Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Internet search redirect and internet explorer ghost


  • Please log in to reply
12 replies to this topic

#1 DCoud

DCoud

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 19 July 2011 - 05:35 PM

Hello,

I have run into a nasty problem, when using the internet and using any search website, google, yahoo, bing, etc.. , I click on a result and it will redirect me to a seemingly random page or a site with similar things that I searched but on a totally different site from where i searched from. This happens no mater which browser i use, IE, firefox, opera, etc..

Another problem is that internet explorer will randomly start up and will not even pop up on my taskbar but sounds( music, advertisements, etc..) will be playing and iexplorer.exe will be in my process, ending the process will make the sounds dissappear. if left running i will eventaully get a message saying IE needs to close.

I am running Windows XP and have tried malwarebytes, superantispyware, and avira antivir. Needless to say, this is very annoying. Anything you can do to help me?

Thanks,

Darryl

BC AdBot (Login to Remove)

 


#2 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 19 July 2011 - 05:51 PM

Also, it appears programs cannot detect that I am connected to the internet, I tried running a setpoint 6.30 install for my wireless mouse and it says I am not connected to the internet. Sorry to string together problems like this.

Thanks,

Darryl

#3 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 19 July 2011 - 08:05 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#4 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 20 July 2011 - 05:07 PM

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
Avira AntiVir Personal - Free Antivirus
Avira successfully updated!
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
CCleaner
Java™ 6 Update 26
Out of date Java installed!
Adobe Flash Player 10.3.181.26
Adobe Reader 9.4.4
Out of date Adobe Reader installed!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Avira Antivir avgnt.exe
Avira Antivir avguard.exe
``````````End of Log````````````

MiniToolBox by Farbar
Ran by Darryl (administrator) on 19-07-2011 at 20:11:46
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Wireless Network Connection"

set address name="Wireless Network Connection" source=dhcp
set dns name="Wireless Network Connection" source=dhcp register=PRIMARY
set wins name="Wireless Network Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : darryl-19fbd42f

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : hickorytech.net



Ethernet adapter Wireless Network Connection:



Connection-specific DNS Suffix . : hickorytech.net

Description . . . . . . . . . . . : Intel® PRO/Wireless 3945ABG Network Connection

Physical Address. . . . . . . . . : 00-19-D2-52-B6-F0

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 10.0.1.3

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 10.0.1.1

DHCP Server . . . . . . . . . . . : 10.0.1.1

DNS Servers . . . . . . . . . . . : 10.0.1.1

Lease Obtained. . . . . . . . . . : Tuesday, July 19, 2011 6:41:34 PM

Lease Expires . . . . . . . . . . : Wednesday, July 20, 2011 6:41:34 PM

Server: UnKnown
Address: 10.0.1.1

Name: google.com
Addresses: 74.125.225.51, 74.125.225.52, 74.125.225.48, 74.125.225.49
74.125.225.50



Pinging google.com [74.125.225.51] with 32 bytes of data:



Reply from 74.125.225.51: bytes=32 time=157ms TTL=54

Reply from 74.125.225.51: bytes=32 time=181ms TTL=54



Ping statistics for 74.125.225.51:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 157ms, Maximum = 181ms, Average = 169ms

Server: UnKnown
Address: 10.0.1.1

Name: yahoo.com
Addresses: 98.137.149.56, 209.191.122.70, 67.195.160.76, 69.147.125.65
72.30.2.43



Pinging yahoo.com [98.137.149.56] with 32 bytes of data:



Reply from 98.137.149.56: bytes=32 time=345ms TTL=44

Reply from 98.137.149.56: bytes=32 time=281ms TTL=44



Ping statistics for 98.137.149.56:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 281ms, Maximum = 345ms, Average = 313ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 19 d2 52 b6 f0 ...... Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.0.1.1 10.0.1.3 25
10.0.1.0 255.255.255.0 10.0.1.3 10.0.1.3 25
10.0.1.3 255.255.255.255 127.0.0.1 127.0.0.1 25
10.255.255.255 255.255.255.255 10.0.1.3 10.0.1.3 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.0.1.3 10.0.1.3 25
255.255.255.255 255.255.255.255 10.0.1.3 10.0.1.3 1
Default Gateway: 10.0.1.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/19/2011 00:28:31 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module mshtml.dll, version 7.0.6000.17098, fault address 0x00096f1d.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/18/2011 10:37:11 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module mshtml.dll, version 7.0.6000.17098, fault address 0x000b23ff.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/18/2011 09:18:55 PM) (Source: BugSplat) (User: )
Description: Pando_WinPando-1

Error: (07/07/2011 05:49:29 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module unknown, version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/06/2011 05:40:24 AM) (Source: Application Hang) (User: )
Description: Hanging application vlc.exe, version 1.1.5.0, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (07/04/2011 05:04:23 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module unknown, version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/04/2011 00:41:49 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module mshtml.dll, version 7.0.6000.17098, fault address 0x0007c45d.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/03/2011 11:32:44 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x000113c2.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/03/2011 05:18:51 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module ntdll.dll, version 5.1.2600.6055, fault address 0x0003729b.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/02/2011 00:24:03 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 7.0.6000.17098, faulting module msls31.dll, version 3.10.349.0, fault address 0x0000a6db.
