Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DEP shuts down random stuff, what to do?


  • Please log in to reply
23 replies to this topic

#1 Xezat

Xezat

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 07 August 2011 - 04:48 AM

Ok so about an hour ago, got some usual random virus/trojan deal while browsing on IE (seriously, why do they like Deviantart so much?), crashed the computer so I went into safe mode after the reboot, ran MBAM and deleted some stuff that came up, booted up normally and ran MBAM again and deleted even more stuff, then restarted again.

Except...now DEP messages pop up saying they've shut down stuff that usually boots up, mainly looks like things that pop up in the lower right of the bar, but also said some things like java, or activeshield or something...some random stuff. Which is odd, as initially it prevented firefox from openning, but I kept trying it and here I am typing this up now...so I'm at a loss as to if it's actually doing anything or not. Gonna let Ad-Aware take a crack at it overnight with its full system scan, maybe it'll turn up something, but yeah...kinda concerned if it's perhaps some remnant or something, as MBAM isn't turning up anything further in quick scan mode.

Also as I'm on a laptop, it seems like the fn keys aren't working either, as I can't turn down or mute stuff with fn+f# keys and such.

Edited by Xezat, 07 August 2011 - 04:54 AM.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:12:16 AM

Posted 07 August 2011 - 12:05 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 07 August 2011 - 11:47 PM

Sorry for the late reply, was pretty busy throughout the day. Unfortunately with whatever this is, I could not get Security Check to work at all; when I tried to run it, DEP kept popping up saying it was stopping Find String (grep) Utility, and despite canceling the DEP box, it kept popping up no matter until I exited from Security Check. So that's a no go, though if it matters at all the only anti-virus or security things I have are MBAM and Lavasoft Ad-Aware I believe.


Here is the rest of the requested info:


MBAM:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7402

Windows 6.0.6002 Service Pack 2
Internet Explorer 7.0.6002.18005

8/7/2011 9:44:42 PM
mbam-log-2011-08-07 (21-44-42).txt

Scan type: Quick scan
Objects scanned: 177480
Time elapsed: 3 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Minitoolbox:

MiniToolBox by Farbar
Ran by Owner (administrator) on 07-08-2011 at 19:52:50
Windows ™ Vista Home Premium Service Pack 2 (X64)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

Hosts file not detected in the default diroctory========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled
add route prefix=0.0.0.0/0 interface="Local Area Connection 3" nexthop=5.0.0.1
set interface interface="Local Area Connection 3" forwarding=disabled advertise=disabled metric=9000 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled


popd
# End of IPv4 configuration


Server: UnKnown
Address: 192.168.0.1

Name: google.com.Family
Address: 72.215.225.9



Pinging google.com [74.125.73.106] with 32 bytes of data:

Reply from 74.125.73.106: bytes=32 time=54ms TTL=54

Reply from 74.125.73.106: bytes=32 time=56ms TTL=54



Ping statistics for 74.125.73.106:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 54ms, Maximum = 56ms, Average = 55ms

Server: UnKnown
Address: 192.168.0.1

Name: yahoo.com.Family
Address: 72.215.225.9



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
12 ...00 23 54 22 8f 63 ...... Realtek PCIe GBE Family Controller
11 ...00 21 5d 0d ee 9c ...... Intel® WiFi Link 5100 AGN
1 ........................... Software Loopback Interface 1
16 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
29 ...00 00 00 00 00 00 00 e0 isatap.azPinesPi
13 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
27 ...00 00 00 00 00 00 00 e0 isatap.Family
22 ...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #5
21 ...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
25 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
23 ...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #6
24 ...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter #7
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.106 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.0.0 255.255.255.0 On-link 192.168.0.106 281
192.168.0.106 255.255.255.255 On-link 192.168.0.106 281
192.168.0.255 255.255.255.255 On-link 192.168.0.106 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.0.106 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.0.106 281
===========================================================================
Persistent Routes:
Network Address Netmask Gateway Address Metric
0.0.0.0 0.0.0.0 5.0.0.1 Default
===========================================================================

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
13 18 ::/0 On-link
1 306 ::1/128 On-link
13 18 2001::/32 On-link
13 266 2001:0:4137:9e76:18c0:35f5:3f57:ff95/128
On-link
11 281 fe80::/64 On-link
13 266 fe80::/64 On-link
13 266 fe80::18c0:35f5:3f57:ff95/128
On-link
11 281 fe80::b00a:38a3:c728:3078/128
On-link
1 306 ff00::/8 On-link
13 266 ff00::/8 On-link
11 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/07/2011 07:53:05 PM) (Source: Application Error) (User: )
Description: Faulting application PING.EXE, version 6.0.6001.18000, time stamp 0x47919130, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x128c, application start time 0xPING.EXE0.

Error: (08/07/2011 07:52:51 PM) (Source: Application Error) (User: )
Description: Faulting application ipconfig.exe, version 6.0.6002.18005, time stamp 0x49e020c7, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x1310, application start time 0xipconfig.exe0.

Error: (08/07/2011 07:51:44 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x1370, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:37 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x1118, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:28 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x12c8, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:27 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x12b4, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:26 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x864, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:25 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x75d4a57d,
process id 0x13b4, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:24 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0x1158, application start time 0xfind.exe0.

Error: (08/07/2011 07:51:23 PM) (Source: Application Error) (User: )
Description: Faulting application find.exe, version 6.0.6000.16386, time stamp 0x4549ad0d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception code 0xc0000005, fault offset 0x77b340ea,
process id 0xc58, application start time 0xfind.exe0.


System errors:
=============

Microsoft Office Sessions:
=========================
Error: (02/16/2009 03:53:31 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.4518.1014, Microsoft Office Version: 12.0.4518.1014. This session lasted 124 seconds with 60 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 45%
Total physical RAM: 4094.17 MB
Available physical RAM: 2232.29 MB
Total Pagefile: 8363.61 MB
Available Pagefile: 6388.09 MB
Total Virtual: 4095.88 MB
Available Virtual: 4015.36 MB

========================= Partitions: =====================================

1 Drive c: (Vista64) (Fixed) (Total:287.35 GB) (Free:91.01 GB) NTFS

========================= Users: ========================================

== End of log ==


Gmer:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-08-07 21:35:45
Windows 6.0.6002 Service Pack 2
Running: 9ojwksl6.exe


---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\00158315a2a0
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001e8c03d022
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\00158315a2a0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\001e8c03d022 (not active ControlSet)

---- EOF - GMER 1.0.15 ----


Finally it it helps at all, here's a sampling of some of the things DEP has been popping up for, most of the stuff as far as I can tell will still run though (like for example, a bunch kept popping up when I ran MiniToolBar but I still got the info from it). This is only some of them though, only started recording them when I ran through your checklist of stuff to do:

InstallShield Update Service Agent

Console IME

windows Problem Reporting

cmdinfo.exe

A tool to aid in developing services for WindowsNT

Find String (grep) Utility

IP Configuration Utility

TCP/IP Ping Command

Net Command

#4 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 07 August 2011 - 11:48 PM

And just in advance, thanks for any help you're able to provide in fixing this; I swear I'm deleting freaking Internet Explorer 7 from my laptop as soon as this stuff is fixed, never browsing on that piece of junk again...

#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:12:16 AM

Posted 07 August 2011 - 11:57 PM

You can't remove IE. It's part of Windoiws.

Did you remove part of "IP Configuration" section in MiniToolbox log?

Re-run MiniToolbox.

Checkmark following boxes:
  • List Installed Programs
Click Go and post the result.

============================================================

We have "hosts" file missing.

Open Notepad.
Paste the following text into it:

# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
#  	102.54.94.97 	rhino.acme.com      	# source server
#   	38.25.63.10 	x.acme.com          	# x client host

127.0.0.1   	localhost
::1         	localhost

Go File>Save As and...

1. Name the file hosts (no extension; make sure there is just a "dot" at the end <--- VERY IMPORTANT!)
2. Make sure, "Save as type:" is set to "All Files (*.*)
3. File is saved to C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder

Posted Image

Then.....

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

64-bit users go HERE
  • Double-click SystemLook.exe to run it.
  • Vista\Win 7 users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    :dir
    C:\WINDOWS\SYSTEM32\DRIVERS\ETC
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#6 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 01:13 AM

<--now hating Microsoft and IE

Requested minitoolbox rerun:

MiniToolBox by Farbar
Ran by Owner (administrator) on 07-08-2011 at 23:07:40
Windows ™ Vista Home Premium Service Pack 2 (X64)

