17:36:28.0468 3020 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) H:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/07/18 17:36:28.0765 3020 NDIS (1df7f42665c94b825322fae71721130d) H:\WINDOWS\system32\drivers\NDIS.sys
2011/07/18 17:36:29.0031 3020 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) H:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/07/18 17:36:29.0250 3020 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) H:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/07/18 17:36:29.0453 3020 Ndisuio (f927a4434c5028758a842943ef1a3849) H:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/07/18 17:36:29.0687 3020 NdisWan (edc1531a49c80614b2cfda43ca8659ab) H:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/07/18 17:36:29.0953 3020 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) H:\WINDOWS\system32\drivers\NDProxy.sys
2011/07/18 17:36:30.0156 3020 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) H:\WINDOWS\system32\DRIVERS\netbios.sys
2011/07/18 17:36:30.0406 3020 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) H:\WINDOWS\system32\DRIVERS\netbt.sys
2011/07/18 17:36:30.0984 3020 NovaShieldFilterDriver (de84e8384d2125ff7f98e5cb7d1a0da0) H:\WINDOWS\system32\DRIVERS\NSKernel.sys
2011/07/18 17:36:31.0187 3020 NovaShieldTDIDriver (b42b5e7fd56da5a27ffa398f158b9784) H:\WINDOWS\system32\DRIVERS\NSNetmon.sys
2011/07/18 17:36:31.0406 3020 Npfs (3182d64ae053d6fb034f44b6def8034a) H:\WINDOWS\system32\drivers\Npfs.sys
2011/07/18 17:36:31.0796 3020 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) H:\WINDOWS\system32\drivers\Ntfs.sys
2011/07/18 17:36:32.0187 3020 Null (73c1e1f395918bc2c6dd67af7591a3ad) H:\WINDOWS\system32\drivers\Null.sys
2011/07/18 17:36:35.0453 3020 nv (cd9ed87b4fc6ec41d3b5be0b923843fc) H:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2011/07/18 17:36:38.0781 3020 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) H:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/07/18 17:36:39.0000 3020 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) H:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/07/18 17:36:39.0296 3020 Parport (5575faf8f97ce5e713d108c2a58d7c7c) H:\WINDOWS\system32\DRIVERS\parport.sys
2011/07/18 17:36:39.0546 3020 PartMgr (beb3ba25197665d82ec7065b724171c6) H:\WINDOWS\system32\drivers\PartMgr.sys
2011/07/18 17:36:39.0781 3020 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) H:\WINDOWS\system32\drivers\ParVdm.sys
2011/07/18 17:36:40.0015 3020 PCI (a219903ccf74233761d92bef471a07b1) H:\WINDOWS\system32\DRIVERS\pci.sys
2011/07/18 17:36:40.0421 3020 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) H:\WINDOWS\system32\DRIVERS\pciide.sys
2011/07/18 17:36:40.0671 3020 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) H:\WINDOWS\system32\drivers\Pcmcia.sys
2011/07/18 17:36:42.0234 3020 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) H:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/07/18 17:36:42.0468 3020 PSched (09298ec810b07e5d582cb3a3f9255424) H:\WINDOWS\system32\DRIVERS\psched.sys
2011/07/18 17:36:42.0703 3020 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) H:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/07/18 17:36:42.0937 3020 PxHelp20 (d86b4a68565e444d76457f14172c875a) H:\WINDOWS\system32\Drivers\PxHelp20.sys
