Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Search Redirects to unknown sites


  • This topic is locked This topic is locked
9 replies to this topic

#1 rexterutot

rexterutot

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:15 PM

Posted 31 July 2011 - 06:06 AM

Hi Sir, I've been experiencing redirects to unknown sites when clicking on search results in Google. Please help me remove this bug/virus. Thanks in advance.

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:15 PM

Posted 31 July 2011 - 09:44 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step. Then proceed to run aswMbr.exe as noted below.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Note:
If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.



Thanks and again sorry for the delay.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 rexterutot

rexterutot
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:15 PM

Posted 01 August 2011 - 09:59 PM

Hi sir this is the logs from dds and gmer



.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 6.0.2900.2180
Run by Tess at 5:44:13 on 2011-08-02
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.584 [GMT 3:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Tess\Application Data\dwm.exe
C:\Documents and Settings\Tess\Application Data\Microsoft\conhost.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Pando Networks\Media Booster\PMB.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\DOCUME~1\Tess\LOCALS~1\Temp\csrss.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\Windows NT\Pinball\PINBALL.EXE
C:\Documents and Settings\Tess\My Documents\Downloads\L4D2IUP 2.0.7.4-2.0.7.5\L4D2IUP 2.0.7.4-2.0.7.5.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://search.babylon.com/?babsrc=HP_ss&mntrId=1c677038000000000000001f3b80c033&tlver=1.4.19.19&affID=19949
uInternet Settings,ProxyServer = http=127.0.0.1:61980
mSearchAssistant = hxxp://search.babylon.com/?babsrc=SP_ss&q={searchTerms}&mntrId=1c677038000000000000001f3b80c033&tlver=1.4.19.19&affID=19949
uWinlogon: Shell=explorer.exe,c:\documents and settings\tess\application data\dwm.exe
uWindows: Load=c:\docume~1\tess\locals~1\temp\csrss.exe
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: CescrtHlpr Object: {2eecd738-5844-4a99-b4b6-146bf802613b} - c:\program files\babylontoolbar\babylontoolbar\1.4.19.19\bh\BabylonToolbar.dll
BHO: Skype Browser Helper: {ae805869-2e5c-4ed4-8f7b-f1f7851a4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: DAEMON Tools Toolbar: {32099aac-c132-4136-9e9a-4e364a424e17} - c:\program files\daemon tools toolbar\DTToolbar.dll
TB: Babylon Toolbar: {98889811-442d-49dd-99d7-dc866be87dbc} - c:\program files\babylontoolbar\babylontoolbar\1.4.19.19\BabylonToolbarTlbr.dll
uRun: [Pando Media Booster] c:\program files\pando networks\media booster\PMB.exe
uRun: [Google Update] "c:\documents and settings\tess\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [BabylonToolbar] "c:\program files\babylontoolbar\babylontoolbar\1.4.19.19\BabylonToolbarsrv.exe" /md I
mRun: [conhost] c:\documents and settings\tess\application data\microsoft\conhost.exe
dRun: [FXWD6M2DFK] rundll32.exe c:\windows\system32\sshnas21.dll,GetHandle
dRun: [8DDYX0ZBPZ] c:\windows\temp\Ir4.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\reader 8.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~2.lnk - c:\program files\adobe\reader 8.0\reader\AdobeCollabSync.exe
uPolicies-explorer: NoInstrumentation = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} - file://c:\program files\insaniquarium deluxe\images\stg_drm.ocx
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} - file://c:\program files\insaniquarium deluxe\images\armhelper.ocx
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{90E5B1CC-CE05-419E-98DE-16D5F4A32FCC} : DhcpNameServer = 192.168.1.1
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
.
============= SERVICES / DRIVERS ===============
.
R1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [2011-7-1 218688]
R2 SSHNAS;SSHNAS;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 14336]
R3 CnxtHdAudAddService;Microsoft UAA Function Driver for High Definition Audio Service;c:\windows\system32\drivers\CHDAud.sys [2011-6-30 732160]
S2 SwOffScheduler;Airytec Switch Off - Task Scheduler;c:\program files\airytec\switch off\swoff.exe -service --> c:\program files\airytec\switch off\swoff.exe -service [?]
S2 SwOffWeb;Airytec Switch Off - Web Interface;c:\program files\airytec\switch off\swoff.exe -service --> c:\program files\airytec\switch off\swoff.exe -service [?]
S3 cpudrv;cpudrv;c:\program files\systemrequirementslab\cpudrv.sys [2009-12-18 11336]
S3 EagleXNt;EagleXNt;\??\c:\windows\system32\drivers\eaglexnt.sys --> c:\windows\system32\drivers\EagleXNt.sys [?]
S3 GGSAFERDriver;GGSAFER Driver;\??\c:\program files\garena messenger\apps\go kart ph\releasephysx27\safedrv.sys --> c:\program files\garena messenger\apps\go kart ph\releasephysx27\safedrv.sys [?]
S3 XDva385;XDva385;\??\c:\windows\system32\xdva385.sys --> c:\windows\system32\XDva385.sys [?]
S3 XDva386;XDva386;\??\c:\windows\system32\xdva386.sys --> c:\windows\system32\XDva386.sys [?]
.
=============== Created Last 30 ================
.
2011-08-02 02:42:11 -------- d--h--w- c:\windows\PIF
2011-07-26 06:48:34 -------- d-sh--w- c:\windows\ftpcache
2011-07-26 06:48:21 -------- d-----w- c:\program files\AgeOfCastles_at
2011-07-23 10:33:26 -------- d-----w- c:\program files\common files\DirectX
2011-07-23 10:33:11 -------- d-----w- c:\documents and settings\all users\application data\GOKartLiveUpdate
2011-07-23 07:26:03 -------- d-----w- c:\documents and settings\tess\application data\Garena
2011-07-17 08:43:35 -------- d-----w- c:\documents and settings\tess\local settings\application data\Adobe
2011-07-17 08:38:55 -------- d-----w- c:\documents and settings\tess\application data\GetRightToGo
2011-07-17 08:25:35 -------- d-----w- c:\documents and settings\tess\local settings\application data\Solid State Networks
2011-07-16 13:52:45 -------- d-----w- c:\documents and settings\tess\application data\BabylonToolbar
2011-07-16 11:57:36 -------- d-----w- c:\program files\BabylonToolbar
2011-07-16 11:41:27 -------- d-----w- c:\program files\Download Manager
2011-07-16 06:04:04 182272 ----a-w- c:\documents and settings\tess\application data\dwm.exe
2011-07-16 06:03:40 17408 ------w- c:\windows\system32\rpcnetp.dll
2011-07-16 06:03:32 192000 ----a-w- c:\documents and settings\tess\application data\microsoft\conhost.exe
2011-07-15 21:10:35 -------- d-----w- c:\documents and settings\all users\application data\lC00000OnNiM00000
2011-07-15 21:10:05 -------- d-----w- C:\Adobe
2011-07-15 21:02:10 180736 ----a-w- c:\program files\windows nt\dwm.exe
2011-07-15 21:01:46 171520 ----a-w- c:\program files\internet explorer\conhost.exe
2011-07-15 21:01:46 -------- d-----w- C:\Microsoft
2011-07-15 18:20:41 -------- d-----w- c:\documents and settings\tess\application data\PointBlank
2011-07-15 17:56:39 -------- d-----w- c:\program files\e-Games
2011-07-15 16:30:30 -------- d-----w- c:\documents and settings\tess\local settings\application data\PMB Files
2011-07-15 16:30:26 -------- d-----w- c:\documents and settings\all users\application data\PMB Files
2011-07-15 16:29:20 -------- d-----w- c:\program files\Pando Networks
2011-07-10 08:46:02 -------- d-----w- c:\documents and settings\tess\application data\ValuSoft
2011-07-10 08:33:13 -------- d-----w- c:\program files\Prison Tycoon 4
2011-07-09 12:59:29 -------- d-----w- c:\documents and settings\tess\application data\Airytec
2011-07-09 12:59:05 -------- d-----w- c:\program files\Airytec
2011-07-03 14:43:28 -------- d-----w- c:\documents and settings\all users\application data\Trymedia
2011-07-03 14:43:19 -------- d-----w- c:\program files\Bigfish
.
==================== Find3M ====================
.
2011-08-01 23:47:58 44544 ----a-w- c:\windows\system32\agremove.exe
2011-07-15 21:00:20 1098240 ----a-w- c:\windows\system32\sshnas21.dll
2011-07-01 01:57:42 218688 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys
2011-06-30 02:44:58 11388 ----a-w- c:\windows\system32\mqapi.exe
2011-06-30 01:52:09 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-06-30 01:52:08 472808 ----a-w- c:\windows\system32\deployJava1.dll
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: TOSHIBA_MK2046GSX rev.LB013M -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-e
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x864B64D0]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x864bc7d0]; MOV EAX, [0x864bc84c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x804EEEB8] -> \Device\Harddisk0\DR0[0x8654EAB8]
3 CLASSPNP[0xF761E05B] -> ntkrnlpa!IofCallDriver[0x804EEEB8] -> \Device\00000070[0x86560968]
5 ACPI[0xF7494620] -> ntkrnlpa!IofCallDriver[0x804EEEB8] -> [0x86551940]
\Driver\atapi[0x8653BF38] -> IRP_MJ_CREATE -> 0x864B64D0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x864B631B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 5:45:01.89 ===============