Processing media-specific event for [iexplore.exe!ws!]


System errors:
=============
Error: (07/17/2011 10:23:12 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.0.1.3 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (07/16/2011 03:56:31 AM) (Source: Dhcp) (User: )
Description: The IP address lease 10.0.1.3 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (07/15/2011 05:33:27 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.1.6 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 10.0.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (07/13/2011 03:41:28 AM) (Source: Dhcp) (User: )
Description: The IP address lease 10.0.1.3 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (07/05/2011 10:51:49 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.1.125 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (07/04/2011 11:16:13 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.0.1.3 for the Network Card with network address 0019D252B6F0 has been
denied by the DHCP server 192.168.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (07/04/2011 01:15:46 PM) (Source: Service Control Manager) (User: )
Description: The IMAPI CD-Burning COM Service service failed to start due to the following error:
%%1053

Error: (07/04/2011 01:15:46 PM) (Source: Service Control Manager) (User: )
Description: Timeout (30000 milliseconds) waiting for the IMAPI CD-Burning COM Service service to connect.

Error: (06/25/2011 00:51:26 AM) (Source: Dhcp) (User: )
Description: Your computer has lost the lease to its IP address 192.168.1.5 on the
Network Card with network address 0019D252B6F0.

Error: (06/23/2011 05:42:32 AM) (Source: Service Control Manager) (User: )
Description: The SASDIFSV service failed to start due to the following error:
%%183


Microsoft Office Sessions:
=========================
Error: (07/19/2011 00:28:31 AM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098mshtml.dll7.0.6000.1709800096f1d

Error: (07/18/2011 10:37:11 PM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098mshtml.dll7.0.6000.17098000b23ff

Error: (07/18/2011 09:18:55 PM) (Source: BugSplat)(User: )
Description: Pando_WinPando-1

Error: (07/07/2011 05:49:29 PM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098unknown0.0.0.000000000

Error: (07/06/2011 05:40:24 AM) (Source: Application Hang)(User: )
Description: vlc.exe1.1.5.0hungapp0.0.0.000000000

Error: (07/04/2011 05:04:23 AM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098unknown0.0.0.000000000

Error: (07/04/2011 00:41:49 AM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098mshtml.dll7.0.6000.170980007c45d

Error: (07/03/2011 11:32:44 AM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098ntdll.dll5.1.2600.6055000113c2

Error: (07/03/2011 05:18:51 AM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098ntdll.dll5.1.2600.60550003729b

Error: (07/02/2011 00:24:03 PM) (Source: Application Error)(User: )
Description: iexplore.exe7.0.6000.17098msls31.dll3.10.349.00000a6db


========================= Memory info: ===================================

Percentage of memory in use: 26%
Total physical RAM: 2047.23 MB
Available physical RAM: 1501.59 MB
Total Pagefile: 3940.2 MB
Available Pagefile: 3332.45 MB
Total Virtual: 2047.88 MB
Available Virtual: 2000.47 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:93.15 GB) (Free:5.13 GB) NTFS

========================= Users: ========================================

User accounts for \\DARRYL-19FBD42F

Administrator ASPNET Darryl
Guest HelpAssistant SUPPORT_388945a0


== End of log ==

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7207

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

7/19/2011 8:52:45 PM
mbam-log-2011-07-19 (20-52-45).txt

Scan type: Quick scan
Objects scanned: 154995
Time elapsed: 5 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-20 17:05:18
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST9100828AS rev.3.ALB
Running: 0epnqyye.exe; Driver: C:\DOCUME~1\Darryl\LOCALS~1\Temp\afkyypog.sys


---- System - GMER 1.0.15 ----

SSDT BA7E5164 ZwClose
SSDT BA7E511E ZwCreateKey
SSDT BA7E516E ZwCreateSection
SSDT BA7E5114 ZwCreateThread
SSDT BA7E5123 ZwDeleteKey
SSDT BA7E512D ZwDeleteValueKey
SSDT BA7E515F ZwDuplicateObject
SSDT BA7E514B ZwLoadDriver
SSDT BA7E5132 ZwLoadKey
SSDT BA7E5100 ZwOpenProcess
SSDT BA7E5105 ZwOpenThread
SSDT BA7E513C ZwReplaceKey
SSDT BA7E5137 ZwRestoreKey
SSDT BA7E5173 ZwSetContextThread
SSDT BA7E5150 ZwSetSystemInformation
SSDT BA7E5128 ZwSetValueKey
SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xA3404620]

---- Kernel code sections - GMER 1.0.15 ----

INITc VolSnap.sys BA0F3BD0 4 Bytes [B0, A5, 53, 80]
INITc VolSnap.sys BA0F3BF8 4 Bytes [B8, A1, 4F, 80]
INITc VolSnap.sys BA0F3C20 4 Bytes [B6, AE, 4F, 80]
INITc VolSnap.sys BA0F3C48 4 Bytes [30, FF, 4F, 80]
INITc VolSnap.sys BA0F3C70 4 Bytes [7A, A8, 4F, 80]
INITc ...

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

---- Threads - GMER 1.0.15 ----

Thread System [4:116] 8A8C9E7A
Thread System [4:120] 8A8CC008

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x0B 0xE8 0x74 0xEC ...
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xD0 0x3A 0x1E 0x5E ...
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x92 0xBC 0xF5 0xF8 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x0B 0xE8 0x74 0xEC ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xD0 0x3A 0x1E 0x5E ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x92 0xBC 0xF5 0xF8 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x0B 0xE8 0x74 0xEC ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xD0 0x3A 0x1E 0x5E ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x92 0xBC 0xF5 0xF8 ...

---- EOF - GMER 1.0.15 ----

#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 20 July 2011 - 07:00 PM

Your internet connection seems to be OK. "Ping" command reaches Google and Yahoo no problem.

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#6 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 21 July 2011 - 07:31 AM

2011/07/20 19:09:27.0000 2300 TDSS rootkit removing tool 2.5.11.0 Jul 11 2011 16:56:56
2011/07/20 19:09:27.0421 2300 ================================================================================