***************************************************************************

=========================== Installed Programs ============================

Update for Microsoft Office 2007 (KB2508958)
2007 Microsoft Office system (Version: 12.0.6425.1000)
Activation Assistant for the 2007 Microsoft Office suites
Activation Assistant for the 2007 Microsoft Office suites (Version: 1.0)
Ad-Aware
Ad-Aware (Version: 8.3.0)
Adobe Flash Player 10 ActiveX (Version: 10.1.85.3)
Adobe Flash Player 10 Plugin (Version: 10.3.181.26)
Adobe Reader 8.1.2 (Version: 8.1.2)
Age of Empires III - The Asian Dynasties (Version: 1.00.0000)
Age of Empires III - The WarChiefs (Version: 1.00.0000)
Age of Empires III (Version: 1.00.0000)
AIM 7
Apple Application Support (Version: 1.5.2)
Apple Mobile Device Support (Version: 3.4.1.2)
Apple Software Update (Version: 2.1.3.127)
ASUS InstantFun (Version: 1.0.0015)
ASUS LifeFrame3 (Version: 3.0.9)
ASUS Live Update (Version: 2.5.6)
ASUS Power4Gear eXtreme (Version: 1.0.17)
ASUS SmartLogon (Version: 1.0.0005)
ASUS Splendid Video Enhancement Technology (Version: 1.02.0021)
ATK Generic Function Service (Version: 1.00.0008)
ATK Hotkey (Version: 1.0.0038)
ATK Media (Version: 2.0.0000)
ATKOSD2 (Version: 7.0.0001)
Audible Download Manager (Version: 6.6.0.12)
Bonjour (Version: 2.0.5.0)
ConvertHelper 2.2
CyberLink LabelPrint (Version: 2.0.2908)
CyberLink Power2Go (Version: 6.0.1924)
Dolby Control Center (Version: 1.1.0601)
Download Updater (AOL LLC)
DVDFab 6.2.1.8 (31/12/2009)
DVDFab 7.0.7.0 (08/06/2010)
DVDFab 8.0.8.5 (19/03/2011)
DVDFab 8.1.0.0 (16/06/2011) Qt
InterVideo WinDVD 8 (Version: 8.0-B6.109)
ITECIR (Version: 1.00.0000)
iTunes (Version: 10.3.1.55)
Java Auto Updater (Version: 2.0.5.1)
Java™ 6 Update 26 (Version: 6.0.260)
LEGO Digital Designer
LightScribe System Software 1.14.17.1 (Version: 1.14.17.1)
Logitech GamePanel Software 3.03.133 (Version: 3.03.133)
Logitech Gaming Software 5.10 (Version: 5.10.127)
LogMeIn Hamachi (Version: 2.0.2.85)
Malwarebytes' Anti-Malware version 1.51.1.1800 (Version: 1.51.1.1800)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft Office 2007 Service Pack 2 (SP2)
Microsoft Office Access MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Access Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Enterprise 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel 2007 Help ¸üР(KB963678)
Microsoft Office Excel 2007 Help Actualización (KB963678)
Microsoft Office Excel 2007 Help §ó·sµ{¦¡ (KB963678)
Microsoft Office Excel MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Excel MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office File Validation Add-In (Version: 14.0.5130.5003)
Microsoft Office Groove MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Groove Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office IME (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office IME (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office InfoPath MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Office 64-bit Components 2007 (Version: 12.0.6425.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook 2007 Help ¸üР(KB963677)
Microsoft Office Outlook 2007 Help Actualización (KB963677)
Microsoft Office Outlook MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Powerpoint 2007 Help ¸üР(KB963669)
Microsoft Office Powerpoint 2007 Help Actualización (KB963669)
Microsoft Office Powerpoint 2007 Help §ó·sµ{¦¡ (KB963669)
Microsoft Office PowerPoint MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Professional Hybrid 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Arabic) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Basque) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (Catalan) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Dutch) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Galician) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (German) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Portuguese (Brazil)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proofing (Chinese (Simplified)) 2007 (Version: 12.0.4518.1016)
Microsoft Office Proofing (Chinese (Traditional)) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing (French) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing (Spanish) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
Microsoft Office Publisher MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Publisher MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Publisher MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Publisher MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Publisher MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared 64-bit Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word 2007 Help ¸üР(KB963665)
Microsoft Office Word 2007 Help Actualización (KB963665)
Microsoft Office Word 2007 Help §ó·sµ{¦¡ (KB963665)
Microsoft Office Word MUI (Chinese (Simplified)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (Chinese (Traditional)) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Word MUI (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Silverlight (Version: 4.0.60531.0)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.59192)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.61000)
Microsoft Visual C++ 2008 ATL Update kb973924 - x64 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Mise à jour Microsoft Office Excel 2007 Help (KB963678)
Mise à jour Microsoft Office Outlook 2007 Help (KB963677)
Mise à jour Microsoft Office Powerpoint 2007 Help (KB963669)
Mise à jour Microsoft Office Word 2007 Help (KB963665)
Motorola Driver Installation 4.2.4 (Version: 4.2.4)
Mozilla Firefox (3.6.18) (Version: 3.6.18 (en-US))
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
NB Probe
Nostromo (Version: 3.2.4)
Nostromo Array Programming Software (Version: 3.0.2)
NVIDIA Drivers (Version: 1.4)
PlayStation®Network Downloader (Version: 1.01.00018)
PlayStation®Store (Version: 1.0.0.11252)
Pokemon Online 1.0.11
QuickTime (Version: 7.69.80.9)
Realtek 8169 8168 8101E 8102E Ethernet Driver (Version: 1.00.0000)
Realtek High Definition Audio Driver (Version: 6.0.1.5645)
Redshark 3.71 (Version: 3.71)
Revo Uninstaller 1.90 (Version: 1.90)
RICOH R5C83x/84x Flash Media Controller Driver Ver.3.55.01 (Version: 3.55.01)
Skype Toolbars (Version: 1.0.4051)
Skype™ 4.2 (Version: 4.2.187)
Sony Media Manager for PSP 3.0 (Version: 3.0.892)
Synaptics Pointing Device Driver (Version: 10.1.8.0)
System Requirements Lab (Version: 4.1.14.0)
System Requirements Lab CYRI (Version: 4.4.26.0)
Unity Web Player (All users) (Version: )
Update for 2007 Microsoft Office System (KB2284654)
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2473228) (Version: 1)
Update for Microsoft Office 2007 Help for Common Features (KB963673)
Update for Microsoft Office 2007 System (KB2539530)
Update for Microsoft Office Access 2007 Help (KB963663)
Update for Microsoft Office Excel 2007 Help (KB963678)
Update for Microsoft Office Infopath 2007 Help (KB963662)
Update for Microsoft Office OneNote 2007 (KB980729)
Update for Microsoft Office OneNote 2007 Help (KB963670)
Update for Microsoft Office Outlook 2007 (KB2509470)
Update for Microsoft Office Outlook 2007 Help (KB963677)
Update for Microsoft Office Powerpoint 2007 Help (KB963669)
Update for Microsoft Office Publisher 2007 Help (KB963667)
Update for Microsoft Office Script Editor Help (KB963671)
Update for Microsoft Office Word 2007 Help (KB963665)
Update for Outlook 2007 Junk Email Filter (KB2553975)
USB 2.0 1.3M UVC WebCam
Ventrilo Client for Windows x64 (Version: 3.0.5.0)
Viewpoint Media Player
Visual C++ 2008 x86 Runtime - (v9.0.30729) (Version: 9.0.30729)
Visual C++ 2008 x86 Runtime - v9.0.30729.01 (Version: 9.0.30729.01)
Warcraft III
Windows Driver Package - SteelSeries (HidUsb) HIDClass (11/06/2008 1.0.0.0) (Version: 11/06/2008 1.0.0.0)
WinFlash
WinRAR archiver
Wireless Console 2 (Version: 2.0.10)
World of Warcraft (Version: 4.2.0.14333)
World of Warcraft MMO Gaming Mouse (Version: 1.13.0000)
Xvid 1.2.1 final uninstall (Version: 1.2)

== End of log ==


SystemLook results:

SystemLook 30.07.11 by jpshortstuff
Log created at 23:13 on 07/08/2011 by Owner
Administrator - Elevation successful

========== dir ==========

C:\WINDOWS\SYSTEM32\DRIVERS\ETC - Parameters: "(none)"

---Files---
hosts.txt --a---- 735 bytes [06:11 08/08/2011] [06:11 08/08/2011]
lmhosts.sam --a---- 3683 bytes [06:42 02/11/2006] [21:37 18/09/2006]
networks --a---- 407 bytes [12:34 02/11/2006] [21:37 18/09/2006]
protocol --a---- 1358 bytes [12:34 02/11/2006] [21:37 18/09/2006]
services --a---- 17244 bytes [12:34 02/11/2006] [21:37 18/09/2006]

---Folders---
None found.

-= EOF =-

Edited by Xezat, 08 August 2011 - 04:09 PM.


#7 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 04:11 PM

Not sure if I mentioned it before, but the visual icons that usually pop up when I use the Function key to do something on my laptop (like say, fn+f10 is to mute the sound, the icon now looks a loot more...basic compared to the former, which was a big one that displayed in the middle of the screen, any ideal on why that is?). I'm beginning to also think that this probably isn't a virus per say, but likely the leftover damage from when I removed it with MBAM a few nights ago now, as the DEP seems to be the main problem in randomly popping up saying it prevented stuff; if it'd help, I can probably dig up those logs?

Edited by Xezat, 08 August 2011 - 04:11 PM.


#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:12:16 AM

Posted 08 August 2011 - 06:10 PM

I don't see any AV program running.
Install one of these:
- Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html
- Avira free antivirus: http://www.free-av.com/en/download/1/avira_antivir_personal__free_antivirus.html
Update, run full scan, report on any findings.

================================================================

Open Windows Explorer.
Navigate to C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder and rename hosts.txt to just hosts (no extension).
Post fresh System Look log.