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-08-02 05:55:51
Windows 5.1.2600 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IdePort1 TOSHIBA_MK2046GSX rev.LB013M
Running: gmer.exe; Driver: C:\DOCUME~1\Tess\LOCALS~1\Temp\awndrpod.sys


---- Kernel code sections - GMER 1.0.15 ----

? C:\DOCUME~1\Tess\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtCreateFile + 6 7C90D688 4 Bytes [28, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtCreateFile + B 7C90D68D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 1 Byte [28]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 4 Bytes [28, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtMapViewOfSection + B 7C90DC60 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenFile + 6 7C90DD03 4 Bytes [68, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenFile + B 7C90DD08 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcess + 6 7C90DD81 4 Bytes [A8, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcess + B 7C90DD86 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcessToken + 6 7C90DD96 4 Bytes CALL 7B90F39C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcessToken + B 7C90DD9B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcessTokenEx + 6 7C90DDAB 4 Bytes [A8, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenProcessTokenEx + B 7C90DDB0 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThread + 6 7C90DDFF 4 Bytes [68, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThread + B 7C90DE04 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThreadToken + 6 7C90DE14 4 Bytes [68, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThreadToken + B 7C90DE19 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThreadTokenEx + 6 7C90DE29 4 Bytes CALL 7B90F430
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtOpenThreadTokenEx + B 7C90DE2E 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtQueryAttributesFile + 6 7C90DEE6 4 Bytes [A8, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtQueryAttributesFile + B 7C90DEEB 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtQueryFullAttributesFile + 6 7C90DFB8 4 Bytes CALL 7B90F5BD
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtQueryFullAttributesFile + B 7C90DFBD 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtSetInformationFile + 6 7C90E5DF 4 Bytes [28, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtSetInformationFile + B 7C90E5E4 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtSetInformationThread + 6 7C90E648 4 Bytes [28, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtSetInformationThread + B 7C90E64D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 1 Byte [68]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 4 Bytes [68, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[192] ntdll.dll!NtUnmapViewOfSection + B 7C90E96B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtCreateFile + 6 7C90D688 4 Bytes [28, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtCreateFile + B 7C90D68D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 1 Byte [28]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 4 Bytes [28, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtMapViewOfSection + B 7C90DC60 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenFile + 6 7C90DD03 4 Bytes [68, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenFile + B 7C90DD08 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcess + 6 7C90DD81 4 Bytes [A8, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcess + B 7C90DD86 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcessToken + 6 7C90DD96 4 Bytes CALL 7B90F39C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcessToken + B 7C90DD9B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcessTokenEx + 6 7C90DDAB 4 Bytes [A8, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenProcessTokenEx + B 7C90DDB0 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThread + 6 7C90DDFF 4 Bytes [68, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThread + B 7C90DE04 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThreadToken + 6 7C90DE14 4 Bytes [68, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThreadToken + B 7C90DE19 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThreadTokenEx + 6 7C90DE29 4 Bytes CALL 7B90F430
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtOpenThreadTokenEx + B 7C90DE2E 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtQueryAttributesFile + 6 7C90DEE6 4 Bytes [A8, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtQueryAttributesFile + B 7C90DEEB 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtQueryFullAttributesFile + 6 7C90DFB8 4 Bytes CALL 7B90F5BD
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtQueryFullAttributesFile + B 7C90DFBD 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtSetInformationFile + 6 7C90E5DF 4 Bytes [28, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtSetInformationFile + B 7C90E5E4 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtSetInformationThread + 6 7C90E648 4 Bytes [28, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtSetInformationThread + B 7C90E64D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 1 Byte [68]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 4 Bytes [68, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[556] ntdll.dll!NtUnmapViewOfSection + B 7C90E96B 1 Byte [E2]
.text C:\Program Files\Pando Networks\Media Booster\PMB.exe[680] kernel32.dll!SetUnhandledExceptionFilter 7C810386 5 Bytes [33, C0, C2, 04, 00] {XOR EAX, EAX; RET 0x4}
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtCreateFile + 6 7C90D688 4 Bytes [28, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtCreateFile + B 7C90D68D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 1 Byte [28]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 4 Bytes [28, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtMapViewOfSection + B 7C90DC60 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenFile + 6 7C90DD03 4 Bytes [68, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenFile + B 7C90DD08 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcess + 6 7C90DD81 4 Bytes [A8, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcess + B 7C90DD86 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcessToken + 6 7C90DD96 4 Bytes CALL 7B90F39C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcessToken + B 7C90DD9B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcessTokenEx + 6 7C90DDAB 4 Bytes [A8, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenProcessTokenEx + B 7C90DDB0 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThread + 6 7C90DDFF 4 Bytes [68, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThread + B 7C90DE04 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThreadToken + 6 7C90DE14 4 Bytes [68, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThreadToken + B 7C90DE19 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThreadTokenEx + 6 7C90DE29 4 Bytes CALL 7B90F430
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtOpenThreadTokenEx + B 7C90DE2E 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtQueryAttributesFile + 6 7C90DEE6 4 Bytes [A8, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtQueryAttributesFile + B 7C90DEEB 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtQueryFullAttributesFile + 6 7C90DFB8 4 Bytes CALL 7B90F5BD