2011/07/20 19:09:27.0421 2300 SystemInfo:
2011/07/20 19:09:27.0421 2300
2011/07/20 19:09:27.0421 2300 OS Version: 5.1.2600 ServicePack: 3.0
2011/07/20 19:09:27.0421 2300 Product type: Workstation
2011/07/20 19:09:27.0421 2300 ComputerName: DARRYL-19FBD42F
2011/07/20 19:09:27.0421 2300 UserName: Darryl
2011/07/20 19:09:27.0421 2300 Windows directory: C:\windows
2011/07/20 19:09:27.0421 2300 System windows directory: C:\windows
2011/07/20 19:09:27.0421 2300 Processor architecture: Intel x86
2011/07/20 19:09:27.0421 2300 Number of processors: 2
2011/07/20 19:09:27.0421 2300 Page size: 0x1000
2011/07/20 19:09:27.0421 2300 Boot type: Normal boot
2011/07/20 19:09:27.0421 2300 ================================================================================
2011/07/20 19:09:37.0312 2300 Initialize success
2011/07/20 19:09:41.0000 2848 ================================================================================
2011/07/20 19:09:41.0000 2848 Scan started
2011/07/20 19:09:41.0000 2848 Mode: Manual;
2011/07/20 19:09:41.0000 2848 ================================================================================
2011/07/20 19:09:50.0046 2848 ACPI (8fd99680a539792a30e97944fdaecf17) C:\windows\system32\DRIVERS\ACPI.sys
2011/07/20 19:09:51.0312 2848 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\windows\system32\DRIVERS\ACPIEC.sys
2011/07/20 19:09:54.0062 2848 aec (8bed39e3c35d6a489438b8141717a557) C:\windows\system32\drivers\aec.sys
2011/07/20 19:09:55.0562 2848 AFD (355556d9e580915118cd7ef736653a89) C:\windows\System32\drivers\afd.sys
2011/07/20 19:10:01.0500 2848 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\windows\system32\DRIVERS\arp1394.sys
2011/07/20 19:10:05.0640 2848 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\windows\system32\DRIVERS\asyncmac.sys
2011/07/20 19:10:07.0000 2848 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\windows\system32\DRIVERS\atapi.sys
2011/07/20 19:10:10.0812 2848 ati2mtag (fd6d77a3070a57308d87a7d57144aae0) C:\windows\system32\DRIVERS\ati2mtag.sys
2011/07/20 19:10:12.0062 2848 Atmarpc (9916c1225104ba14794209cfa8012159) C:\windows\system32\DRIVERS\atmarpc.sys
2011/07/20 19:10:13.0406 2848 audstub (d9f724aa26c010a217c97606b160ed68) C:\windows\system32\DRIVERS\audstub.sys
2011/07/20 19:10:14.0203 2848 avgio (0b497c79824f8e1bf22fa6aacd3de3a0) C:\Program Files\Avira\AntiVir Desktop\avgio.sys
2011/07/20 19:10:15.0500 2848 avgntflt (1e4114685de1ffa9675e09c6a1fb3f4b) C:\windows\system32\DRIVERS\avgntflt.sys
2011/07/20 19:10:16.0968 2848 avipbb (0f78d3dae6dedd99ae54c9491c62adf2) C:\windows\system32\DRIVERS\avipbb.sys
2011/07/20 19:10:18.0296 2848 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\windows\system32\drivers\Beep.sys
2011/07/20 19:10:19.0968 2848 Cam5603D (273daec27d2aaddc0e7918c35ffa15e3) C:\windows\system32\Drivers\BisonCam.sys
2011/07/20 19:10:22.0875 2848 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\windows\system32\drivers\cbidf2k.sys
2011/07/20 19:10:24.0234 2848 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\windows\system32\DRIVERS\CCDECODE.sys
2011/07/20 19:10:26.0531 2848 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\windows\system32\drivers\Cdaudio.sys
2011/07/20 19:10:27.0796 2848 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\windows\system32\drivers\Cdfs.sys
2011/07/20 19:10:29.0265 2848 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\windows\system32\DRIVERS\cdrom.sys
2011/07/20 19:10:31.0625 2848 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\windows\system32\DRIVERS\CmBatt.sys
2011/07/20 19:10:33.0453 2848 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\windows\system32\DRIVERS\compbatt.sys
2011/07/20 19:10:37.0359 2848 Disk (044452051f3e02e7963599fc8f4f3e25) C:\windows\system32\DRIVERS\disk.sys
2011/07/20 19:10:39.0515 2848 dmboot (d992fe1274bde0f84ad826acae022a41) C:\windows\system32\drivers\dmboot.sys
2011/07/20 19:10:41.0921 2848 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\windows\system32\drivers\dmio.sys
2011/07/20 19:10:43.0562 2848 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\windows\system32\drivers\dmload.sys
2011/07/20 19:10:44.0953 2848 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\windows\system32\drivers\DMusic.sys
2011/07/20 19:10:47.0125 2848 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\windows\system32\drivers\drmkaud.sys
2011/07/20 19:10:49.0875 2848 Fastfat (38d332a6d56af32635675f132548343e) C:\windows\system32\drivers\Fastfat.sys
2011/07/20 19:10:51.0234 2848 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\windows\system32\drivers\Fdc.sys
2011/07/20 19:10:52.0546 2848 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\windows\system32\drivers\Fips.sys
2011/07/20 19:10:53.0562 2848 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\windows\system32\drivers\Flpydisk.sys
2011/07/20 19:10:54.0812 2848 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\windows\system32\DRIVERS\fltMgr.sys
2011/07/20 19:10:56.0406 2848 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\windows\system32\drivers\Fs_Rec.sys
2011/07/20 19:10:57.0671 2848 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\windows\system32\DRIVERS\ftdisk.sys
2011/07/20 19:10:59.0171 2848 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\windows\system32\DRIVERS\GEARAspiWDM.sys
2011/07/20 19:11:00.0375 2848 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\windows\system32\DRIVERS\msgpc.sys
2011/07/20 19:11:01.0812 2848 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\windows\system32\DRIVERS\HDAudBus.sys
2011/07/20 19:11:03.0015 2848 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\windows\system32\DRIVERS\hidusb.sys
2011/07/20 19:11:05.0109 2848 HPZid412 (d03d10f7ded688fecf50f8fbf1ea9b8a) C:\windows\system32\DRIVERS\HPZid412.sys
2011/07/20 19:11:06.0515 2848 HPZipr12 (89f41658929393487b6b7d13c8528ce3) C:\windows\system32\DRIVERS\HPZipr12.sys
2011/07/20 19:11:07.0968 2848 HPZius12 (abcb05ccdbf03000354b9553820e39f8) C:\windows\system32\DRIVERS\HPZius12.sys
2011/07/20 19:11:09.0484 2848 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\windows\system32\Drivers\HTTP.sys