==============================================================

Unless you installed Viewpoint Manager knowledgeably...
Go Start>Control Panel>Add\Remove (Programs and Features in Vista), and...
Uninstall any of the following programs associated with Viewpoint:
* Viewpoint Manager
* Viewpoint Media Player
* Viewpoint Toolbar
This program does not do anything bad such as deliver ads or spy on you, but it is considered foistware ("drive-by-install") as it is installed without your consent through programs like AOL, AIM, Compuserve, etc.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 06:44 PM

I chose to download Avira:



Avira AntiVir Personal
Report file date: Monday, August 08, 2011 16:39

Scanning for 3347986 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows Vista x64
Windows version : (Service Pack 2) [6.0.6002]
Boot mode : Normally booted
Username : Owner
Computer name : OWNER-PC

Version information:
BUILD.DAT : 10.0.0.652 31824 Bytes 7/20/2011 16:49:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 7/20/2011 18:30:06
AVSCAN.DLL : 10.0.3.0 46440 Bytes 7/20/2011 18:30:45
LUKE.DLL : 10.0.3.2 104296 Bytes 7/20/2011 18:30:32
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 07:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 17:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 14:53:55
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 14:53:56
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 18:30:38
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 18:30:40
VBASE005.VDF : 7.11.10.251 1788416 Bytes 7/7/2011 18:30:41
VBASE006.VDF : 7.11.10.252 2048 Bytes 7/7/2011 18:30:41
VBASE007.VDF : 7.11.10.253 2048 Bytes 7/7/2011 18:30:41
VBASE008.VDF : 7.11.10.254 2048 Bytes 7/7/2011 18:30:41
VBASE009.VDF : 7.11.10.255 2048 Bytes 7/7/2011 18:30:41
VBASE010.VDF : 7.11.11.0 2048 Bytes 7/7/2011 18:30:41
VBASE011.VDF : 7.11.11.1 2048 Bytes 7/7/2011 18:30:41
VBASE012.VDF : 7.11.11.2 2048 Bytes 7/7/2011 18:30:41
VBASE013.VDF : 7.11.11.75 688128 Bytes 7/12/2011 18:30:41
VBASE014.VDF : 7.11.11.104 978944 Bytes 7/13/2011 18:30:42
VBASE015.VDF : 7.11.11.137 655360 Bytes 7/14/2011 18:30:42
VBASE016.VDF : 7.11.11.184 699392 Bytes 7/18/2011 23:38:45
VBASE017.VDF : 7.11.11.214 414208 Bytes 7/19/2011 23:38:46
VBASE018.VDF : 7.11.11.242 772096 Bytes 7/20/2011 23:38:47
VBASE019.VDF : 7.11.12.3 1291776 Bytes 7/20/2011 23:38:48
VBASE020.VDF : 7.11.12.30 844288 Bytes 7/21/2011 23:38:49
VBASE021.VDF : 7.11.12.67 149504 Bytes 7/24/2011 23:38:49
VBASE022.VDF : 7.11.12.93 195072 Bytes 7/25/2011 23:38:50
VBASE023.VDF : 7.11.12.113 150528 Bytes 7/26/2011 23:38:50
VBASE024.VDF : 7.11.12.152 182784 Bytes 7/28/2011 23:38:50
VBASE025.VDF : 7.11.12.181 117760 Bytes 8/1/2011 23:38:50
VBASE026.VDF : 7.11.12.205 148480 Bytes 8/3/2011 23:38:51
VBASE027.VDF : 7.11.12.229 252928 Bytes 8/5/2011 23:38:51
VBASE028.VDF : 7.11.12.243 134656 Bytes 8/8/2011 23:38:51
VBASE029.VDF : 7.11.12.244 2048 Bytes 8/8/2011 23:38:52
VBASE030.VDF : 7.11.12.245 2048 Bytes 8/8/2011 23:38:52
VBASE031.VDF : 7.11.12.247 2048 Bytes 8/8/2011 23:38:52
Engineversion : 8.2.6.28
AEVDF.DLL : 8.1.2.1 106868 Bytes 4/21/2011 14:53:28
AESCRIPT.DLL : 8.1.3.74 1622393 Bytes 8/8/2011 23:38:58
AESCN.DLL : 8.1.7.2 127349 Bytes 4/21/2011 14:53:27
AESBX.DLL : 8.2.1.34 323957 Bytes 7/20/2011 18:29:54
AERDL.DLL : 8.1.9.13 639349 Bytes 7/20/2011 18:29:53
AEPACK.DLL : 8.2.9.5 676214 Bytes 7/20/2011 18:29:53
AEOFFICE.DLL : 8.1.2.13 201083 Bytes 8/8/2011 23:38:57
AEHEUR.DLL : 8.1.2.151 3584374 Bytes 8/8/2011 23:38:57
AEHELP.DLL : 8.1.17.7 254327 Bytes 8/8/2011 23:38:53
AEGEN.DLL : 8.1.5.7 401778 Bytes 8/8/2011 23:38:53
AEEMU.DLL : 8.1.3.0 393589 Bytes 4/21/2011 14:53:14
AECORE.DLL : 8.1.22.4 196983 Bytes 7/20/2011 18:29:42
AEBB.DLL : 8.1.1.0 53618 Bytes 4/21/2011 14:53:14
AVWINLL.DLL : 10.0.0.0 19304 Bytes 4/21/2011 14:53:36
AVPREF.DLL : 10.0.0.0 44904 Bytes 7/20/2011 18:30:04
AVREP.DLL : 10.0.0.8 62209 Bytes 7/20/2011 18:30:04
AVREG.DLL : 10.0.3.2 53096 Bytes 7/20/2011 18:30:04
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 7/20/2011 18:30:06
AVARKT.DLL : 10.0.22.6 231784 Bytes 7/20/2011 18:29:58
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 7/20/2011 18:30:03
SQLITE3.DLL : 3.6.19.0 355688 Bytes 7/20/2011 23:40:24
AVSMTP.DLL : 10.0.0.17 63848 Bytes 4/21/2011 14:53:36
NETNT.DLL : 10.0.0.0 11624 Bytes 4/21/2011 14:53:46
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 7/20/2011 18:30:48
RCTEXT.DLL : 10.0.58.0 97128 Bytes 7/20/2011 18:30:48

Configuration settings for the scan:
Jobname.............................: Short system scan after installation
Configuration file..................: c:\program files (x86)\avira\antivir desktop\setupprf.dat
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, August 08, 2011 16:39

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avconfig.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'setup.exe' - '1' Module(s) have been scanned
Scan process 'presetup.exe' - '1' Module(s) have been scanned
Scan process 'avira_antivir_personal_en.exe' - '1' Module(s) have been scanned
Scan process 'ping.exe' - '1' Module(s) have been scanned
Scan process 'sensorsrv.exe' - '1' Module(s) have been scanned
Scan process 'ALU.exe' - '1' Module(s) have been scanned
Scan process 'plugin-container.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'smartlogon.exe' - '1' Module(s) have been scanned
Scan process 'AAWService.exe' - '1' Module(s) have been scanned
Scan process 'AAWTray.exe' - '1' Module(s) have been scanned
Scan process 'conime.exe' - '1' Module(s) have been scanned
Scan process 'ping.exe' - '1' Module(s) have been scanned
Scan process 'nost_LM.exe' - '1' Module(s) have been scanned
Scan process 'spmgr.exe' - '1' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '1' Module(s) have been scanned
Scan process 'iviRegMgr.exe' - '1' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '1' Module(s) have been scanned
Scan process 'wmplayer.exe' - '1' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '1' Module(s) have been scanned
Scan process 'ISUSPM.exe' - '1' Module(s) have been scanned
Scan process 'LCDMedia.exe' - '1' Module(s) have been scanned
Scan process 'WDC.exe' - '1' Module(s) have been scanned
Scan process 'KBFiltr.exe' - '1' Module(s) have been scanned
Scan process 'ATKOSD.exe' - '1' Module(s) have been scanned
Scan process 'Atouch64.exe' - '1' Module(s) have been scanned
Scan process 'HControl.exe' - '1' Module(s) have been scanned
Scan process 'GFNEXSrv.exe' - '1' Module(s) have been scanned
Scan process 'ASLDRSrv.exe' - '1' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[DETECTION] Contains code of the BOO/TDss.M boot sector virus
[NOTE] The boot sector was not written!

Start scanning boot sectors:

Starting to scan executable files (registry).

The registry was scanned ( '888' files ).



End of the scan: Monday, August 08, 2011 16:41
Used time: 01:55 Minute(s)

The scan has been done completely.

0 Scanned directories
1483 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1483 Files not concerned
6 Archives were scanned
0 Warnings
1 Notes


Concerning this step:

Open Windows Explorer.
Navigate to C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder and rename hosts.txt to just hosts (no extension).
Post fresh System Look log.

I have been trying to do that, I even went through the steps again listed in your prior post and it's still coming up as a text file; is there any reason why? I have the 64-bit Vista with SP2 if it helps at all...

Deleting those foistware programs you mentioned as I post this, definitely don't remember installing them so they probably came around when I put in AIM long ago; there any other similar ones I can delete that you've noticed?

#10 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 06:57 PM

Just realized that wasn't a full system scan from Avira (guess it was just whatever initial one it does), doing the full one now and will edit the log in when done.

#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:12:16 AM

Posted 08 August 2011 - 07:58 PM

OK.

Did you right click on hosts.txt file then "Rename"?
Do you see .txt extension in hosts.txt file?
If not, in Windows Explorer got Tools>Folder options>View tab and UN-check "Hide extensions for known file types".
Press F5 to refresh Windows Explorer.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 09:06 PM

Ok, did the full scan with Avira, here's the log:



Avira AntiVir Personal
Report file date: Monday, August 08, 2011 16:53

Scanning for 3347986 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows Vista x64
Windows version : (Service Pack 2) [6.0.6002]
Boot mode : Normally booted
Username : SYSTEM
Computer name : OWNER-PC