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtQueryFullAttributesFile + B 7C90DFBD 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtSetInformationFile + 6 7C90E5DF 4 Bytes [28, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtSetInformationFile + B 7C90E5E4 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtSetInformationThread + 6 7C90E648 4 Bytes [28, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtSetInformationThread + B 7C90E64D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 1 Byte [68]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 4 Bytes [68, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[1024] ntdll.dll!NtUnmapViewOfSection + B 7C90E96B 1 Byte [E2]
.text C:\WINDOWS\System32\svchost.exe[1124] ntdll.dll!NtProtectVirtualMemory 7C90DEB6 5 Bytes JMP 00C1000A
.text C:\WINDOWS\System32\svchost.exe[1124] ntdll.dll!NtWriteVirtualMemory 7C90EA32 5 Bytes JMP 00C2000A
.text C:\WINDOWS\System32\svchost.exe[1124] ntdll.dll!KiUserExceptionDispatcher 7C90EAEC 5 Bytes JMP 008F000C
.text C:\WINDOWS\Explorer.EXE[1784] ntdll.dll!NtProtectVirtualMemory 7C90DEB6 5 Bytes JMP 00B6000A
.text C:\WINDOWS\Explorer.EXE[1784] ntdll.dll!NtWriteVirtualMemory 7C90EA32 5 Bytes JMP 00C7000A
.text C:\WINDOWS\Explorer.EXE[1784] ntdll.dll!KiUserExceptionDispatcher 7C90EAEC 5 Bytes JMP 00B5000C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtCreateFile + 6 7C90D688 4 Bytes [28, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtCreateFile + B 7C90D68D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 1 Byte [28]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 4 Bytes [28, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtMapViewOfSection + B 7C90DC60 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenFile + 6 7C90DD03 4 Bytes [68, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenFile + B 7C90DD08 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcess + 6 7C90DD81 4 Bytes [A8, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcess + B 7C90DD86 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcessToken + 6 7C90DD96 4 Bytes CALL 7B90F39C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcessToken + B 7C90DD9B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcessTokenEx + 6 7C90DDAB 4 Bytes [A8, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenProcessTokenEx + B 7C90DDB0 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThread + 6 7C90DDFF 4 Bytes [68, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThread + B 7C90DE04 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThreadToken + 6 7C90DE14 4 Bytes [68, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThreadToken + B 7C90DE19 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThreadTokenEx + 6 7C90DE29 4 Bytes CALL 7B90F430
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtOpenThreadTokenEx + B 7C90DE2E 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtQueryAttributesFile + 6 7C90DEE6 4 Bytes [A8, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtQueryAttributesFile + B 7C90DEEB 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtQueryFullAttributesFile + 6 7C90DFB8 4 Bytes CALL 7B90F5BD
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtQueryFullAttributesFile + B 7C90DFBD 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtSetInformationFile + 6 7C90E5DF 4 Bytes [28, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtSetInformationFile + B 7C90E5E4 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtSetInformationThread + 6 7C90E648 4 Bytes [28, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtSetInformationThread + B 7C90E64D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 1 Byte [68]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 4 Bytes [68, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[2056] ntdll.dll!NtUnmapViewOfSection + B 7C90E96B 1 Byte [E2]
.text C:\WINDOWS\system32\wuauclt.exe[3008] ntdll.dll!NtProtectVirtualMemory 7C90DEB6 5 Bytes JMP 015E000A
.text C:\WINDOWS\system32\wuauclt.exe[3008] ntdll.dll!NtWriteVirtualMemory 7C90EA32 5 Bytes JMP 015F000A
.text C:\WINDOWS\system32\wuauclt.exe[3008] ntdll.dll!KiUserExceptionDispatcher 7C90EAEC 5 Bytes JMP 0144000C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtCreateFile + 6 7C90D688 4 Bytes [28, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtCreateFile + B 7C90D68D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 1 Byte [28]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtMapViewOfSection + 6 7C90DC5B 4 Bytes [28, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtMapViewOfSection + B 7C90DC60 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenFile + 6 7C90DD03 4 Bytes [68, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenFile + B 7C90DD08 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcess + 6 7C90DD81 4 Bytes [A8, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcess + B 7C90DD86 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcessToken + 6 7C90DD96 4 Bytes CALL 7B90F39C
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcessToken + B 7C90DD9B 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcessTokenEx + 6 7C90DDAB 4 Bytes [A8, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenProcessTokenEx + B 7C90DDB0 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThread + 6 7C90DDFF 4 Bytes [68, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThread + B 7C90DE04 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThreadToken + 6 7C90DE14 4 Bytes [68, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThreadToken + B 7C90DE19 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThreadTokenEx + 6 7C90DE29 4 Bytes CALL 7B90F430
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtOpenThreadTokenEx + B 7C90DE2E 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtQueryAttributesFile + 6 7C90DEE6 4 Bytes [A8, 00, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtQueryAttributesFile + B 7C90DEEB 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtQueryFullAttributesFile + 6 7C90DFB8 4 Bytes CALL 7B90F5BD
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtQueryFullAttributesFile + B 7C90DFBD 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtSetInformationFile + 6 7C90E5DF 4 Bytes [28, 01, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtSetInformationFile + B 7C90E5E4 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtSetInformationThread + 6 7C90E648 4 Bytes [28, 02, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtSetInformationThread + B 7C90E64D 1 Byte [E2]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 1 Byte [68]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtUnmapViewOfSection + 6 7C90E966 4 Bytes [68, 03, 16, 00]
.text C:\Documents and Settings\Tess\Local Settings\Application Data\Google\Chrome\Application\chrome.exe[3764] ntdll.dll!NtUnmapViewOfSection + B 7C90E96B 1 Byte [E2]
? C:\DOCUME~1\Tess\LOCALS~1\Temp\csrss.exe[4024] number of sections mismatch; time/date stamp mismatch; unknown module: OLEAUT32.dllunknown module: RASAPI32.dllunknown module: WINHTTP.dll