2011/07/20 19:11:12.0921 2848 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\windows\system32\DRIVERS\i8042prt.sys
2011/07/20 19:11:14.0218 2848 IFXTPM (0a359837e021bc04a04a6fd189492c65) C:\windows\system32\DRIVERS\IFXTPM.SYS
2011/07/20 19:11:15.0515 2848 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\windows\system32\DRIVERS\imapi.sys
2011/07/20 19:11:22.0265 2848 IntcAzAudAddService (a575138ad572c12cffa122b89a382b7e) C:\windows\system32\drivers\RtkHDAud.sys
2011/07/20 19:11:24.0375 2848 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\windows\system32\DRIVERS\intelppm.sys
2011/07/20 19:11:25.0531 2848 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\windows\system32\DRIVERS\Ip6Fw.sys
2011/07/20 19:11:26.0796 2848 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\windows\system32\DRIVERS\ipinip.sys
2011/07/20 19:11:28.0031 2848 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\windows\system32\DRIVERS\ipnat.sys
2011/07/20 19:11:29.0296 2848 IPSec (23c74d75e36e7158768dd63d92789a91) C:\windows\system32\DRIVERS\ipsec.sys
2011/07/20 19:11:30.0484 2848 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\windows\system32\DRIVERS\irenum.sys
2011/07/20 19:11:31.0640 2848 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\windows\system32\DRIVERS\isapnp.sys
2011/07/20 19:11:33.0062 2848 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\windows\system32\DRIVERS\kbdclass.sys
2011/07/20 19:11:34.0312 2848 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\windows\system32\DRIVERS\kbdhid.sys
2011/07/20 19:11:35.0671 2848 kmixer (692bcf44383d056aed41b045a323d378) C:\windows\system32\drivers\kmixer.sys
2011/07/20 19:11:36.0828 2848 KSecDD (b467646c54cc746128904e1654c750c1) C:\windows\system32\drivers\KSecDD.sys
2011/07/20 19:11:39.0078 2848 LHidFilt (8b30311241f97b35167afe68d79e8530) C:\windows\system32\DRIVERS\LHidFilt.Sys
2011/07/20 19:11:40.0359 2848 LMouFilt (48d7422a6c4eec886b56ac534cfa3acf) C:\windows\system32\DRIVERS\LMouFilt.Sys
2011/07/20 19:11:41.0468 2848 LUsbFilt (0b808ff2f17c8396fb2ae202f75aed37) C:\windows\system32\Drivers\LUsbFilt.Sys
2011/07/20 19:11:42.0781 2848 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\windows\system32\drivers\mnmdd.sys
2011/07/20 19:11:44.0000 2848 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\windows\system32\drivers\Modem.sys
2011/07/20 19:11:44.0968 2848 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\windows\system32\DRIVERS\mouclass.sys
2011/07/20 19:11:46.0265 2848 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\windows\system32\DRIVERS\mouhid.sys
2011/07/20 19:11:47.0421 2848 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\windows\system32\drivers\MountMgr.sys
2011/07/20 19:11:49.0343 2848 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\windows\system32\DRIVERS\mrxdav.sys
2011/07/20 19:11:51.0203 2848 MRxSmb (0dc719e9b15e902346e87e9dcd5751fa) C:\windows\system32\DRIVERS\mrxsmb.sys
2011/07/20 19:11:53.0093 2848 Msfs (c941ea2454ba8350021d774daf0f1027) C:\windows\system32\drivers\Msfs.sys
2011/07/20 19:11:54.0140 2848 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\windows\system32\drivers\MSKSSRV.sys
2011/07/20 19:11:55.0234 2848 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\windows\system32\drivers\MSPCLOCK.sys
2011/07/20 19:11:56.0406 2848 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\windows\system32\drivers\MSPQM.sys
2011/07/20 19:11:57.0531 2848 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\windows\system32\DRIVERS\mssmbios.sys
2011/07/20 19:11:58.0531 2848 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\windows\system32\drivers\MSTEE.sys
2011/07/20 19:11:59.0796 2848 MTsensor (1c0f480b7c6136ddb5fb909995af014a) C:\windows\system32\DRIVERS\ATKACPI.sys
2011/07/20 19:12:00.0968 2848 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\windows\system32\drivers\Mup.sys
2011/07/20 19:12:02.0234 2848 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\windows\system32\DRIVERS\NABTSFEC.sys
2011/07/20 19:12:03.0750 2848 NDIS (1df7f42665c94b825322fae71721130d) C:\windows\system32\drivers\NDIS.sys
2011/07/20 19:12:05.0625 2848 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\windows\system32\DRIVERS\NdisIP.sys
2011/07/20 19:12:06.0859 2848 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\windows\system32\DRIVERS\ndistapi.sys
2011/07/20 19:12:08.0156 2848 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\windows\system32\DRIVERS\ndisuio.sys
2011/07/20 19:12:09.0515 2848 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\windows\system32\DRIVERS\ndiswan.sys
2011/07/20 19:12:10.0906 2848 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\windows\system32\drivers\NDProxy.sys
2011/07/20 19:12:12.0109 2848 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\windows\system32\DRIVERS\netbios.sys
2011/07/20 19:12:13.0359 2848 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\windows\system32\DRIVERS\netbt.sys
2011/07/20 19:12:17.0046 2848 NETw3x32 (e2f396f71a793a04839dbb6af304a026) C:\windows\system32\DRIVERS\NETw3x32.sys
2011/07/20 19:12:20.0093 2848 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\windows\system32\DRIVERS\nic1394.sys
2011/07/20 19:12:21.0078 2848 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\windows\system32\drivers\Npfs.sys
2011/07/20 19:12:22.0750 2848 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\windows\system32\drivers\Ntfs.sys
2011/07/20 19:12:24.0687 2848 NuidFltr (e8717d9b0d1919cadafd8896a8e23e17) C:\windows\system32\DRIVERS\NuidFltr.sys
2011/07/20 19:12:25.0828 2848 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\windows\system32\drivers\Null.sys
2011/07/20 19:12:27.0000 2848 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\windows\system32\DRIVERS\nwlnkflt.sys
2011/07/20 19:12:28.0578 2848 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\windows\system32\DRIVERS\nwlnkfwd.sys
2011/07/20 19:12:29.0921 2848 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\windows\system32\DRIVERS\ohci1394.sys
2011/07/20 19:12:31.0078 2848 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\windows\system32\drivers\Parport.sys