Version information:
BUILD.DAT : 10.0.0.652 31824 Bytes 7/20/2011 16:49:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 7/20/2011 18:30:06
AVSCAN.DLL : 10.0.3.0 46440 Bytes 7/20/2011 18:30:45
LUKE.DLL : 10.0.3.2 104296 Bytes 7/20/2011 18:30:32
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 07:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 17:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 14:53:55
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 14:53:56
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 18:30:38
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 18:30:40
VBASE005.VDF : 7.11.10.251 1788416 Bytes 7/7/2011 18:30:41
VBASE006.VDF : 7.11.10.252 2048 Bytes 7/7/2011 18:30:41
VBASE007.VDF : 7.11.10.253 2048 Bytes 7/7/2011 18:30:41
VBASE008.VDF : 7.11.10.254 2048 Bytes 7/7/2011 18:30:41
VBASE009.VDF : 7.11.10.255 2048 Bytes 7/7/2011 18:30:41
VBASE010.VDF : 7.11.11.0 2048 Bytes 7/7/2011 18:30:41
VBASE011.VDF : 7.11.11.1 2048 Bytes 7/7/2011 18:30:41
VBASE012.VDF : 7.11.11.2 2048 Bytes 7/7/2011 18:30:41
VBASE013.VDF : 7.11.11.75 688128 Bytes 7/12/2011 18:30:41
VBASE014.VDF : 7.11.11.104 978944 Bytes 7/13/2011 18:30:42
VBASE015.VDF : 7.11.11.137 655360 Bytes 7/14/2011 18:30:42
VBASE016.VDF : 7.11.11.184 699392 Bytes 7/18/2011 23:38:45
VBASE017.VDF : 7.11.11.214 414208 Bytes 7/19/2011 23:38:46
VBASE018.VDF : 7.11.11.242 772096 Bytes 7/20/2011 23:38:47
VBASE019.VDF : 7.11.12.3 1291776 Bytes 7/20/2011 23:38:48
VBASE020.VDF : 7.11.12.30 844288 Bytes 7/21/2011 23:38:49
VBASE021.VDF : 7.11.12.67 149504 Bytes 7/24/2011 23:38:49
VBASE022.VDF : 7.11.12.93 195072 Bytes 7/25/2011 23:38:50
VBASE023.VDF : 7.11.12.113 150528 Bytes 7/26/2011 23:38:50
VBASE024.VDF : 7.11.12.152 182784 Bytes 7/28/2011 23:38:50
VBASE025.VDF : 7.11.12.181 117760 Bytes 8/1/2011 23:38:50
VBASE026.VDF : 7.11.12.205 148480 Bytes 8/3/2011 23:38:51
VBASE027.VDF : 7.11.12.229 252928 Bytes 8/5/2011 23:38:51
VBASE028.VDF : 7.11.12.243 134656 Bytes 8/8/2011 23:38:51
VBASE029.VDF : 7.11.12.244 2048 Bytes 8/8/2011 23:38:52
VBASE030.VDF : 7.11.12.245 2048 Bytes 8/8/2011 23:38:52
VBASE031.VDF : 7.11.12.247 2048 Bytes 8/8/2011 23:38:52
Engineversion : 8.2.6.28
AEVDF.DLL : 8.1.2.1 106868 Bytes 4/21/2011 14:53:28
AESCRIPT.DLL : 8.1.3.74 1622393 Bytes 8/8/2011 23:38:58
AESCN.DLL : 8.1.7.2 127349 Bytes 4/21/2011 14:53:27
AESBX.DLL : 8.2.1.34 323957 Bytes 7/20/2011 18:29:54
AERDL.DLL : 8.1.9.13 639349 Bytes 7/20/2011 18:29:53
AEPACK.DLL : 8.2.9.5 676214 Bytes 7/20/2011 18:29:53
AEOFFICE.DLL : 8.1.2.13 201083 Bytes 8/8/2011 23:38:57
AEHEUR.DLL : 8.1.2.151 3584374 Bytes 8/8/2011 23:38:57
AEHELP.DLL : 8.1.17.7 254327 Bytes 8/8/2011 23:38:53
AEGEN.DLL : 8.1.5.7 401778 Bytes 8/8/2011 23:38:53
AEEMU.DLL : 8.1.3.0 393589 Bytes 4/21/2011 14:53:14
AECORE.DLL : 8.1.22.4 196983 Bytes 7/20/2011 18:29:42
AEBB.DLL : 8.1.1.0 53618 Bytes 4/21/2011 14:53:14
AVWINLL.DLL : 10.0.0.0 19304 Bytes 4/21/2011 14:53:36
AVPREF.DLL : 10.0.0.0 44904 Bytes 7/20/2011 18:30:04
AVREP.DLL : 10.0.0.8 62209 Bytes 7/20/2011 18:30:04
AVREG.DLL : 10.0.3.2 53096 Bytes 7/20/2011 18:30:04
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 7/20/2011 18:30:06
AVARKT.DLL : 10.0.22.6 231784 Bytes 7/20/2011 18:29:58
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 7/20/2011 18:30:03
SQLITE3.DLL : 3.6.19.0 355688 Bytes 7/20/2011 23:40:24
AVSMTP.DLL : 10.0.0.17 63848 Bytes 4/21/2011 14:53:36
NETNT.DLL : 10.0.0.0 11624 Bytes 4/21/2011 14:53:46
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 7/20/2011 18:30:48
RCTEXT.DLL : 10.0.58.0 97128 Bytes 7/20/2011 18:30:48

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, August 08, 2011 16:53

Starting search for hidden objects.
HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectDraw\MostRecentApplication\name
[NOTE] The registry entry is invisible.
HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\Microsoft\DirectDraw\MostRecentApplication\id
[NOTE] The registry entry is invisible.
HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\last
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{00020D75-0000-0000-C000-000000000046}\ShellFolder\attributes
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0A4286EA-E355-44FB-8086-AF3DF7645BD9}\localizedstring
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0A4286EA-E355-44FB-8086-AF3DF7645BD9}\localizedstring
C:\Windows\system32\unregmp2.exe /ShowWMP
C:\Windows\system32\unregmp2.exe /ShowWMP
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Capabilities\applicationdescription
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\Player\Extensions\MUIDescriptions\8
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Multimedia\DirectXMedia\.prog
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Multimedia\DirectXMedia\.prog
C:\Windows\system32\wbem\Logs\WMITracing.log
C:\Windows\system32\wbem\Logs\WMITracing.log
[NOTE] The registry entry is invisible.
%ProgramFiles(x86)%\Windows Media Player
C:\Program Files (x86)\Windows Media Player
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray\BattMeter\Flyout\381b4222-f694-41f0-9685-ff5bb260df2e
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray\BattMeter\Flyout\8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Applets\SysTray\BattMeter\Flyout\a1841308-3541-4fab-bc81-f71556f20b4a
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Classes\symboliclinkvalue
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\dokchampa (truetype)
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\impact (truetype
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\calibri (truetype
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\consolas (truetype
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\constantia (truetype
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\corbel (truetype
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Fonts\palatino linotype (truetype
[NOTE] The registry entry is invisible.
c:\program files\p4g\batterylife.exe
c:\program files\p4g\batterylife.exe
[NOTE] The process is not visible.

The scan of running processes will be started
Scan process 'avscan.exe' - '79' Module(s) have been scanned
Scan process 'avscan.exe' - '30' Module(s) have been scanned
Scan process 'avcenter.exe' - '83' Module(s) have been scanned
Scan process 'avgnt.exe' - '54' Module(s) have been scanned
Scan process 'sched.exe' - '56' Module(s) have been scanned
Scan process 'avguard.exe' - '67' Module(s) have been scanned
Scan process 'ping.exe' - '22' Module(s) have been scanned
Scan process 'sensorsrv.exe' - '23' Module(s) have been scanned
Scan process 'ALU.exe' - '41' Module(s) have been scanned
Scan process 'plugin-container.exe' - '91' Module(s) have been scanned
Scan process 'firefox.exe' - '117' Module(s) have been scanned
Scan process 'smartlogon.exe' - '31' Module(s) have been scanned
Scan process 'AAWService.exe' - '107' Module(s) have been scanned
Scan process 'AAWTray.exe' - '23' Module(s) have been scanned
Scan process 'conime.exe' - '18' Module(s) have been scanned
Scan process 'ping.exe' - '22' Module(s) have been scanned
Scan process 'nost_LM.exe' - '43' Module(s) have been scanned
Scan process 'spmgr.exe' - '38' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '23' Module(s) have been scanned
Scan process 'iviRegMgr.exe' - '17' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '33' Module(s) have been scanned
Scan process 'wmplayer.exe' - '132' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '48' Module(s) have been scanned
Scan process 'ISUSPM.exe' - '42' Module(s) have been scanned
Scan process 'LCDMedia.exe' - '49' Module(s) have been scanned
Scan process 'WDC.exe' - '27' Module(s) have been scanned
Scan process 'KBFiltr.exe' - '14' Module(s) have been scanned
Scan process 'ATKOSD.exe' - '15' Module(s) have been scanned
Scan process 'Atouch64.exe' - '23' Module(s) have been scanned
Scan process 'HControl.exe' - '58' Module(s) have been scanned
Scan process 'GFNEXSrv.exe' - '13' Module(s) have been scanned
Scan process 'ASLDRSrv.exe' - '25' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[DETECTION] Contains code of the BOO/TDss.M boot sector virus
[NOTE] The boot sector was not written!

Start scanning boot sectors:
Boot sector 'C:\'
[DETECTION] Contains code of the BOO/TDss.M boot sector virus
[NOTE] The boot sector was not written!

Starting to scan executable files (registry).

The registry was scanned ( '887' files ).