---- Devices - GMER 1.0.15 ----

Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP0T0L0-3 864B631B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 864B631B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 864B631B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort2 864B631B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 864B631B

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 TDL4@MBR code has been found <-- ROOTKIT !!!
Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

---- Files - GMER 1.0.15 ----

ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000790.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000809.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000821.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000834.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000854.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000876.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000888.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000911.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0001005.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000933.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000955.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000969.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP10\A0000989.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002005.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002032.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002062.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002076.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002094.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002115.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002202.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002135.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002158.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002184.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002193.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002232.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP11\A0002245.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002274.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002291.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002301.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002309.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002319.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002341.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002516.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002356.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002382.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002406.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002416.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002428.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002452.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002473.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002485.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002506.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002525.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002544.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002562.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002579.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002605.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002615.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP12\A0002625.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002656.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002667.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002703.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002691.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002725.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002734.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002742.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002755.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002808.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002779.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002795.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002831.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002857.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002875.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP13\A0002894.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0002932.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0002987.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003010.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003103.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003066.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003035.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003045.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003056.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003075.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003083.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP16\A0003124.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003137.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003160.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003209.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003188.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003218.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003233.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003150.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0004324.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003306.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003255.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003277.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003297.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0003315.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0004334.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0004351.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP17\A0004368.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0004402.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0004438.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0004462.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0004414.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0005491.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0005522.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005534.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005551.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005570.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005588.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005605.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005620.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006686.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006704.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005648.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005666.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0005687.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006714.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006737.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006763.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006774.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006799.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006817.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006832.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006857.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006874.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006886.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006905.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006935.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006989.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006964.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0007030.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008108.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008063.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008083.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008330.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008350.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008365.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008403.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008432.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008449.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008467.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008484.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008517.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008530.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP21\A0008591.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP21\A0008622.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP21\A0008700.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP22\A0008730.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP22\A0008754.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP22\A0008786.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP4\A0000206.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP5\A0000268.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP5\A0000376.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000524.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000557.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000603.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000616.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000640.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000663.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000682.exe:BAK 22528 bytes executable
ADS C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP9\A0000717.exe:BAK 22528 bytes executable

---- EOF - GMER 1.0.15 ----

Attached Files



#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:15 PM

Posted 02 August 2011 - 03:59 PM

Hello rexterutot,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.


1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.

2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TDSSkiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 rexterutot

rexterutot
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:15 PM

Posted 03 August 2011 - 12:08 AM

2011/08/03 07:39:57.0046 0704 TDSS rootkit removing tool 2.5.13.0 Jul 29 2011 17:24:11
2011/08/03 07:39:59.0046 0704 ================================================================================
Hi Sir this is the log you requested. Redirects were still happening before I ran the TDSKiller and Combofix while after running the applications, a test search did not lead to redirects