2011/07/20 19:12:32.0187 2848 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\windows\system32\drivers\PartMgr.sys
2011/07/20 19:12:33.0296 2848 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\windows\system32\drivers\ParVdm.sys
2011/07/20 19:12:34.0546 2848 PCI (a219903ccf74233761d92bef471a07b1) C:\windows\system32\DRIVERS\pci.sys
2011/07/20 19:12:36.0625 2848 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\windows\system32\DRIVERS\pciide.sys
2011/07/20 19:12:38.0109 2848 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\windows\system32\drivers\Pcmcia.sys
2011/07/20 19:12:39.0500 2848 pcouffin (5b6c11de7e839c05248ced8825470fef) C:\windows\system32\Drivers\pcouffin.sys
2011/07/20 19:12:46.0781 2848 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\windows\system32\DRIVERS\raspptp.sys
2011/07/20 19:12:48.0187 2848 PSched (09298ec810b07e5d582cb3a3f9255424) C:\windows\system32\DRIVERS\psched.sys
2011/07/20 19:12:49.0515 2848 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\windows\system32\DRIVERS\ptilink.sys
2011/07/20 19:12:50.0703 2848 PxHelp20 (49452bfcec22f36a7a9b9c2181bc3042) C:\windows\system32\Drivers\PxHelp20.sys
2011/07/20 19:12:56.0734 2848 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\windows\system32\DRIVERS\rasacd.sys
2011/07/20 19:12:57.0890 2848 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\windows\system32\DRIVERS\rasl2tp.sys
2011/07/20 19:12:59.0218 2848 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\windows\system32\DRIVERS\raspppoe.sys
2011/07/20 19:13:00.0437 2848 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\windows\system32\DRIVERS\raspti.sys
2011/07/20 19:13:01.0812 2848 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\windows\system32\DRIVERS\rdbss.sys
2011/07/20 19:13:03.0515 2848 RDPCDD (4912d5b403614ce99c28420f75353332) C:\windows\system32\DRIVERS\RDPCDD.sys
2011/07/20 19:13:04.0812 2848 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\windows\system32\drivers\RDPWD.sys
2011/07/20 19:13:06.0328 2848 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\windows\system32\DRIVERS\redbook.sys
2011/07/20 19:13:07.0843 2848 rimmptsk (b6e686aab08bc276d0000293f9fba0bb) C:\windows\system32\DRIVERS\rimmptsk.sys
2011/07/20 19:13:09.0046 2848 rimsptsk (bcff51e0be86d6f0e2180e5142203527) C:\windows\system32\DRIVERS\rimsptsk.sys
2011/07/20 19:13:10.0421 2848 rismxdp (6baf8990e6f701f501a6cee974cf08d8) C:\windows\system32\DRIVERS\rixdptsk.sys
2011/07/20 19:13:12.0062 2848 RTL8023xp (67c9511a760149797e806ffd9f14ad37) C:\windows\system32\DRIVERS\Rtnicxp.sys
2011/07/20 19:13:12.0984 2848 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
2011/07/20 19:13:13.0531 2848 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
2011/07/20 19:13:14.0812 2848 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\windows\system32\DRIVERS\sdbus.sys
2011/07/20 19:13:16.0125 2848 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\windows\system32\DRIVERS\secdrv.sys
2011/07/20 19:13:17.0375 2848 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\windows\system32\drivers\Serial.sys
2011/07/20 19:13:18.0546 2848 sffdisk (0fa803c64df0914b41f807ea276bf2a6) C:\windows\system32\DRIVERS\sffdisk.sys
2011/07/20 19:13:19.0906 2848 sffp_sd (c17c331e435ed8737525c86a7557b3ac) C:\windows\system32\DRIVERS\sffp_sd.sys
2011/07/20 19:13:21.0046 2848 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\windows\system32\drivers\Sfloppy.sys
2011/07/20 19:13:23.0125 2848 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\windows\system32\DRIVERS\SLIP.sys
2011/07/20 19:13:24.0359 2848 SmartDefragDriver (972dea0d8149d73c5b7a2c97b2e749e3) C:\windows\system32\Drivers\SmartDefragDriver.sys
2011/07/20 19:13:26.0406 2848 smserial (ce2e9d6b8c26c38779581cff1f14b65b) C:\windows\system32\DRIVERS\smserial.sys
2011/07/20 19:13:30.0046 2848 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\windows\system32\drivers\splitter.sys
2011/07/20 19:13:31.0828 2848 sptd (d15da1ba189770d93eea2d7e18f95af9) C:\windows\System32\Drivers\sptd.sys
2011/07/20 19:13:34.0218 2848 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\windows\system32\DRIVERS\sr.sys
2011/07/20 19:13:35.0906 2848 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\windows\system32\DRIVERS\srv.sys
2011/07/20 19:13:37.0812 2848 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\windows\system32\DRIVERS\ssmdrv.sys
2011/07/20 19:13:39.0031 2848 streamip (77813007ba6265c4b6098187e6ed79d2) C:\windows\system32\DRIVERS\StreamIP.sys
2011/07/20 19:13:40.0343 2848 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\windows\system32\DRIVERS\swenum.sys
2011/07/20 19:13:41.0531 2848 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\windows\system32\drivers\swmidi.sys
2011/07/20 19:13:46.0500 2848 SynTP (9c29e8e9c1c48e9c8bc38f031df4720f) C:\windows\system32\DRIVERS\SynTP.sys
2011/07/20 19:13:48.0000 2848 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\windows\system32\drivers\sysaudio.sys
2011/07/20 19:13:49.0671 2848 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\windows\system32\DRIVERS\tcpip.sys
2011/07/20 19:13:52.0281 2848 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\windows\system32\drivers\TDPIPE.sys
2011/07/20 19:13:53.0531 2848 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\windows\system32\drivers\TDTCP.sys
2011/07/20 19:13:54.0921 2848 TermDD (88155247177638048422893737429d9e) C:\windows\system32\DRIVERS\termdd.sys
2011/07/20 19:13:56.0671 2848 toshidpt (e362d54fd394999c4178936396664e57) C:\windows\system32\drivers\Toshidpt.sys
2011/07/20 19:13:58.0796 2848 tosporte (d626e0af9232d8799d3a449530f3c220) C:\windows\system32\DRIVERS\tosporte.sys
2011/07/20 19:14:00.0140 2848 Tosrfbd (0ec5206059d97a8dc785be73fb457ec7) C:\windows\system32\Drivers\tosrfbd.sys
2011/07/20 19:14:01.0468 2848 Tosrfbnp (33498b8f0b2ca549c2b7ffc1b3c0f1bc) C:\windows\system32\Drivers\tosrfbnp.sys
2011/07/20 19:14:02.0828 2848 Tosrfcom (5ba1ca3b3cddb1ddc67df473f05d1ec2) C:\windows\system32\Drivers\tosrfcom.sys
2011/07/20 19:14:04.0265 2848 Tosrfhid (5dbf390aab62dd0d4d43a9278614e001) C:\windows\system32\DRIVERS\Tosrfhid.sys
2011/07/20 19:14:05.0500 2848 tosrfnds (c52fd27b9adf3a1f22cb90e6bcf9b0cb) C:\windows\system32\DRIVERS\tosrfnds.sys