Starting the file scan:

Begin scan in 'C:\' <Vista64>
C:\Users\Owner\AppData\Local\Temp\jar_cache2415611830522409876.tmp
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.LS.1 exploit
--> mp1/p2/C.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.LS.1 exploit
--> mp1/p2/M.class
[DETECTION] Is the TR/ClassLoader.AR Trojan
--> mp1/p2/P.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.AQ Java virus
C:\Users\Owner\AppData\Local\Temp\jar_cache4309252048016398623.tmp
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent Java virus
--> bpac/a.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent Java virus
--> bpac/KAVS.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BB exploit
--> bpac/b.class
[DETECTION] Is the TR/Dldr.OpenConnection.LJ Trojan
C:\Users\Owner\AppData\Local\Temp\jar_cache4796501787078693577.tmp
[0] Archive type: ZIP
[DETECTION] Is the TR/Dldr.Java.Agent.AH Trojan
--> AppletPanel.class
[DETECTION] Is the TR/Dldr.Java.Agent.AH Trojan
--> Main.class
[DETECTION] Is the TR/Dldr.Java.Agent.AH.1 Trojan
C:\Users\Owner\AppData\Local\Temp\jar_cache8844734715242637891.tmp
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Rexec.E Java virus
--> g6k1.class
[DETECTION] Contains recognition pattern of the JAVA/Rexec.E Java virus
--> y6u7.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnec.agw Java virus
--> g5z6.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.O exploit
--> main.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.Y exploit
--> q3p0.class
[DETECTION] Contains recognition pattern of the EXP/Java.sgw exploit
--> Tuvvoaerffb.class
[DETECTION] Contains recognition pattern of the EXP/Java.agq exploit
--> h6l4.class
[DETECTION] Contains recognition pattern of the JAVA/Rowindal.R Java virus
--> b5n3.class
[DETECTION] Contains recognition pattern of the EXP/Java.sbw exploit
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\627f3a69-35278944
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Rexec.E Java virus
--> g6k1.class
[DETECTION] Contains recognition pattern of the JAVA/Rexec.E Java virus
--> y6u7.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnec.agw Java virus
--> g5z6.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.O exploit
--> main.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.Y exploit
--> q3p0.class
[DETECTION] Contains recognition pattern of the EXP/Java.sgw exploit
--> Tuvvoaerffb.class
[DETECTION] Contains recognition pattern of the EXP/Java.agq exploit
--> h6l4.class
[DETECTION] Contains recognition pattern of the JAVA/Rowindal.R Java virus
--> b5n3.class
[DETECTION] Contains recognition pattern of the EXP/Java.sbw exploit
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\68ba9ad-1d36c9d9
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BR exploit
--> bpac/a$1.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BR exploit
--> bpac/a.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.2212 Java virus
--> bpac/b.class
[DETECTION] Is the TR/Dldr.OpenStream.AQ.1 Trojan
--> bpac/KAVS.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BB exploit
C:\Windows\Temp\sotdlq\setup.exe
[DETECTION] Is the TR/Sasfis.bvuu Trojan
C:\Windows\Temp\uhaebs\setup.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan

Beginning disinfection:
C:\Windows\Temp\uhaebs\setup.exe
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '4ad832b0.qua'.
C:\Windows\Temp\sotdlq\setup.exe
[DETECTION] Is the TR/Sasfis.bvuu Trojan
[NOTE] The file was moved to the quarantine directory under the name '524f1d17.qua'.
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\68ba9ad-1d36c9d9
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0840.BB exploit
[NOTE] The file was moved to the quarantine directory under the name '0006440a.qua'.
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\627f3a69-35278944
[DETECTION] Contains recognition pattern of the EXP/Java.sbw exploit
[NOTE] The file was moved to the quarantine directory under the name '66e40bce.qua'.
C:\Users\Owner\AppData\Local\Temp\jar_cache8844734715242637891.tmp
[DETECTION] Contains recognition pattern of the EXP/Java.sbw exploit
[NOTE] The file was moved to the quarantine directory under the name '23a5251f.qua'.
C:\Users\Owner\AppData\Local\Temp\jar_cache4796501787078693577.tmp
[DETECTION] Is the TR/Dldr.Java.Agent.AH.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5cbe177e.qua'.
C:\Users\Owner\AppData\Local\Temp\jar_cache4309252048016398623.tmp
[DETECTION] Is the TR/Dldr.OpenConnection.LJ Trojan
[NOTE] The file was moved to the quarantine directory under the name '10063b34.qua'.
C:\Users\Owner\AppData\Local\Temp\jar_cache2415611830522409876.tmp
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.AQ Java virus
[NOTE] The file was moved to the quarantine directory under the name '6c1e7b64.qua'.


End of the scan: Monday, August 08, 2011 19:04
Used time: 2:10:45 Hour(s)

The scan has been done completely.

39546 Scanned directories
627340 Files were scanned
32 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
8 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
627310 Files not concerned
3390 Archives were scanned
0 Warnings
33 Notes
785818 Objects were scanned with rootkit scan
25 Hidden objects were found

Gonna work on fixing that file now.

#13 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 09:14 PM

Ok hopefully fixed now:

SystemLook 30.07.11 by jpshortstuff
Log created at 19:13 on 08/08/2011 by Owner
Administrator - Elevation successful

========== dir ==========

C:\WINDOWS\SYSTEM32\DRIVERS\ETC - Parameters: "(none)"

---Files---
hosts --a---- 735 bytes [23:35 08/08/2011] [02:11 09/08/2011]
lmhosts.sam --a---- 3683 bytes [06:42 02/11/2006] [21:37 18/09/2006]
networks --a---- 407 bytes [12:34 02/11/2006] [21:37 18/09/2006]
protocol --a---- 1358 bytes [12:34 02/11/2006] [21:37 18/09/2006]
services --a---- 17244 bytes [12:34 02/11/2006] [21:37 18/09/2006]

---Folders---
None found.

-= EOF =-

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:12:16 AM

Posted 08 August 2011 - 09:17 PM

Good job on both :)

Now, let's see about this:

Boot sector 'C:\'
[DETECTION] Contains code of the BOO/TDss.M boot sector virus
[NOTE] The boot sector was not written!


Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 Xezat

Xezat
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 08 August 2011 - 09:43 PM