2011/08/03 07:39:59.0046 0704 SystemInfo:
2011/08/03 07:39:59.0046 0704
2011/08/03 07:39:59.0046 0704 OS Version: 5.1.2600 ServicePack: 2.0
2011/08/03 07:39:59.0046 0704 Product type: Workstation
2011/08/03 07:39:59.0046 0704 ComputerName: TESS-6021B477C9
2011/08/03 07:39:59.0046 0704 UserName: Tess
2011/08/03 07:39:59.0046 0704 Windows directory: C:\WINDOWS
2011/08/03 07:39:59.0046 0704 System windows directory: C:\WINDOWS
2011/08/03 07:39:59.0046 0704 Processor architecture: Intel x86
2011/08/03 07:39:59.0046 0704 Number of processors: 2
2011/08/03 07:39:59.0046 0704 Page size: 0x1000
2011/08/03 07:39:59.0046 0704 Boot type: Normal boot
2011/08/03 07:39:59.0046 0704 ================================================================================
2011/08/03 07:40:01.0375 0704 Initialize success
2011/08/03 07:40:36.0609 3184 ================================================================================
2011/08/03 07:40:36.0609 3184 Scan started
2011/08/03 07:40:36.0609 3184 Mode: Manual;
2011/08/03 07:40:36.0609 3184 ================================================================================
2011/08/03 07:40:37.0234 3184 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/08/03 07:40:37.0281 3184 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
2011/08/03 07:40:37.0343 3184 aec (841f385c6cfaf66b58fbd898722bb4f0) C:\WINDOWS\system32\drivers\aec.sys
2011/08/03 07:40:37.0375 3184 AFD (5ac495f4cb807b2b98ad2ad591e6d92e) C:\WINDOWS\System32\drivers\afd.sys
2011/08/03 07:40:37.0609 3184 Arp1394 (f0d692b0bffb46e30eb3cea168bbc49f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
2011/08/03 07:40:37.0718 3184 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/08/03 07:40:37.0765 3184 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/08/03 07:40:37.0828 3184 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/08/03 07:40:37.0890 3184 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/08/03 07:40:38.0031 3184 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/08/03 07:40:38.0078 3184 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/08/03 07:40:38.0125 3184 CCDECODE (6163ed60b684bab19d3352ab22fc48b2) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/08/03 07:40:38.0156 3184 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/08/03 07:40:38.0218 3184 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/08/03 07:40:38.0281 3184 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/08/03 07:40:38.0437 3184 CmBatt (4266be808f85826aedf3c64c1e240203) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
2011/08/03 07:40:38.0546 3184 CnxtHdAudAddService (2d783d33cd64ddbb2171ecfa56249c50) C:\WINDOWS\system32\drivers\CHDAud.sys
2011/08/03 07:40:38.0578 3184 Compbatt (df1b1a24bf52d0ebc01ed4ece8979f50) C:\WINDOWS\system32\DRIVERS\compbatt.sys
2011/08/03 07:40:38.0812 3184 cpudrv (d01f685f8b4598d144b0cce9ff95d8d5) C:\Program Files\SystemRequirementsLab\cpudrv.sys
2011/08/03 07:40:38.0906 3184 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/08/03 07:40:39.0000 3184 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys
2011/08/03 07:40:39.0125 3184 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys
2011/08/03 07:40:39.0140 3184 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/08/03 07:40:39.0203 3184 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys
2011/08/03 07:40:39.0265 3184 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/08/03 07:40:39.0328 3184 dtsoftbus01 (555e54ac2f601a8821cef58961653991) C:\WINDOWS\system32\DRIVERS\dtsoftbus01.sys
2011/08/03 07:40:39.0515 3184 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/08/03 07:40:39.0562 3184 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\drivers\Fdc.sys
2011/08/03 07:40:39.0609 3184 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys
2011/08/03 07:40:39.0640 3184 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\drivers\Flpydisk.sys
2011/08/03 07:40:39.0703 3184 FltMgr (157754f0df355a9e0a6f54721914f9c6) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
2011/08/03 07:40:39.0812 3184 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/08/03 07:40:39.0843 3184 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/08/03 07:40:40.0171 3184 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/08/03 07:40:40.0234 3184 HDAudBus (3fcc124b6e08ee0e9351f717dd136939) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
2011/08/03 07:40:40.0296 3184 HidUsb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/08/03 07:40:40.0390 3184 HSFHWAZL (03a51d7d5666df3d4331581b3a3109dc) C:\WINDOWS\system32\DRIVERS\HSFHWAZL.sys
2011/08/03 07:40:40.0468 3184 HSF_DPV (d92272a376bba4a0ed61f92280d71a10) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys
2011/08/03 07:40:40.0609 3184 HTTP (c19b522a9ae0bbc3293397f3055e80a1) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/08/03 07:40:40.0734 3184 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/08/03 07:40:40.0859 3184 ialm (c5db546f9028cd00e64335091860d8f3) C:\WINDOWS\system32\DRIVERS\igxpmp32.sys
2011/08/03 07:40:41.0000 3184 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/08/03 07:40:41.0125 3184 intelppm (279fb78702454dff2bb445f238c048d2) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2011/08/03 07:40:41.0156 3184 Ip6Fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
2011/08/03 07:40:41.0203 3184 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/08/03 07:40:41.0218 3184 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/08/03 07:40:41.0265 3184 IpNat (b5a8e215ac29d24d60b4d1250ef05ace) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/08/03 07:40:41.0375 3184 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/08/03 07:40:41.0421 3184 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/08/03 07:40:41.0484 3184 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/08/03 07:40:41.0531 3184 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/08/03 07:40:41.0640 3184 kbdhid (e182fa8e49e8ee41b4adc53093f3c7e6) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/08/03 07:40:41.0718 3184 kmixer (d93cad07c5683db066b0b2d2d3790ead) C:\WINDOWS\system32\drivers\kmixer.sys
2011/08/03 07:40:41.0781 3184 KSecDD (eb7ffe87fd367ea8fca0506f74a87fbb) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/08/03 07:40:41.0890 3184 mdmxsdk (0cea2d0d3fa284b85ed5b68365114f76) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
2011/08/03 07:40:42.0000 3184 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/08/03 07:40:42.0062 3184 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys
2011/08/03 07:40:42.0109 3184 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/08/03 07:40:42.0171 3184 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/08/03 07:40:42.0218 3184 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/08/03 07:40:42.0312 3184 MRxDAV (46edcc8f2db2f322c24f48785cb46366) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/08/03 07:40:42.0375 3184 MRxSmb (1fd607fc67f7f7c633c3da65bfc53d18) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/08/03 07:40:42.0421 3184 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys
2011/08/03 07:40:42.0468 3184 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/08/03 07:40:42.0500 3184 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/08/03 07:40:42.0531 3184 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/08/03 07:40:42.0640 3184 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/08/03 07:40:42.0671 3184 MSTEE (bf13612142995096ab084f2db7f40f77) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/08/03 07:40:42.0734 3184 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys
2011/08/03 07:40:42.0796 3184 NABTSFEC (5c8dc6429c43dc6177c1fa5b76290d1a) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/08/03 07:40:42.0890 3184 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys
2011/08/03 07:40:42.0921 3184 NdisIP (520ce427a8b298f54112857bcf6bde15) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/08/03 07:40:42.0968 3184 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/08/03 07:40:43.0031 3184 Ndisuio (34d6cd56409da9a7ed573e1c90a308bf) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/08/03 07:40:43.0078 3184 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/08/03 07:40:43.0109 3184 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/08/03 07:40:43.0187 3184 NetBIOS (3a2aca8fc1d7786902ca434998d7ceb4) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/08/03 07:40:43.0218 3184 NetBT (0c80e410cd2f47134407ee7dd19cc86b) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/08/03 07:40:43.0390 3184 NETw4x32 (88100ebdd10309fbd445ef8e42452eae) C:\WINDOWS\system32\DRIVERS\NETw4x32.sys
2011/08/03 07:40:43.0531 3184 NIC1394 (5c5c53db4fef16cf87b9911c7e8c6fbc) C:\WINDOWS\system32\DRIVERS\nic1394.sys
2011/08/03 07:40:43.0593 3184 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys
2011/08/03 07:40:43.0625 3184 Ntfs (b78be402c3f63dd55521f73876951cdd) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/08/03 07:40:43.0718 3184 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/08/03 07:40:43.0781 3184 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/08/03 07:40:43.0875 3184 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/08/03 07:40:43.0906 3184 ohci1394 (0951db8e5823ea366b0e408d71e1ba2a) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
2011/08/03 07:40:43.0968 3184 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\drivers\Parport.sys
2011/08/03 07:40:44.0000 3184 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/08/03 07:40:44.0093 3184 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/08/03 07:40:44.0156 3184 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/08/03 07:40:44.0203 3184 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/08/03 07:40:44.0265 3184 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/08/03 07:40:44.0484 3184 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/08/03 07:40:44.0500 3184 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/08/03 07:40:44.0593 3184 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/08/03 07:40:44.0765 3184 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/08/03 07:40:44.0828 3184 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/08/03 07:40:44.0875 3184 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/08/03 07:40:44.0890 3184 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/08/03 07:40:44.0921 3184 Rdbss (29d66245adba878fff574cd66abd2884) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/08/03 07:40:44.0937 3184 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/08/03 07:40:45.0000 3184 rdpdr (a2cae2c60bc37e0751ef9dda7ceaf4ad) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
2011/08/03 07:40:45.0046 3184 RDPWD (d4f5643d7714ef499ae9527fdcd50894) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/08/03 07:40:45.0125 3184 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/08/03 07:40:45.0265 3184 sdbus (02fc71b020ec8700ee8a46c58bc6f276) C:\WINDOWS\system32\DRIVERS\sdbus.sys
2011/08/03 07:40:45.0312 3184 Secdrv (d26e26ea516450af9d072635c60387f4) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/08/03 07:40:45.0359 3184 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\drivers\Serial.sys
2011/08/03 07:40:45.0390 3184 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/08/03 07:40:45.0500 3184 SLIP (5caeed86821fa2c6139e32e9e05ccdc9) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/08/03 07:40:45.0625 3184 splitter (8e186b8f23295d1e42c573b82b80d548) C:\WINDOWS\system32\drivers\splitter.sys
2011/08/03 07:40:45.0687 3184 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/08/03 07:40:45.0765 3184 Srv (20b7e396720353e4117d64d9dcb926ca) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/08/03 07:40:45.0875 3184 streamip (284c57df5dc7abca656bc2b96a667afb) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/08/03 07:40:45.0953 3184 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/08/03 07:40:46.0015 3184 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys
2011/08/03 07:40:46.0156 3184 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/08/03 07:40:46.0187 3184 Tcpip (9f4b36614a0fc234525ba224957de55c) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/08/03 07:40:46.0265 3184 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/08/03 07:40:46.0312 3184 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/08/03 07:40:46.0375 3184 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/08/03 07:40:46.0437 3184 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys
2011/08/03 07:40:46.0484 3184 Update (aff2e5045961bbc0a602bb6f95eb1345) C:\WINDOWS\system32\DRIVERS\update.sys
2011/08/03 07:40:46.0531 3184 usbccgp (bffd9f120cc63bcbaa3d840f3eef9f79) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/08/03 07:40:46.0593 3184 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/08/03 07:40:46.0656 3184 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/08/03 07:40:46.0718 3184 USBSTOR (6cd7b22193718f1d17a47a1cd6d37e75) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/08/03 07:40:46.0750 3184 usbuhci (f8fd1400092e23c8f2f31406ef06167b) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/08/03 07:40:46.0812 3184 usbvideo (8968ff3973a883c49e8b564200f565b9) C:\WINDOWS\system32\Drivers\usbvideo.sys
2011/08/03 07:40:46.0875 3184 UVCFTR (8c5094a8ab24de7496c7c19942f2df04) C:\WINDOWS\system32\Drivers\UVCFTR_S.SYS
2011/08/03 07:40:46.0921 3184 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys
2011/08/03 07:40:47.0000 3184 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/08/03 07:40:47.0062 3184 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/08/03 07:40:47.0140 3184 wdmaud (2797f33ebf50466020c430ee4f037933) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/08/03 07:40:47.0234 3184 winachsf (ed10a3d367dd5596506022d5e2a3cba0) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
2011/08/03 07:40:47.0390 3184 WmiAcpi (ae2c8544e747c20062db27456ea2d67a) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
2011/08/03 07:40:47.0484 3184 WSIMD (43f767d59bfc25d8f4fc2eb42043ec1e) C:\WINDOWS\system32\DRIVERS\wsimd.sys
2011/08/03 07:40:47.0515 3184 WSTCODEC (d5842484f05e12121c511aa93f6439ec) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/08/03 07:40:47.0656 3184 MBR (0x1B8) (2839639fa37b8353e792a2a30a12ced3) \Device\Harddisk0\DR0
2011/08/03 07:40:47.0656 3184 \Device\Harddisk0\DR0 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/08/03 07:40:47.0671 3184 Boot (0x1200) (14469bc190a5253f26e06b28fd68e1c7) \Device\Harddisk0\DR0\Partition0
2011/08/03 07:40:47.0687 3184 ================================================================================
2011/08/03 07:40:47.0687 3184 Scan finished
2011/08/03 07:40:47.0687 3184 ================================================================================
2011/08/03 07:40:47.0703 3192 Detected object count: 1
2011/08/03 07:40:47.0703 3192 Actual detected object count: 1
2011/08/03 07:41:04.0125 3192 \Device\Harddisk0\DR0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/08/03 07:41:04.0125 3192 \Device\Harddisk0\DR0 - ok
2011/08/03 07:41:04.0125 3192 Rootkit.Win32.TDSS.tdl4(\Device\Harddisk0\DR0) - User select action: Cure
2011/08/03 07:41:07.0000 3848 Deinitialize success