2011/07/20 19:14:06.0640 2848 TosRfSnd (0d86d15caff2b3203c785d604ec7c942) C:\windows\system32\drivers\TosRfSnd.sys
2011/07/20 19:14:07.0875 2848 Tosrfusb (d870fd6ce9060b73289f47e88630ee0e) C:\windows\system32\Drivers\tosrfusb.sys
2011/07/20 19:14:09.0062 2848 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\windows\system32\drivers\Udfs.sys
2011/07/20 19:14:11.0468 2848 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\windows\system32\DRIVERS\update.sys
2011/07/20 19:14:13.0343 2848 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\windows\system32\DRIVERS\usbccgp.sys
2011/07/20 19:14:15.0031 2848 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\windows\system32\DRIVERS\usbehci.sys
2011/07/20 19:14:16.0187 2848 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\windows\system32\DRIVERS\usbhub.sys
2011/07/20 19:14:17.0546 2848 usbprint (a717c8721046828520c9edf31288fc00) C:\windows\system32\DRIVERS\usbprint.sys
2011/07/20 19:14:19.0000 2848 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\windows\system32\DRIVERS\usbscan.sys
2011/07/20 19:14:20.0234 2848 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\windows\system32\DRIVERS\USBSTOR.SYS
2011/07/20 19:14:21.0281 2848 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\windows\system32\DRIVERS\usbuhci.sys
2011/07/20 19:14:22.0546 2848 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\windows\System32\drivers\vga.sys
2011/07/20 19:14:24.0796 2848 VolSnap (7c38f81f40d61d1607ddb62fe5817bb9) C:\windows\system32\drivers\VolSnap.sys
2011/07/20 19:14:24.0906 2848 Suspicious file (Forged): C:\windows\system32\drivers\VolSnap.sys. Real md5: 7c38f81f40d61d1607ddb62fe5817bb9, Fake md5: 4c8fcb5cc53aab716d810740fe59d025
2011/07/20 19:14:25.0093 2848 VolSnap - detected Rootkit.Win32.TDSS.tdl3 (0)
2011/07/20 19:14:26.0343 2848 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\windows\system32\DRIVERS\wanarp.sys
2011/07/20 19:14:28.0046 2848 Wdf01000 (fd47474bd21794508af449d9d91af6e6) C:\windows\system32\DRIVERS\Wdf01000.sys
2011/07/20 19:14:30.0421 2848 wdmaud (6768acf64b18196494413695f0c3a00f) C:\windows\system32\drivers\wdmaud.sys
2011/07/20 19:14:31.0796 2848 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\windows\System32\drivers\ws2ifsl.sys
2011/07/20 19:14:33.0015 2848 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\windows\system32\DRIVERS\WSTCODEC.SYS
2011/07/20 19:14:34.0296 2848 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\windows\system32\DRIVERS\WudfPf.sys
2011/07/20 19:14:35.0562 2848 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\windows\system32\DRIVERS\wudfrd.sys
2011/07/20 19:14:36.0140 2848 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
2011/07/20 19:14:41.0796 2848 MBR (0x1B8) (5fb38429d5d77768867c76dcbdb35194) \Device\Harddisk1\DR2
2011/07/20 19:14:42.0000 2848 Boot (0x1200) (7b0ee81fcb4ddd546966e5542732b2d6) \Device\Harddisk0\DR0\Partition0
2011/07/20 19:14:42.0218 2848 Boot (0x1200) (7f8d7b186844d3225239292b5b4c9fc2) \Device\Harddisk1\DR2\Partition0
2011/07/20 19:14:42.0296 2848 ================================================================================
2011/07/20 19:14:42.0296 2848 Scan finished
2011/07/20 19:14:42.0296 2848 ================================================================================
2011/07/20 19:14:42.0515 1464 Detected object count: 1
2011/07/20 19:14:42.0515 1464 Actual detected object count: 1
2011/07/20 19:31:46.0843 1464 VolSnap (7c38f81f40d61d1607ddb62fe5817bb9) C:\windows\system32\drivers\VolSnap.sys
2011/07/20 19:31:46.0843 1464 Suspicious file (Forged): C:\windows\system32\drivers\VolSnap.sys. Real md5: 7c38f81f40d61d1607ddb62fe5817bb9, Fake md5: 4c8fcb5cc53aab716d810740fe59d025
2011/07/20 19:32:02.0796 1464 Backup copy found, using it..
2011/07/20 19:32:03.0203 1464 C:\windows\system32\drivers\VolSnap.sys - will be cured after reboot
2011/07/20 19:32:03.0203 1464 Rootkit.Win32.TDSS.tdl3(VolSnap) - User select action: Cure
2011/07/20 21:55:08.0640 3992 Deinitialize success

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 21 July 2011 - 07:46 PM

Very good :)

How is redirection?

Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can download, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 22 July 2011 - 06:44 PM

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #2
==============================================
>Drivers
==============================================
0xA8C90000 C:\windows\system32\drivers\RtkHDAud.sys 4407296 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0xBF0C9000 C:\windows\System32\ati3duag.dll 2637824 bytes (ATI Technologies Inc. , ati3duag.dll)
0x804D7000 C:\windows\system32\ntkrnlpa.exe 2154496 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2154496 bytes
0x804D7000 RAW 2154496 bytes
0x804D7000 WMIxWDM 2154496 bytes
0xBF800000 Win32k 1859584 bytes
0xBF800000 C:\windows\System32\win32k.sys 1859584 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xB9240000 C:\windows\system32\DRIVERS\NETw3x32.sys 1712128 bytes (Intel® Corporation, Intel® Wireless LAN Driver)
0xB941E000 C:\windows\system32\DRIVERS\ati2mtag.sys 1564672 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xBF34D000 C:\windows\System32\ativvaxx.dll 864256 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0xA8B99000 C:\windows\system32\DRIVERS\smserial.sys 864256 bytes (Motorola Inc., Motorola SM56 Modem WDM Driver)
0xA87FF000 C:\windows\System32\Drivers\BisonCam.sys 663552 bytes (Bison Electronics. Inc. , Universal Serial Bus Camera Driver)
0xB9E5B000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xA88F0000 C:\windows\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xB90E4000 C:\windows\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xA8A1D000 C:\windows\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xA6078000 C:\windows\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xB91BC000 C:\windows\system32\DRIVERS\rixdptsk.sys 311296 bytes (REDC, RICOH XD SM Driver)