2011/08/08 19:32:00.0492 4456 TDSS rootkit removing tool 2.5.14.0 Aug 5 2011 16:09:29
2011/08/08 19:32:00.0961 4456 ================================================================================
2011/08/08 19:32:00.0961 4456 SystemInfo:
2011/08/08 19:32:00.0961 4456
2011/08/08 19:32:00.0961 4456 OS Version: 6.0.6002 ServicePack: 2.0
2011/08/08 19:32:00.0961 4456 Product type: Workstation
2011/08/08 19:32:00.0961 4456 ComputerName: OWNER-PC
2011/08/08 19:32:00.0962 4456 UserName: Owner
2011/08/08 19:32:00.0962 4456 Windows directory: C:\Windows
2011/08/08 19:32:00.0962 4456 System windows directory: C:\Windows
2011/08/08 19:32:00.0962 4456 Running under WOW64
2011/08/08 19:32:00.0962 4456 Processor architecture: Intel x64
2011/08/08 19:32:00.0962 4456 Number of processors: 2
2011/08/08 19:32:00.0962 4456 Page size: 0x1000
2011/08/08 19:32:00.0962 4456 Boot type: Normal boot
2011/08/08 19:32:00.0962 4456 ================================================================================
2011/08/08 19:32:01.0801 4456 Initialize success
2011/08/08 19:32:14.0882 3820 ================================================================================
2011/08/08 19:32:14.0882 3820 Scan started
2011/08/08 19:32:14.0882 3820 Mode: Manual;
2011/08/08 19:32:14.0882 3820 ================================================================================
2011/08/08 19:32:15.0678 3820 ACPI (1965aaffab07e3fb03c77f81beba3547) C:\Windows\system32\drivers\acpi.sys
2011/08/08 19:32:15.0763 3820 adp94xx (f14215e37cf124104575073f782111d2) C:\Windows\system32\drivers\adp94xx.sys
2011/08/08 19:32:15.0799 3820 adpahci (7d05a75e3066861a6610f7ee04ff085c) C:\Windows\system32\drivers\adpahci.sys
2011/08/08 19:32:15.0835 3820 adpu160m (820a201fe08a0c345b3bedbc30e1a77c) C:\Windows\system32\drivers\adpu160m.sys
2011/08/08 19:32:15.0860 3820 adpu320 (9b4ab6854559dc168fbb4c24fc52e794) C:\Windows\system32\drivers\adpu320.sys
2011/08/08 19:32:15.0990 3820 AFD (0cc146c4addea45791b18b1e2659f4a9) C:\Windows\system32\drivers\afd.sys
2011/08/08 19:32:16.0083 3820 agp440 (f6f6793b7f17b550ecfdbd3b229173f7) C:\Windows\system32\drivers\agp440.sys
2011/08/08 19:32:16.0178 3820 aic78xx (222cb641b4b8a1d1126f8033f9fd6a00) C:\Windows\system32\drivers\djsvs.sys
2011/08/08 19:32:16.0255 3820 aliide (157d0898d4b73f075ce9fa26b482df98) C:\Windows\system32\drivers\aliide.sys
2011/08/08 19:32:16.0281 3820 amdide (970fa5059e61e30d25307b99903e991e) C:\Windows\system32\drivers\amdide.sys
2011/08/08 19:32:16.0316 3820 AmdK8 (cdc3632a3a5ea4dbb83e46076a3165a1) C:\Windows\system32\DRIVERS\amdk8.sys
2011/08/08 19:32:16.0484 3820 arc (ba8417d4765f3988ff921f30f630e303) C:\Windows\system32\drivers\arc.sys
2011/08/08 19:32:16.0555 3820 arcsas (9d41c435619733b34cc16a511e644b11) C:\Windows\system32\drivers\arcsas.sys
2011/08/08 19:32:16.0620 3820 ASMMAP64 (2db34edd17d3a8da7105a19c95a3dd68) C:\Program Files\ATKGFNEX\ASMMAP64.sys
2011/08/08 19:32:16.0760 3820 AsyncMac (22d13ff3dafec2a80634752b1eaa2de6) C:\Windows\system32\DRIVERS\asyncmac.sys
2011/08/08 19:32:16.0800 3820 atapi (e68d9b3a3905619732f7fe039466a623) C:\Windows\system32\drivers\atapi.sys
2011/08/08 19:32:16.0876 3820 avgntflt (39c2e2870fc0c2ae0595b883cbe716b4) C:\Windows\system32\DRIVERS\avgntflt.sys
2011/08/08 19:32:16.0933 3820 avipbb (c98fa6e5ad0e857d22716bd2b8b1f399) C:\Windows\system32\DRIVERS\avipbb.sys
2011/08/08 19:32:17.0019 3820 bcgame (5be512e49c43c8466ab7b4740d1927d7) C:\Windows\system32\drivers\bcgame.sys
2011/08/08 19:32:17.0105 3820 blbdrive (79feeb40056683f8f61398d81dda65d2) C:\Windows\system32\drivers\blbdrive.sys
2011/08/08 19:32:17.0192 3820 bowser (2348447a80920b2493a9b582a23e81e1) C:\Windows\system32\DRIVERS\bowser.sys
2011/08/08 19:32:17.0240 3820 BrFiltLo (f09eee9edc320b5e1501f749fde686c8) C:\Windows\system32\drivers\brfiltlo.sys
2011/08/08 19:32:17.0269 3820 BrFiltUp (b114d3098e9bdb8bea8b053685831be6) C:\Windows\system32\drivers\brfiltup.sys
2011/08/08 19:32:17.0318 3820 Brserid (f0f0ba4d815be446aa6a4583ca3bca9b) C:\Windows\system32\drivers\brserid.sys
2011/08/08 19:32:17.0350 3820 BrSerWdm (a6eca2151b08a09caceca35c07f05b42) C:\Windows\system32\drivers\brserwdm.sys
2011/08/08 19:32:17.0383 3820 BrUsbMdm (b79968002c277e869cf38bd22cd61524) C:\Windows\system32\drivers\brusbmdm.sys
2011/08/08 19:32:17.0415 3820 BrUsbSer (a87528880231c54e75ea7a44943b38bf) C:\Windows\system32\drivers\brusbser.sys
2011/08/08 19:32:17.0463 3820 BthEnum (09f926a0d9c0bafd8417a4307d2ed13c) C:\Windows\system32\DRIVERS\BthEnum.sys
2011/08/08 19:32:17.0505 3820 BTHMODEM (e0777b34e05f8a82a21856efc900c29f) C:\Windows\system32\drivers\bthmodem.sys
2011/08/08 19:32:17.0552 3820 BthPan (befc5311736b475ac5b60c14ff7c775a) C:\Windows\system32\DRIVERS\bthpan.sys
2011/08/08 19:32:17.0609 3820 BTHPORT (e1466882252ff51edde48c3f7eda2591) C:\Windows\system32\Drivers\BTHport.sys
2011/08/08 19:32:17.0712 3820 BTHUSB (970192cded77a128e7e30722e5ee6b9c) C:\Windows\system32\Drivers\BTHUSB.sys
2011/08/08 19:32:17.0770 3820 cdfs (b4d787db8d30793a4d4df9feed18f136) C:\Windows\system32\DRIVERS\cdfs.sys
2011/08/08 19:32:17.0806 3820 cdrom (c025aa69be3d0d25c7a2e746ef6f94fc) C:\Windows\system32\DRIVERS\cdrom.sys
2011/08/08 19:32:17.0838 3820 circlass (02ea568d498bbdd4ba55bf3fce34d456) C:\Windows\system32\DRIVERS\circlass.sys
2011/08/08 19:32:17.0888 3820 CLFS (3dca9a18b204939cfb24bea53e31eb48) C:\Windows\system32\CLFS.sys
2011/08/08 19:32:17.0985 3820 CmBatt (b52d9a14ce4101577900a364ba86f3df) C:\Windows\system32\DRIVERS\CmBatt.sys
2011/08/08 19:32:18.0018 3820 cmdide (e5d5499a1c50a54b5161296b6afe6192) C:\Windows\system32\drivers\cmdide.sys
2011/08/08 19:32:18.0056 3820 Compbatt (7fb8ad01db0eabe60c8a861531a8f431) C:\Windows\system32\DRIVERS\compbatt.sys
2011/08/08 19:32:18.0106 3820 crcdisk (a8585b6412253803ce8efcbd6d6dc15c) C:\Windows\system32\drivers\crcdisk.sys
2011/08/08 19:32:18.0184 3820 DfsC (8b722ba35205c71e7951cdc4cdbade19) C:\Windows\system32\Drivers\dfsc.sys
2011/08/08 19:32:18.0267 3820 disk (b0107e40ecdb5fa692ebf832f295d905) C:\Windows\system32\drivers\disk.sys
2011/08/08 19:32:18.0349 3820 Dot4 (74c02b1717740c3b8039539e23e4b53f) C:\Windows\system32\DRIVERS\Dot4.sys
2011/08/08 19:32:18.0407 3820 Dot4Print (08321d1860235bf42cf2854234337aea) C:\Windows\system32\DRIVERS\Dot4Prt.sys
2011/08/08 19:32:18.0446 3820 dot4usb (4adccf0124f2b6911d3786a5d0e779e5) C:\Windows\system32\DRIVERS\dot4usb.sys
2011/08/08 19:32:18.0512 3820 drmkaud (f1a78a98cfc2ee02144c6bec945447e6) C:\Windows\system32\drivers\drmkaud.sys
2011/08/08 19:32:18.0617 3820 DXGKrnl (b8e554e502d5123bc111f99d6a2181b4) C:\Windows\System32\drivers\dxgkrnl.sys
2011/08/08 19:32:18.0862 3820 E1G60 (264cee7b031a9d6c827f3d0cb031f2fe) C:\Windows\system32\DRIVERS\E1G6032E.sys
2011/08/08 19:32:18.0961 3820 Ecache (5f94962be5a62db6e447ff6470c4f48a) C:\Windows\system32\drivers\ecache.sys
2011/08/08 19:32:19.0038 3820 elxstor (c4636d6e10469404ab5308d9fd45ed07) C:\Windows\system32\drivers\elxstor.sys
2011/08/08 19:32:19.0120 3820 ErrDev (bc3a58e938bb277e46bf4b3003b01abd) C:\Windows\system32\drivers\errdev.sys
2011/08/08 19:32:19.0180 3820 exfat (486844f47b6636044a42454614ed4523) C:\Windows\system32\drivers\exfat.sys
2011/08/08 19:32:19.0213 3820 fastfat (1a4bee34277784619ddaf0422c0c6e23) C:\Windows\system32\drivers\fastfat.sys
2011/08/08 19:32:19.0258 3820 fdc (81b79b6df71fa1d2c6d688d830616e39) C:\Windows\system32\DRIVERS\fdc.sys
2011/08/08 19:32:19.0299 3820 FileInfo (457b7d1d533e4bd62a99aed9c7bb4c59) C:\Windows\system32\drivers\fileinfo.sys