ComboFix 11-08-02.03 - Tess 08/03/2011 7:57.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.718 [GMT 3:00]
Running from: c:\documents and settings\Tess\My Documents\Downloads\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\CFLog
c:\documents and settings\Tess\Application Data\dwm.exe
c:\documents and settings\Tess\Application Data\Microsoft\conhost.exe
C:\Microsoft
c:\program files\Internet Explorer\conhost.exe
c:\windows\system32\mqapi.exe
c:\windows\system32\sshnas21.dll
.
Infected copy of c:\windows\system32\autochk.exe was found and disinfected
Restored copy from - c:\windows\system32\dllcache\autochk.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_SSHNAS
-------\Service_SSHNAS
.
.
((((((((((((((((((((((((( Files Created from 2011-07-03 to 2011-08-03 )))))))))))))))))))))))))))))))
.
.
2011-08-03 05:01 . 2011-08-03 05:01 17408 ----a-w- c:\windows\system32\rpcnetp.exe
2011-08-02 13:17 . 2011-08-02 13:17 -------- d-----w- c:\documents and settings\Tess\riotsGamesLogs
2011-08-02 02:42 . 2011-08-02 02:42 -------- d--h--w- c:\windows\PIF
2011-07-26 06:48 . 2011-07-26 06:48 -------- d-sh--w- c:\windows\ftpcache
2011-07-26 06:48 . 2011-07-26 06:48 -------- d-----w- c:\program files\AgeOfCastles_at
2011-07-23 10:33 . 2011-07-23 10:33 -------- d-----w- c:\program files\Common Files\DirectX
2011-07-23 10:33 . 2011-07-23 10:33 -------- d-----w- c:\documents and settings\All Users\Application Data\GOKartLiveUpdate
2011-07-23 07:26 . 2011-07-23 07:26 -------- d-----w- c:\documents and settings\Tess\Application Data\Garena
2011-07-17 08:43 . 2011-07-17 08:43 -------- d-----w- c:\documents and settings\Tess\Local Settings\Application Data\Adobe
2011-07-17 08:43 . 2011-07-17 08:43 -------- d-----w- c:\program files\Common Files\Adobe
2011-07-17 08:38 . 2011-07-17 08:42 -------- d-----w- c:\documents and settings\Tess\Application Data\GetRightToGo
2011-07-17 08:25 . 2011-07-17 08:25 -------- d-----w- c:\documents and settings\Tess\Local Settings\Application Data\Solid State Networks
2011-07-16 13:52 . 2011-07-16 13:52 -------- d-----w- c:\documents and settings\Tess\Application Data\BabylonToolbar
2011-07-16 11:57 . 2011-07-16 11:57 -------- d-----w- c:\program files\BabylonToolbar
2011-07-16 11:41 . 2011-07-16 11:58 -------- d-----w- c:\program files\Download Manager
2011-07-16 06:03 . 2011-08-03 05:02 17408 ----a-w- c:\windows\system32\rpcnetp.dll
2011-07-15 21:10 . 2011-07-15 21:10 -------- d-----w- c:\documents and settings\All Users\Application Data\lC00000OnNiM00000
2011-07-15 21:10 . 2011-07-15 21:10 -------- d-----w- C:\Adobe
2011-07-15 21:02 . 2011-07-15 21:02 180736 ----a-w- c:\program files\Windows NT\dwm.exe
2011-07-15 18:20 . 2011-07-15 18:20 -------- d-----w- c:\documents and settings\Tess\Application Data\PointBlank
2011-07-15 17:56 . 2011-07-15 17:56 -------- d-----w- c:\program files\e-Games
2011-07-15 16:30 . 2011-08-03 05:00 -------- d-----w- c:\documents and settings\Tess\Local Settings\Application Data\PMB Files
2011-07-15 16:30 . 2011-07-15 16:30 -------- d-----w- c:\documents and settings\All Users\Application Data\PMB Files
2011-07-15 16:29 . 2011-07-15 16:29 -------- d-----w- c:\program files\Pando Networks
2011-07-10 08:46 . 2011-07-10 08:46 -------- d-----w- c:\documents and settings\Tess\Application Data\ValuSoft
2011-07-10 08:33 . 2011-07-10 08:33 -------- d-----w- c:\program files\Prison Tycoon 4
2011-07-09 12:59 . 2011-07-09 12:59 -------- d-----w- c:\documents and settings\Tess\Application Data\Airytec
2011-07-09 12:59 . 2011-07-09 12:59 -------- d-----w- c:\program files\Airytec
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-08-03 04:52 . 2011-06-30 01:33 44544 ----a-w- c:\windows\system32\agremove.exe
2011-07-01 01:57 . 2011-07-01 01:56 218688 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys
2011-06-30 01:52 . 2011-06-30 01:52 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-06-30 01:52 . 2011-06-30 01:52 472808 ----a-w- c:\windows\system32\deployJava1.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Pando Media Booster"="c:\program files\Pando Networks\Media Booster\PMB.exe" [2011-07-15 3077528]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-03 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-03 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-03 455168]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-01-13 134656]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-01-13 166912]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-01-13 135680]
"BabylonToolbar"="c:\program files\BabylonToolbar\BabylonToolbar\1.4.19.19\BabylonToolbarsrv.exe" [2010-11-07 286720]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe [2006-10-23 40048]
Adobe Reader Synchronizer.lnk - c:\program files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2006-10-23 734872]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Camera Assistant Software]
2007-10-25 14:41 413696 ----a-w- c:\program files\Camera Assistant Software for Toshiba\traybar.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools Lite]
2011-01-20 09:20 1305408 ----a-w- c:\program files\DAEMON Tools Lite\DTLite.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2011-06-30 01:33 136176 ----atw- c:\documents and settings\Tess\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2010-06-01 07:17 5252408 ----a-w- c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2010-12-03 13:46 14944136 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2011-04-08 09:59 254696 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Garena Messenger\\GarenaMessenger.exe"=
"c:\\Program Files\\Garena Messenger\\Apps\\lolph\\Air\\LolClient.exe"=
"c:\\Program Files\\Garena Messenger\\Apps\\lolph\\Game\\League of Legends.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Garena Messenger\\Room\\garena_room.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\2K Sports\\NBA 2K11\\nba2k11.exe"=
"c:\\Program Files\\Pando Networks\\Media Booster\\PMB.exe"=
"c:\\Program Files\\e-Games\\Pointblank\\PointBlank.exe"=
"c:\\Documents and Settings\\Tess\\My Documents\\Downloads\\GarenaGOKartPHDownloader.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8370:TCP"= 8370:TCP:League of Legends Launcher
"8370:UDP"= 8370:UDP:League of Legends Launcher
"6883:TCP"= 6883:TCP:League of Legends Launcher
"6883:UDP"= 6883:UDP:League of Legends Launcher
"6915:TCP"= 6915:TCP:League of Legends Launcher
"6915:UDP"= 6915:UDP:League of Legends Launcher
"6890:TCP"= 6890:TCP:League of Legends Launcher
"6890:UDP"= 6890:UDP:League of Legends Launcher
"6985:TCP"= 6985:TCP:League of Legends Launcher
"6985:UDP"= 6985:UDP:League of Legends Launcher
"58569:TCP"= 58569:TCP:Pando Media Booster
"58569:UDP"= 58569:UDP:Pando Media Booster
.
R1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [7/1/2011 4:56 AM 218688]
R3 CnxtHdAudAddService;Microsoft UAA Function Driver for High Definition Audio Service;c:\windows\system32\drivers\CHDAud.sys [6/30/2011 9:16 AM 732160]
RUnknown rpcnetp;rpcnetp; [x]
S2 SwOffScheduler;Airytec Switch Off - Task Scheduler;c:\program files\Airytec\Switch Off\swoff.exe -service --> c:\program files\Airytec\Switch Off\swoff.exe -service [?]
S2 SwOffWeb;Airytec Switch Off - Web Interface;c:\program files\Airytec\Switch Off\swoff.exe -service --> c:\program files\Airytec\Switch Off\swoff.exe -service [?]
S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [12/18/2009 11:58 AM 11336]
S3 EagleXNt;EagleXNt;\??\c:\windows\system32\drivers\EagleXNt.sys --> c:\windows\system32\drivers\EagleXNt.sys [?]
S3 GGSAFERDriver;GGSAFER Driver;\??\c:\program files\Garena Messenger\Apps\GO Kart PH\Releasephysx27\safedrv.sys --> c:\program files\Garena Messenger\Apps\GO Kart PH\Releasephysx27\safedrv.sys [?]
S3 XDva385;XDva385;\??\c:\windows\system32\XDva385.sys --> c:\windows\system32\XDva385.sys [?]
S3 XDva386;XDva386;\??\c:\windows\system32\XDva386.sys --> c:\windows\system32\XDva386.sys [?]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - RPCNETP
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-02 c:\windows\Tasks\Game_Booster_Startup.job
- c:\program files\IObit\Game Booster\GameBox.exe [2011-06-30 16:08]
.
2011-08-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-606747145-1614895754-1417001333-1004Core.job
- c:\documents and settings\Tess\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-30 01:33]
.
2011-08-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-606747145-1614895754-1417001333-1004UA.job
- c:\documents and settings\Tess\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-30 01:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://search.babylon.com/?babsrc=HP_ss&mntrId=1c677038000000000000001f3b80c033&tlver=1.4.19.19&affID=19949
uInternet Settings,ProxyServer = http=127.0.0.1:61980
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKU-Default-Run-FXWD6M2DFK - c:\windows\system32\sshnas21.dll
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-08-03 08:02
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\System32\rpcnetp.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\system32\wscntfy.exe
c:\program files\Internet Explorer\iexplore.exe
.
**************************************************************************
.
Completion time: 2011-08-03 08:04:21 - machine was rebooted
ComboFix-quarantined-files.txt 2011-08-03 05:04
.
Pre-Run: 140,441,423,872 bytes free
Post-Run: 141,539,024,896 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 89DF962265104AEFDE8417C5F1B86C44