2011/07/18 17:36:44.0171 3020 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) H:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/07/18 17:36:44.0421 3020 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) H:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/07/18 17:36:44.0671 3020 RasPppoe (5bc962f2654137c9909c3d4603587dee) H:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/07/18 17:36:44.0890 3020 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) H:\WINDOWS\system32\DRIVERS\raspti.sys
2011/07/18 17:36:45.0156 3020 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) H:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/07/18 17:36:45.0406 3020 RDPCDD (4912d5b403614ce99c28420f75353332) H:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/07/18 17:36:45.0671 3020 rdpdr (15cabd0f7c00c47c70124907916af3f1) H:\WINDOWS\system32\DRIVERS\rdpdr.sys
2011/07/18 17:36:46.0015 3020 RDPWD (6728e45b66f93c08f11de2e316fc70dd) H:\WINDOWS\system32\drivers\RDPWD.sys
2011/07/18 17:36:46.0296 3020 redbook (f828dd7e1419b6653894a8f97a0094c5) H:\WINDOWS\system32\DRIVERS\redbook.sys
2011/07/18 17:36:46.0562 3020 RFCOMM (851c30df2807fcfa21e4c681a7d6440e) H:\WINDOWS\system32\DRIVERS\rfcomm.sys
2011/07/18 17:36:47.0000 3020 RimVSerPort (d9b34325ee5df78b8f28a3de9f577c7d) H:\WINDOWS\system32\DRIVERS\RimSerial.sys
2011/07/18 17:36:47.0234 3020 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) H:\WINDOWS\system32\Drivers\RootMdm.sys
2011/07/18 17:36:47.0609 3020 Secdrv (90a3935d05b494a5a39d37e71f09a677) H:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/07/18 17:36:47.0859 3020 serenum (0f29512ccd6bead730039fb4bd2c85ce) H:\WINDOWS\system32\DRIVERS\serenum.sys
2011/07/18 17:36:48.0078 3020 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) H:\WINDOWS\system32\DRIVERS\serial.sys
2011/07/18 17:36:48.0359 3020 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) H:\WINDOWS\system32\drivers\Sfloppy.sys
2011/07/18 17:36:48.0812 3020 SLIP (866d538ebe33709a5c9f5c62b73b7d14) H:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/07/18 17:36:49.0250 3020 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) H:\WINDOWS\system32\drivers\splitter.sys
2011/07/18 17:36:49.0500 3020 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) H:\WINDOWS\system32\DRIVERS\sr.sys
2011/07/18 17:36:49.0828 3020 Srv (47ddfc2f003f7f9f0592c6874962a2e7) H:\WINDOWS\system32\DRIVERS\srv.sys
2011/07/18 17:36:50.0156 3020 streamip (77813007ba6265c4b6098187e6ed79d2) H:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/07/18 17:36:50.0375 3020 swenum (3941d127aef12e93addf6fe6ee027e0f) H:\WINDOWS\system32\DRIVERS\swenum.sys
2011/07/18 17:36:50.0609 3020 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) H:\WINDOWS\system32\drivers\swmidi.sys
2011/07/18 17:36:51.0687 3020 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) H:\WINDOWS\system32\drivers\sysaudio.sys
2011/07/18 17:36:52.0062 3020 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) H:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/07/18 17:36:52.0359 3020 TDPIPE (6471a66807f5e104e4885f5b67349397) H:\WINDOWS\system32\drivers\TDPIPE.sys
2011/07/18 17:36:52.0578 3020 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) H:\WINDOWS\system32\drivers\TDTCP.sys
2011/07/18 17:36:52.0812 3020 TermDD (88155247177638048422893737429d9e) H:\WINDOWS\system32\DRIVERS\termdd.sys
2011/07/18 17:36:54.0625 3020 Trufos (d391f1171a2e3a7080df6faae7a20c0b) H:\WINDOWS\system32\DRIVERS\Trufos.sys
2011/07/18 17:36:54.0984 3020 uagp35 (d85938f272d1bcf3db3a31fc0a048928) H:\WINDOWS\system32\DRIVERS\uagp35.sys
2011/07/18 17:36:55.0218 3020 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) H:\WINDOWS\system32\drivers\Udfs.sys