0xBF420000 C:\windows\System32\ATMFD.DLL 290816 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xBF012000 C:\windows\System32\ati2dvag.dll 270336 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xA556C000 C:\windows\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xBF054000 C:\windows\System32\ati2cqag.dll 258048 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xBF093000 C:\windows\System32\atikvmag.dll 221184 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xB918D000 C:\windows\system32\DRIVERS\SynTP.sys 192512 bytes (Synaptics, Inc., Synaptics Touchpad Driver)
0xB9F79000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xA6300000 C:\windows\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB9E2E000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xA8960000 C:\windows\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB93E2000 C:\windows\system32\DRIVERS\HDAudBus.sys 163840 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xA89F5000 C:\windows\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xA88C9000 C:\windows\system32\DRIVERS\avipbb.sys 159744 bytes (Avira GmbH, Avira Driver for Security Enhancement)
0xA89CF000 C:\windows\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xA8C6C000 C:\windows\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xB921C000 C:\windows\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB916A000 C:\windows\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xA89AD000 C:\windows\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xA898B000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0x806E5000 ACPI_HAL 134400 bytes
0x806E5000 C:\windows\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xB9F11000 fltMgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xB9F49000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xA87E4000 C:\windows\System32\Drivers\tosrfbd.sys 110592 bytes (TOSHIBA CORPORATION, Bluetooth RF Bus Driver)
0xB9E14000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB9F31000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xA877C000 C:\windows\System32\Drivers\dump_atapi.sys 98304 bytes
0xA655D000 C:\windows\system32\DRIVERS\avgntflt.sys 94208 bytes (Avira GmbH, Avira Minifilter Driver)
0xB9EE8000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xB9153000 C:\windows\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xA5E83000 C:\windows\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xB9208000 C:\windows\system32\DRIVERS\sdbus.sys 81920 bytes (Microsoft Corporation, SecureDigital Bus Driver)
0xB940A000 C:\windows\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xA8A76000 C:\windows\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF000000 C:\windows\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xB9EFF000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xB9F68000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xB9142000 C:\windows\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xBA1A8000 C:\windows\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xB995F000 C:\windows\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xB99AF000 C:\windows\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xBA0A8000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xB993F000 C:\windows\System32\Drivers\tosrfcom.sys 65536 bytes (TOSHIBA Corporation, Bluetooth RFCOMM Driver)
0xBA1C8000 C:\windows\system32\DRIVERS\Tosrfhid.sys 65536 bytes (TOSHIBA Corporation., Bluetooth HID Driver from TOSHIBA)
0xBA2C8000 C:\windows\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xBA278000 C:\windows\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xB994F000 C:\windows\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xA5F90000 C:\windows\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xBA288000 C:\windows\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xBA0B8000 C:\windows\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xBA108000 C:\windows\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xB998F000 C:\windows\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xB992F000 C:\windows\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xB999F000 C:\windows\system32\DRIVERS\rimsptsk.sys 53248 bytes (REDC, RICOH MS Driver)
0xBA1B8000 C:\windows\System32\Drivers\STREAM.SYS 53248 bytes (Microsoft Corporation, WDM CODEC Class Device Driver 2.0)
0xBA0E8000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xBA228000 C:\windows\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xBA248000 C:\windows\system32\DRIVERS\tosporte.sys 49152 bytes (TOSHIBA Corporation, TOSHIBA Bluetooth Port Emulation Driver)
0xBA2D8000 C:\windows\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xB996F000 C:\windows\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xBA0D8000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xBA2F8000 C:\windows\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xBA0C8000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xBA258000 C:\windows\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xBA298000 C:\windows\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xBA308000 C:\windows\System32\Drivers\tosrfbnp.sys 40960 bytes (TOSHIBA Corporation, Bluetooth RFBNEP Driver)
0xBA198000 C:\windows\System32\Drivers\tosrfusb.sys 40960 bytes (TOSHIBA CORPORATION, Bluetooth USB Miniport Driver)
0xA5E50000 C:\windows\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0xBA0F8000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xB997F000 C:\windows\system32\DRIVERS\IFXTPM.SYS 36864 bytes (Infineon Technologies AG, Infineon Trusted Platform Module)
0xB99BF000 C:\windows\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xBA2E8000 C:\windows\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xBA2B8000 C:\windows\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xBA118000 PxHelp20.sys 36864 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xBA2A8000 C:\windows\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xBA440000 C:\windows\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xBA4A0000 C:\windows\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xBA398000 C:\windows\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xBA488000 C:\windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xBA328000 C:\windows\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xBA3A0000 C:\windows\system32\DRIVERS\rimmptsk.sys 28672 bytes (REDC, RICOH MMC Driver)