2011/08/08 19:32:19.0353 3820 Filetrace (d421327fd6efccaf884a54c58e1b0d7f) C:\Windows\system32\drivers\filetrace.sys
2011/08/08 19:32:19.0426 3820 flpydisk (230923ea2b80f79b0f88d90f87b87ebd) C:\Windows\system32\DRIVERS\flpydisk.sys
2011/08/08 19:32:19.0473 3820 FltMgr (e3041bc26d6930d61f42aedb79c91720) C:\Windows\system32\drivers\fltmgr.sys
2011/08/08 19:32:19.0642 3820 Fs_Rec (29d99e860a1ca0a03c6a733fdd0da703) C:\Windows\system32\drivers\Fs_Rec.sys
2011/08/08 19:32:19.0695 3820 gagp30kx (c8e416668d3dc2be3d4fe4c79224997f) C:\Windows\system32\drivers\gagp30kx.sys
2011/08/08 19:32:19.0767 3820 GEARAspiWDM (e403aacf8c7bb11375122d2464560311) C:\Windows\system32\DRIVERS\GEARAspiWDM.sys
2011/08/08 19:32:19.0835 3820 ghaio (7d66ebde8b7f9b4e00beefeee82670d4) C:\Program Files\ASUS\NB Probe\SPM\ghaio.sys
2011/08/08 19:32:19.0891 3820 hamachi (1e6438d4ea6e1174a3b3b1edc4de660b) C:\Windows\system32\DRIVERS\hamachi.sys
2011/08/08 19:32:19.0958 3820 HdAudAddService (df45f8142dc6df9d18c39b3effbd0409) C:\Windows\system32\drivers\HdAudio.sys
2011/08/08 19:32:20.0020 3820 HDAudBus (f942c5820205f2fb453243edfec82a3d) C:\Windows\system32\DRIVERS\HDAudBus.sys
2011/08/08 19:32:20.0084 3820 HidBth (39f7d79b3401be029d8451f761d30331) C:\Windows\system32\DRIVERS\hidbth.sys
2011/08/08 19:32:20.0122 3820 HidIr (5f47839455d01ff6403b008d481a6f5b) C:\Windows\system32\DRIVERS\hidir.sys
2011/08/08 19:32:20.0161 3820 HidUsb (443bdd2d30bb4f00795c797e2cf99edf) C:\Windows\system32\DRIVERS\hidusb.sys
2011/08/08 19:32:20.0214 3820 HpCISSs (d7109a1e6bd2dfdbcba72a6bc626a13b) C:\Windows\system32\drivers\hpcisss.sys
2011/08/08 19:32:20.0258 3820 HTTP (098f1e4e5c9cb5b0063a959063631610) C:\Windows\system32\drivers\HTTP.sys
2011/08/08 19:32:20.0289 3820 i2omp (da94c854cea5fac549d4e1f6e88349e8) C:\Windows\system32\drivers\i2omp.sys
2011/08/08 19:32:20.0313 3820 i8042prt (cbb597659a2713ce0c9cc20c88c7591f) C:\Windows\system32\DRIVERS\i8042prt.sys
2011/08/08 19:32:20.0347 3820 iaStor (07fb761600eff44af02c35b8b57e5863) C:\Windows\system32\DRIVERS\iaStor.sys
2011/08/08 19:32:20.0384 3820 iaStorV (3e3bf3627d886736d0b4e90054f929f6) C:\Windows\system32\drivers\iastorv.sys
2011/08/08 19:32:20.0509 3820 iirsp (8c3951ad2fe886ef76c7b5027c3125d3) C:\Windows\system32\drivers\iirsp.sys
2011/08/08 19:32:20.0612 3820 IntcAzAudAddService (29c63bc0fbe776cde25c8293fb1e0f91) C:\Windows\system32\drivers\RTKVHD64.sys
2011/08/08 19:32:20.0742 3820 intelide (df797a12176f11b2d301c5b234bb200e) C:\Windows\system32\drivers\intelide.sys
2011/08/08 19:32:20.0770 3820 intelppm (bfd84af32fa1bad6231c4585cb469630) C:\Windows\system32\DRIVERS\intelppm.sys
2011/08/08 19:32:20.0836 3820 IpFilterDriver (d8aabc341311e4780d6fce8c73c0ad81) C:\Windows\system32\DRIVERS\ipfltdrv.sys
2011/08/08 19:32:20.0938 3820 IPMIDRV (9c2ee2e6e5a7203bfae15c299475ec67) C:\Windows\system32\drivers\ipmidrv.sys
2011/08/08 19:32:20.0984 3820 IPNAT (b7e6212f581ea5f6ab0c3a6ceeeb89be) C:\Windows\system32\DRIVERS\ipnat.sys
2011/08/08 19:32:21.0052 3820 IRENUM (8c42ca155343a2f11d29feca67faa88d) C:\Windows\system32\drivers\irenum.sys
2011/08/08 19:32:21.0097 3820 isapnp (0672bfcedc6fc468a2b0500d81437f4f) C:\Windows\system32\drivers\isapnp.sys
2011/08/08 19:32:21.0136 3820 iScsiPrt (e4fdf99599f27ec25d2cf6d754243520) C:\Windows\system32\DRIVERS\msiscsi.sys
2011/08/08 19:32:21.0174 3820 iteatapi (63c766cdc609ff8206cb447a65abba4a) C:\Windows\system32\drivers\iteatapi.sys
2011/08/08 19:32:21.0221 3820 itecir (e157d6b89d87a1b467ecdd66d280a1c2) C:\Windows\system32\DRIVERS\itecir.sys
2011/08/08 19:32:21.0271 3820 iteraid (1281fe73b17664631d12f643cbea3f59) C:\Windows\system32\drivers\iteraid.sys
2011/08/08 19:32:21.0338 3820 kbdclass (423696f3ba6472dd17699209b933bc26) C:\Windows\system32\DRIVERS\kbdclass.sys
2011/08/08 19:32:21.0357 3820 kbdhid (dbdf75d51464fbc47d0104ec3d572c05) C:\Windows\system32\DRIVERS\kbdhid.sys
2011/08/08 19:32:21.0381 3820 kbfiltr (4c9b832435061634dfbeb980ad67bfff) C:\Windows\system32\DRIVERS\kbfiltr.sys
2011/08/08 19:32:21.0424 3820 KSecDD (476e2c1dcea45895994bef11c2a98715) C:\Windows\system32\Drivers\ksecdd.sys
2011/08/08 19:32:21.0465 3820 ksthunk (1d419cf43db29396ecd7113d129d94eb) C:\Windows\system32\drivers\ksthunk.sys
2011/08/08 19:32:21.0546 3820 Lbd (3c46290f7a5d45ba6ef32c248e22aa69) C:\Windows\system32\DRIVERS\Lbd.sys
2011/08/08 19:32:21.0590 3820 LGBusEnum (db164eb571fd118d277d939510b0f562) C:\Windows\system32\drivers\LGBusEnum.sys
2011/08/08 19:32:21.0681 3820 LGVirHid (da1c7839ce72bb724822d1ee597dcb19) C:\Windows\system32\drivers\LGVirHid.sys
2011/08/08 19:32:21.0717 3820 lltdio (96ece2659b6654c10a0c310ae3a6d02c) C:\Windows\system32\DRIVERS\lltdio.sys
2011/08/08 19:32:21.0782 3820 LSI_FC (acbe1af32d3123e330a07bfbc5ec4a9b) C:\Windows\system32\drivers\lsi_fc.sys
2011/08/08 19:32:21.0816 3820 LSI_SAS (799ffb2fc4729fa46d2157c0065b3525) C:\Windows\system32\drivers\lsi_sas.sys
2011/08/08 19:32:21.0890 3820 LSI_SCSI (f445ff1daad8a226366bfaf42551226b) C:\Windows\system32\drivers\lsi_scsi.sys
2011/08/08 19:32:21.0946 3820 luafv (52f87b9cc8932c2a7375c3b2a9be5e3e) C:\Windows\system32\drivers\luafv.sys
2011/08/08 19:32:21.0992 3820 megasas (5c5cd6aaced32fb26c3fb34b3dcf972f) C:\Windows\system32\drivers\megasas.sys
2011/08/08 19:32:22.0054 3820 MegaSR (859bc2436b076c77c159ed694acfe8f8) C:\Windows\system32\drivers\megasr.sys
2011/08/08 19:32:22.0134 3820 Mo3Fltr (2397380b022384294a3d1e625de98af7) C:\Windows\system32\drivers\Mo3Fltr.sys
2011/08/08 19:32:22.0178 3820 Modem (59848d5cc74606f0ee7557983bb73c2e) C:\Windows\system32\drivers\modem.sys
2011/08/08 19:32:22.0222 3820 monitor (c247cc2a57e0a0c8c6dccf7807b3e9e5) C:\Windows\system32\DRIVERS\monitor.sys
2011/08/08 19:32:22.0272 3820 motccgp (338ba6b7170111edc2e43b5b4eaf17df) C:\Windows\system32\DRIVERS\motccgp.sys
2011/08/08 19:32:22.0313 3820 motccgpfl (d51e009baeda07ebc107d49d224c2414) C:\Windows\system32\DRIVERS\motccgpfl.sys
2011/08/08 19:32:22.0344 3820 motmodem (e90aba3c6f01be2c456c4aa857b28646) C:\Windows\system32\DRIVERS\motmodem.sys
2011/08/08 19:32:22.0413 3820 motport (e90aba3c6f01be2c456c4aa857b28646) C:\Windows\system32\DRIVERS\motport.sys
2011/08/08 19:32:22.0456 3820 mouclass (9367304e5e412b120cf5f4ea14e4e4f1) C:\Windows\system32\DRIVERS\mouclass.sys
2011/08/08 19:32:22.0496 3820 mouhid (c2c2bd5c5ce5aaf786ddd74b75d2ac69) C:\Windows\system32\DRIVERS\mouhid.sys
2011/08/08 19:32:22.0558 3820 MountMgr (11bc9b1e8801b01f7f6adb9ead30019b) C:\Windows\system32\drivers\mountmgr.sys
2011/08/08 19:32:22.0609 3820 mpio (f8276eb8698142884498a528dfea8478) C:\Windows\system32\drivers\mpio.sys
2011/08/08 19:32:22.0651 3820 mpsdrv (c92b9abdb65a5991e00c28f13491dba2) C:\Windows\system32\drivers\mpsdrv.sys
2011/08/08 19:32:22.0690 3820 Mraid35x (3c200630a89ef2c0864d515b7a75802e) C:\Windows\system32\drivers\mraid35x.sys
2011/08/08 19:32:22.0736 3820 MRxDAV (7c1de4aa96dc0c071611f9e7de02a68d) C:\Windows\system32\drivers\mrxdav.sys
2011/08/08 19:32:22.0792 3820 mrxsmb (1485811b320ff8c7edad1caebb1c6c2b) C:\Windows\system32\DRIVERS\mrxsmb.sys
2011/08/08 19:32:22.0854 3820 mrxsmb10 (6dc9461915a551c2a625986f5fb3b851) C:\Windows\system32\DRIVERS\mrxsmb10.sys
2011/08/08 19:32:22.0891 3820 mrxsmb20 (c64ab3e1f53b4f5b5bb6d796b2d7bec3) C:\Windows\system32\DRIVERS\mrxsmb20.sys
2011/08/08 19:32:22.0934 3820 msahci (1ac860612b85d8e85ee257d372e39f4d) C:\Windows\system32\drivers\msahci.sys
2011/08/08 19:32:22.0971 3820 msdsm (264bbb4aaf312a485f0e44b65a6b7202) C:\Windows\system32\drivers\msdsm.sys
2011/08/08 19:32:23.0034 3820 Msfs (704f59bfc4512d2bb0146aec31b10a7c) C:\Windows\system32\drivers\Msfs.sys