2011/07/18 17:36:55.0781 3020 Update (402ddc88356b1bac0ee3dd1580c76a31) H:\WINDOWS\system32\DRIVERS\update.sys
2011/07/18 17:36:56.0156 3020 USBAAPL (83cafcb53201bbac04d822f32438e244) H:\WINDOWS\system32\Drivers\usbaapl.sys
2011/07/18 17:36:56.0437 3020 usbaudio (e919708db44ed8543a7c017953148330) H:\WINDOWS\system32\drivers\usbaudio.sys
2011/07/18 17:36:56.0656 3020 usbccgp (173f317ce0db8e21322e71b7e60a27e8) H:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/07/18 17:36:56.0906 3020 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) H:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/07/18 17:36:57.0156 3020 usbhub (1ab3cdde553b6e064d2e754efe20285c) H:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/07/18 17:36:57.0390 3020 usbprint (a717c8721046828520c9edf31288fc00) H:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/07/18 17:36:57.0609 3020 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) H:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/07/18 17:36:57.0828 3020 usbstor (a32426d9b14a089eaa1d922e0c5801a9) H:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/07/18 17:36:58.0046 3020 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) H:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/07/18 17:36:58.0343 3020 usbvideo (63bbfca7f390f4c49ed4b96bfb1633e0) H:\WINDOWS\system32\Drivers\usbvideo.sys
2011/07/18 17:36:58.0609 3020 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) H:\WINDOWS\System32\drivers\vga.sys
2011/07/18 17:36:58.0843 3020 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) H:\WINDOWS\system32\DRIVERS\viaide.sys
2011/07/18 17:36:59.0046 3020 videX32 (cbad598bb71ccc9f725ea042d7be4e35) H:\WINDOWS\system32\DRIVERS\videX32.sys
2011/07/18 17:36:59.0281 3020 VolSnap (4c8fcb5cc53aab716d810740fe59d025) H:\WINDOWS\system32\drivers\VolSnap.sys
2011/07/18 17:36:59.0515 3020 vpnva (e1f2333a88ec4a5c8ea6be357323b72d) H:\WINDOWS\system32\DRIVERS\vpnva.sys
2011/07/18 17:36:59.0765 3020 Wanarp (e20b95baedb550f32dd489265c1da1f6) H:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/07/18 17:37:00.0234 3020 wdmaud (6768acf64b18196494413695f0c3a00f) H:\WINDOWS\system32\drivers\wdmaud.sys
2011/07/18 17:37:00.0578 3020 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) H:\WINDOWS\System32\drivers\ws2ifsl.sys
2011/07/18 17:37:00.0843 3020 WSTCODEC (c98b39829c2bbd34e454150633c62c78) H:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/07/18 17:37:01.0109 3020 WudfPf (f15feafffbb3644ccc80c5da584e6311) H:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/07/18 17:37:01.0359 3020 WudfRd (28b524262bce6de1f7ef9f510ba3985b) H:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/07/18 17:37:01.0625 3020 xfilt (8b9d689780063bb988c3e9e791925dcf) H:\WINDOWS\system32\DRIVERS\xfilt.sys
2011/07/18 17:37:01.0734 3020 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
2011/07/18 17:37:01.0937 3020 Boot (0x1200) (643f0eca7146acdff9f386e6504a4ec4) \Device\Harddisk0\DR0\Partition0
2011/07/18 17:37:02.0000 3020 Boot (0x1200) (bb4160c2b1a144851e88c72b2ca64de9) \Device\Harddisk0\DR0\Partition1
2011/07/18 17:37:02.0000 3020 ================================================================================
2011/07/18 17:37:02.0000 3020 Scan finished
2011/07/18 17:37:02.0000 3020 ================================================================================
2011/07/18 17:37:02.0046 2908 Detected object count: 0
2011/07/18 17:37:02.0046 2908 Actual detected object count: 0