0xBA3B8000 C:\windows\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0xBA3A8000 C:\windows\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xBA3B0000 C:\windows\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xBA4B0000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xBA4A8000 C:\windows\system32\DRIVERS\ssmdrv.sys 24576 bytes (Avira GmbH, AVIRA SnapShot Driver)
0xBA390000 C:\windows\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xBA490000 C:\windows\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xBA498000 C:\windows\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xBA330000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xBA3F8000 C:\windows\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xBA408000 C:\windows\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xBA3C0000 C:\windows\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xBA380000 C:\windows\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xBA4C0000 C:\windows\system32\DRIVERS\BATTC.SYS 16384 bytes (Microsoft Corporation, Battery Class Driver)
0xBA59C000 C:\windows\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xB9DE0000 C:\windows\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xA6551000 C:\windows\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xBA4C4000 ACPIEC.sys 12288 bytes (Microsoft Corporation, ACPI Embedded Controller Driver)
0xBA4B8000 C:\windows\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xBA4BC000 compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0xA87E0000 C:\windows\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xBA5A0000 C:\windows\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xBA578000 C:\windows\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xBA5DA000 C:\windows\system32\DRIVERS\ATKACPI.sys 8192 bytes (-, ATK0100 ACPI Utility)
0xBA602000 C:\Program Files\Avira\AntiVir Desktop\avgio.sys 8192 bytes (Avira GmbH, Avira AntiVir Support for Minifilter)
0xBA5FA000 C:\windows\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xBA608000 C:\windows\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xBA5F8000 C:\windows\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xBA5A8000 C:\windows\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xBA5FC000 C:\windows\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xBA5FE000 C:\windows\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xBA5AC000 SmartDefragDriver.sys 8192 bytes
0xBA5E4000 C:\windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xBA5D8000 C:\windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xBA5AA000 C:\windows\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xBA725000 C:\windows\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xBA72E000 C:\windows\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xBA7CF000 C:\windows\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xBA671000 C:\windows\system32\DRIVERS\OPRGHDLR.SYS 4096 bytes (Microsoft Corporation, ACPI Operation Registration Driver)
0xBA670000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 22 July 2011 - 08:47 PM

How is redirection?


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 24 July 2011 - 01:09 AM

have not been redirected since running the scans, thanks!

#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 24 July 2011 - 12:30 PM

Cool :)

Couple more steps....

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 DCoud

DCoud
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:01 AM

Posted 27 July 2011 - 07:21 AM

C:\Documents and Settings\Darryl\My Documents\backups\backup-20110610-172333-683.dll Win32/TrojanDownloader.Agent.PDY trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Darryl\Application Data\216F6DC2EC2B53B9027719A2446008A3\enemies-names.txt.vir Win32/Adware.AntimalwareDoctor.AE.Gen application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Darryl\Application Data\216F6DC2EC2B53B9027719A2446008A3\local.ini.vir Win32/Adware.AntimalwareDoctor.AE.Gen application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Darryl\Application Data\Mozilla\Firefox\Profiles\zwev74eg.default\extensions\{61e09af5-23f3-4989-8cc3-7832352189ac}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Darryl\Application Data\Mozilla\Firefox\Profiles\zwev74eg.default\extensions\{61e09af5-23f3-4989-8cc3-7832352189ac}\chrome\xulcache.jar.vir JS/Agent.NDB trojan deleted - quarantined
C:\Qoobox\Quarantine\C\windows\ivorovilox.dll.vir Win32/Adware.SpywareProtect2009 application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\windows\usuhudafugaho.dll.vir Win32/Adware.SpywareProtect2009 application cleaned by deleting - quarantined
C:\System Volume Information\_restore{68837868-5117-4F35-8E73-6842C07353D2}\RP645\A0107988.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:04:01 AM

Posted 27 July 2011 - 08:01 PM

Update Adobe Reader

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

Alternatively, you can uninstall Adobe Reader (33.5 MB), download and install Foxit PDF Reader(3.5MB) from HERE.
It's a much smaller file to download and uses a lot less resources than Adobe Reader.
Note: When installing FoxitReader, make sure to UN-check any pre-checked toolbar, or any other garbage.

========================================================

Your computer is clean Posted Image

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll remove all old restore points and create fresh, clean restore point.

Turn system restore off.
Restart computer.
Turn system restore back on.

If you don't know how to do it...
Windows XP: http://support.microsoft.com/kb/310405
Vista and Windows 7: http://www.howtogeek.com/howto/windows-vista/disable-system-restore-in-windows-vista/

2. Make sure, Windows Updates are current.

3. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

4. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

5. Run Temporary File Cleaner (TFC) weekly.

6. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

7. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

8. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

9. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users