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:15 PM

Posted 03 August 2011 - 04:23 PM

Hello,


Looks like we got the main infection now for some cleanup and final checking.


1.
Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

c:\program files\Windows NT\dwm.exe

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/


2.
Please download Malwarebytes' Anti-Malware (v1.50) and save it to your desktop.
Download Link 1
Download Link 2Malwarebytes' may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes' when done.
Note: If Malwarebytes' encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes' from removing all the malware.


3.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

4.
Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

5.
Your version of Adobe Reader is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Adobe components and update:
  • Download the latest version of Adobe Reader Version X and save it to your desktop.
  • Uncheck the "Free McAfee Security plan Plus" option or any other Toolbar you are offered
  • Click the download button at the bottom.
  • If you use Internet Explorer and do not wish to install the ActiveX element, simply click on the click here to download link on the next page.
  • Remove all older version of Adobe Reader: Go to Add/remove and uninstall all versions of Adobe Reader, Acrobat Reader and Adobe Acrobat.
    If you are unsure of how to use Add or Remove Programs, the please see this tutorial:How To Remove An Installed Program From Your Computer
  • Then from your desktop double-click on Adobe Reader to install the newest version.
    If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the "Adobe Setup - Welcome" window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • Once the installation is finished, go here: Adobe Update Page and scroll down to UPDATES/PROGRAMS. From there download: Adobe Reader X update - multiple languages and save it to your desktop.
  • Double-click the file AdbeRdrUpd932_all_incr.msp on your desktop to start installing the update and follow the prompts.
  • Once the update is done click Exit.
Your Adobe Reader is now up to date!



Things to include in your next reply::
MBAM log
Eset log
Jotti results
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 rexterutot

rexterutot
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:15 PM

Posted 03 August 2011 - 07:44 PM

Hi Sir here are the logs you requested. The redirects are not happening anymore but there is the weird google chrome has experienced an error and needs to close but when I click it, nothing happens. I don't know if it was just a one time thing. I did not know how to copy the jotti log so I just took a screenshot of it.


Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7367

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

8/4/2011 1:31:23 AM
mbam-log-2011-08-04 (01-31-23).txt

Scan type: Quick scan
Objects scanned: 141422
Time elapsed: 2 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\Tess\my documents\downloads\downloadmanagersetup (1).exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Tess\my documents\downloads\downloadmanagersetup (2).exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Tess\my documents\downloads\downloadmanagersetup.exe (Adware.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Tess\my documents\downloads\frostwiresetup.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
c:\program files\windows nt\dwm.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Adobe\plugs\mmc4279078.txt a variant of Win32/Kryptik.QMG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Tess\Application Data\dwm.exe.vir a variant of Win32/Cycbot.AG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Tess\Application Data\Microsoft\conhost.exe.vir a variant of Win32/Kryptik.RAJ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Program Files\Internet Explorer\conhost.exe.vir a variant of Win32/Kryptik.QJC trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\sshnas21.dll.vir a variant of Win32/Kryptik.QKV trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP18\A0004423.dll Win32/TrojanDownloader.FakeAlert.ARF trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006780.exe a variant of Win32/Kryptik.QJC trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006902.exe a variant of Win32/Kryptik.QKK trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP19\A0006971.exe a variant of Win32/Kryptik.QOH trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008121.exe Win32/Cycbot.AF trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP20\A0008524.exe Win32/Cycbot.AF trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP22\A0008736.exe a variant of Win32/Kryptik.RAJ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009074.exe a variant of Win32/Cycbot.AG trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009075.exe a variant of Win32/Kryptik.RAJ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009076.exe a variant of Win32/Kryptik.QJC trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009078.dll a variant of Win32/Kryptik.QKV trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009239.exe NSIS/TrojanDownloader.FakeAlert.DK.Gen trojan deleted - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009240.exe multiple threats deleted - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009241.exe NSIS/TrojanDownloader.FakeAlert.DK.Gen trojan deleted - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP23\A0009242.exe probably a variant of Win32/Agent.IQGDUNZ trojan deleted - quarantined
C:\System Volume Information\_restore{E832D947-D847-4C71-B681-7C9F2FB95509}\RP7\A0000534.exe probably a variant of Win32/Agent.IQGDUNZ trojan cleaned by deleting - quarantined

Attached Files


Edited by rexterutot, 03 August 2011 - 07:44 PM.


#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:15 PM

Posted 03 August 2011 - 07:54 PM

Hello, rexterutot.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".


Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.



Recommendations
Below are some recommendations to lower your chances of (re)infection.
  • Install and maintain an outbound firewall
  • Install Spyware Blaster and update it regularly
    If you wish, the commercial version provides automatic updating.
  • Install the MVPs hosts file, and update it regularly
    You can use the HostMan host file manager to do this automaticly if you wish.
    For more information on the hosts file, and what it can do for you, you can view the Tutorial on the Hosts file
  • Install an Anti-Spyware program, and update it regularly
    Malware Byte's Anti Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.
    SUPERAntiSpyware is another good scanner with high detection and removal rates.
    Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.
  • Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.

    If you are using Windows XP or earlier
    Visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!

    If you are using Windows Vista
    • Click the "Start Menu" (or Windows Orb)
    • Click "All Programs"
    • Click "Windows Update"
    • On the left, choose "Change Settings"
    • Ensure that the checkbox "Use Microsoft Update" at the bottom of the window is checked.
    • Press OK and accept the UAC prompt.
      Note: You shouldn't need to check this checkbox every single time you update, only the first time.
    • Click "Check for Updates" in the upper left corner.
    • Follow the instructions to install the latest updates.
    • Reboot and repeat the "Check for Updates" until there are no more critical updates to install
  • Keep your other software up to date as well
    Software does not need to be made by Microsoft to be insecure. You can use the Secunia Online Software occasionally to help you check for out of date software on your machine.
  • Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing :(.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 rexterutot

rexterutot
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:11:15 PM

Posted 03 August 2011 - 11:00 PM

Ok Sir Thanks a lot for your help.

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:11:15 PM

Posted 04 August 2011 - 04:14 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users