DiceDawg

Pickleball Rocks!  :bananas: 


#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 18 July 2011 - 05:22 PM

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
Click the "Scan" button to start scan:
Posted Image

On completion of the scan click "Save log", save it to your desktop and post in your next reply:
Posted Image

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 19 July 2011 - 03:11 AM

aswMBR version 0.9.7.777 Copyright© 2011 AVAST Software
Run date: 2011-07-18 22:15:48
-----------------------------
22:15:48.250 OS Version: Windows 5.1.2600 Service Pack 3
22:15:48.250 Number of processors: 2 586 0x602
22:15:48.250 ComputerName: KAE-DESKTOP UserName: K
22:15:51.562 Initialize success
22:19:40.578 AVAST engine defs: 11071801
22:20:34.640 Disk 0 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
22:20:34.640 Disk 0 Vendor: WDC_WD1600AAJS-22L7A0 01.03E01 Size: 152627MB BusType: 3
22:20:34.640 Device \Driver\usbstor -> DriverStartIo USBSTOR.SYS b8449f26
22:20:34.656 Disk 1 MBR read successfully
22:20:34.671 Disk 1 MBR scan
22:20:34.734 Disk 1 Windows XP default MBR code
22:20:34.734 Disk 1 MBR hidden
22:20:34.765 Disk 1 scanning H:\WINDOWS\system32\drivers
22:20:56.953 Service scanning
22:21:00.484 Disk 1 trace - called modules:
22:21:00.484 ntkrnlpa.exe CLASSPNP.SYS disk.sys hal.dll
22:21:00.484 1 nt!IofCallDriver -> \Device\Harddisk1\DR3[0x8a5cf3c0]
22:21:02.375 AVAST engine scan H:\WINDOWS
22:21:20.750 AVAST engine scan H:\WINDOWS\system32
22:25:34.312 AVAST engine scan H:\WINDOWS\system32\drivers
22:25:59.281 AVAST engine scan H:\Documents and Settings\K
22:42:18.515 AVAST engine scan H:\Documents and Settings\All Users
22:54:49.921 Scan finished successfully
04:09:08.203 Disk 1 MBR has been saved successfully to "H:\Documents and Settings\K\Desktop\MBR.dat"
04:09:08.203 The log file has been saved successfully to "H:\Documents and Settings\K\Desktop\aswMBR.txt"

DiceDawg

Pickleball Rocks!  :bananas: 


#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 19 July 2011 - 06:36 PM

Something is going on there, but to establish exactly what some other tools, not allowed in this forum have to be used.

With the information you have provided I believe you will need help from the malware removal team.
Please make sure that you read the information about getting started first.
Then start a new thread HERE and include or required logs.
Including a link to this thread will be helpful.

Good luck and be patient. Help is on the way!

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 19 July 2011 - 07:16 PM

Thanks for your help Broni,
By the way, am I to close out the aswMBR application, or am I to click on the FIX button?
In the time that has past, I did a search for other trusted online scanners and ran the ESET online scanner that came up with a findings of RegistryBooster But the path is incorrect for several of those findings and that folder has not been used since July of 2010!
So not satisfied that this has done any good.
Scan results:

ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6528
# api_version=3.0.2
# EOSSerial=496cfad8744c234299d98d73912be41b
# end=finished
# remove_checked=true
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2011-07-19 10:20:40
# local_time=2011-07-19 06:20:40 (-0500, Eastern Daylight Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 3
# compatibility_mode=4609 16776553 60 61 0 23303833 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=93820
# found=8
# cleaned=8
# scan_time=10746
H:\Documents and Settings\All Users\Documents\Downloads\registrybooster (1).exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\All Users\Documents\Downloads\registrybooster.exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\All Users\Documents\FixViralProblem\registrybooster (1).exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\All Users\Documents\FixViralProblem\registrybooster.exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\K\My Documents\Downloads\registrybooster (1).exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\K\My Documents\Downloads\registrybooster.exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\K\My Documents\FixViralProblem\registrybooster (1).exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C
H:\Documents and Settings\K\My Documents\FixViralProblem\registrybooster.exe a variant of Win32/RegistryBooster application (deleted - quarantined) 00000000000000000000000000000000 C

DiceDawg

Pickleball Rocks!  :bananas: 


#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:52 PM

Posted 19 July 2011 - 07:31 PM

Close aswMBR and follow my previous reply.

Your computer may be running fine, but because I don't like some scans results, I suggest you travel to malware removal forum.
Better to be sure than sorry.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 Dicedawg

Dicedawg
  • Topic Starter

  • Members
  • 73 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:07:52 PM

Posted 19 July 2011 - 10:17 PM

Again thanks Broni, and I agree that there is no proof that anything has been resolved, I will continue on with your instructions.

DiceDawg

Pickleball Rocks!  :bananas: 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users