2011/08/08 19:32:23.0078 3820 msisadrv (00ebc952961664780d43dca157e79b27) C:\Windows\system32\drivers\msisadrv.sys
2011/08/08 19:32:23.0118 3820 MSKSSRV (0ea73e498f53b96d83dbfca074ad4cf8) C:\Windows\system32\drivers\MSKSSRV.sys
2011/08/08 19:32:23.0161 3820 MSPCLOCK (52e59b7e992a58e740aa63f57edbae8b) C:\Windows\system32\drivers\MSPCLOCK.sys
2011/08/08 19:32:23.0190 3820 MSPQM (49084a75bae043ae02d5b44d02991bb2) C:\Windows\system32\drivers\MSPQM.sys
2011/08/08 19:32:23.0232 3820 MsRPC (dc6ccf440cdede4293db41c37a5060a5) C:\Windows\system32\drivers\MsRPC.sys
2011/08/08 19:32:23.0268 3820 mssmbios (855796e59df77ea93af46f20155bf55b) C:\Windows\system32\DRIVERS\mssmbios.sys
2011/08/08 19:32:23.0296 3820 MSTEE (86d632d75d05d5b7c7c043fa3564ae86) C:\Windows\system32\drivers\MSTEE.sys
2011/08/08 19:32:23.0349 3820 MTsensor (a523d9f6aeb152c4480d754df7fa9f7f) C:\Windows\system32\DRIVERS\ATK64AMD.sys
2011/08/08 19:32:23.0386 3820 Mup (0cc49f78d8aca0877d885f149084e543) C:\Windows\system32\Drivers\mup.sys
2011/08/08 19:32:23.0431 3820 NativeWifiP (2007b826c4acd94ae32232b41f0842b9) C:\Windows\system32\DRIVERS\nwifi.sys
2011/08/08 19:32:23.0497 3820 NDIS (65950e07329fcee8e6516b17c8d0abb6) C:\Windows\system32\drivers\ndis.sys
2011/08/08 19:32:23.0562 3820 NdisTapi (64df698a425478e321981431ac171334) C:\Windows\system32\DRIVERS\ndistapi.sys
2011/08/08 19:32:23.0583 3820 Ndisuio (8baa43196d7b5bb972c9a6b2bbf61a19) C:\Windows\system32\DRIVERS\ndisuio.sys
2011/08/08 19:32:23.0611 3820 NdisWan (f8158771905260982ce724076419ef19) C:\Windows\system32\DRIVERS\ndiswan.sys
2011/08/08 19:32:23.0641 3820 NDProxy (9cb77ed7cb72850253e973a2d6afdf49) C:\Windows\system32\drivers\NDProxy.sys
2011/08/08 19:32:23.0709 3820 NetBIOS (a499294f5029a7862adc115bda7371ce) C:\Windows\system32\DRIVERS\netbios.sys
2011/08/08 19:32:23.0753 3820 netbt (fc2c792ebddc8e28df939d6a92c83d61) C:\Windows\system32\DRIVERS\netbt.sys
2011/08/08 19:32:24.0059 3820 NETw5v64 (ce423855d54594beda633cccbe7e3cf0) C:\Windows\system32\DRIVERS\NETw5v64.sys
2011/08/08 19:32:24.0330 3820 nfrd960 (4ac08bd6af2df42e0c3196d826c8aea7) C:\Windows\system32\drivers\nfrd960.sys
2011/08/08 19:32:24.0398 3820 Npfs (b298874f8e0ea93f06ec40aa8d146478) C:\Windows\system32\drivers\Npfs.sys
2011/08/08 19:32:24.0422 3820 nsiproxy (1523af19ee8b030ba682f7a53537eaeb) C:\Windows\system32\drivers\nsiproxy.sys
2011/08/08 19:32:24.0495 3820 Ntfs (bac869dfb98e499ba4d9bb1fb43270e1) C:\Windows\system32\drivers\Ntfs.sys
2011/08/08 19:32:24.0612 3820 NuidFltr (d4012918d3a3847b44b888d56bc095d6) C:\Windows\system32\DRIVERS\NuidFltr.sys
2011/08/08 19:32:24.0687 3820 Null (dd5d684975352b85b52e3fd5347c20cb) C:\Windows\system32\drivers\Null.sys
2011/08/08 19:32:24.0725 3820 NVHDA (4ff5b85bb799c583e10fed1a6cdb8cb2) C:\Windows\system32\drivers\nvhda64v.sys
2011/08/08 19:32:25.0004 3820 nvlddmkm (0d3f6e25c658530a2ad4b648849f1483) C:\Windows\system32\DRIVERS\nvlddmkm.sys
2011/08/08 19:32:25.0489 3820 nvraid (2c040b7ada5b06f6facadac8514aa034) C:\Windows\system32\drivers\nvraid.sys
2011/08/08 19:32:25.0560 3820 nvstor (f7ea0fe82842d05eda3efdd376dbfdba) C:\Windows\system32\drivers\nvstor.sys
2011/08/08 19:32:25.0619 3820 nv_agp (19067ca93075ef4823e3938a686f532f) C:\Windows\system32\drivers\nv_agp.sys
2011/08/08 19:32:25.0709 3820 ohci1394 (b5b1ce65ac15bbd11c0619e3ef7cfc28) C:\Windows\system32\DRIVERS\ohci1394.sys
2011/08/08 19:32:25.0761 3820 Parport (aecd57f94c887f58919f307c35498ea0) C:\Windows\system32\drivers\parport.sys
2011/08/08 19:32:25.0799 3820 partmgr (f9b5eda4c17a2be7663f064dbf0fe254) C:\Windows\system32\drivers\partmgr.sys
2011/08/08 19:32:25.0832 3820 pci (47ab1e0fc9d0e12bb53ba246e3a0906d) C:\Windows\system32\drivers\pci.sys
2011/08/08 19:32:25.0899 3820 pciide (8d618c829034479985a9ed56106cc732) C:\Windows\system32\drivers\pciide.sys
2011/08/08 19:32:25.0959 3820 pcmcia (037661f3d7c507c9993b7010ceee6288) C:\Windows\system32\drivers\pcmcia.sys
2011/08/08 19:32:26.0056 3820 pcouffin (af7ce12c4f3dc8cb2b07685c916bbcfe) C:\Windows\system32\Drivers\pcouffin.sys
2011/08/08 19:32:26.0108 3820 PEAUTH (58865916f53592a61549b04941bfd80d) C:\Windows\system32\drivers\peauth.sys
2011/08/08 19:32:26.0223 3820 PptpMiniport (23386e9952025f5f21c368971e2e7301) C:\Windows\system32\DRIVERS\raspptp.sys
2011/08/08 19:32:26.0268 3820 Processor (5080e59ecee0bc923f14018803aa7a01) C:\Windows\system32\drivers\processr.sys
2011/08/08 19:32:26.0315 3820 PSched (c5ab7f0809392d0da027f4a2a81bfa31) C:\Windows\system32\DRIVERS\pacer.sys
2011/08/08 19:32:26.0393 3820 ql2300 (0b83f4e681062f3839be2ec1d98fd94a) C:\Windows\system32\drivers\ql2300.sys
2011/08/08 19:32:26.0486 3820 ql40xx (e1c80f8d4d1e39ef9595809c1369bf2a) C:\Windows\system32\drivers\ql40xx.sys
2011/08/08 19:32:26.0527 3820 QWAVEdrv (e8d76edab77ec9c634c27b8eac33adc5) C:\Windows\system32\drivers\qwavedrv.sys
2011/08/08 19:32:26.0561 3820 RasAcd (1013b3b663a56d3ddd784f581c1bd005) C:\Windows\system32\DRIVERS\rasacd.sys
2011/08/08 19:32:26.0617 3820 Rasl2tp (ac7bc4d42a7e558718dfdec599bbfc2c) C:\Windows\system32\DRIVERS\rasl2tp.sys
2011/08/08 19:32:26.0654 3820 RasPppoe (4517fbf8b42524afe4ede1de102aae3e) C:\Windows\system32\DRIVERS\raspppoe.sys
2011/08/08 19:32:26.0691 3820 RasSstp (c6a593b51f34c33e5474539544072527) C:\Windows\system32\DRIVERS\rassstp.sys
2011/08/08 19:32:26.0729 3820 rdbss (322db5c6b55e8d8ee8d6f358b2aaabb1) C:\Windows\system32\DRIVERS\rdbss.sys
2011/08/08 19:32:26.0762 3820 RDPCDD (603900cc05f6be65ccbf373800af3716) C:\Windows\system32\DRIVERS\RDPCDD.sys
2011/08/08 19:32:26.0824 3820 rdpdr (c045d1fb111c28df0d1be8d4bda22c06) C:\Windows\system32\drivers\rdpdr.sys
2011/08/08 19:32:26.0853 3820 RDPENCDD (cab9421daf3d97b33d0d055858e2c3ab) C:\Windows\system32\drivers\rdpencdd.sys
2011/08/08 19:32:26.0890 3820 RDPWD (b1d741c87cea8d7282146366cc9c3f81) C:\Windows\system32\drivers\RDPWD.sys
2011/08/08 19:32:27.0000 3820 RFCOMM (cd71e053d7260e4102d99a28f9196070) C:\Windows\system32\DRIVERS\rfcomm.sys
2011/08/08 19:32:27.0079 3820 rimmptsk (4ccf35f5086cdbf5e6c51a1cfbd0b269) C:\Windows\system32\DRIVERS\rimmpx64.sys
2011/08/08 19:32:27.0120 3820 rimsptsk (bb9edc55b0b8cb4fcd713428820e0776) C:\Windows\system32\DRIVERS\rimspx64.sys
2011/08/08 19:32:27.0159 3820 rismxdp (481c3fdeacaae04b74c58288dbc91df9) C:\Windows\system32\DRIVERS\rixdpx64.sys
2011/08/08 19:32:27.0197 3820 rspndr (22a9cb08b1a6707c1550c6bf099aae73) C:\Windows\system32\DRIVERS\rspndr.sys
2011/08/08 19:32:27.0258 3820 RTL8169 (b263b3aebcde2210d1cc25756601b8ea) C:\Windows\system32\DRIVERS\Rtlh64.sys
2011/08/08 19:32:27.0330 3820 sbp2port (cd9c693589c60ad59bbbcfb0e524e01b) C:\Windows\system32\drivers\sbp2port.sys
2011/08/08 19:32:27.0407 3820 sdbus (be100bc2be2513314c717bb2c4cfff10) C:\Windows\system32\DRIVERS\sdbus.sys
2011/08/08 19:32:27.0437 3820 secdrv (3ea8a16169c26afbeb544e0e48421186) C:\Windows\system32\drivers\secdrv.sys
2011/08/08 19:32:27.0474 3820 Serenum (f71bfe7ac6c52273b7c82cbf1bb2a222) C:\Windows\system32\drivers\serenum.sys
2011/08/08 19:32:27.0504 3820 Serial (e62fac91ee288db29a9696a9d279929c) C:\Windows\system32\drivers\serial.sys
2011/08/08 19:32:27.0556 3820 sermouse (a842f04833684bceea7336211be478df) C:\Windows\system32\drivers\sermouse.sys
2011/08/08 19:32:27.0602 3820 sffdisk (3a19c899bcf0ea24cfec2038e6a489db) C:\Windows\system32\DRIVERS\sffdisk.sys
2011/08/08 19:32:27.0635 3820 sffp_mmc (7073aee3f82f3d598e3825962aa98ab2) C:\Windows\system32\drivers\sffp_mmc.sys
2011/08/08 19:32:27.0668 3820 sffp_sd (fdca63a2eee528585eb66ceac183ec22) C:\Windows\system32\DRIVERS\sffp_sd.sys
2011/08/08 19:32:27.0697 3820 sfloppy (40567781f0785c4a69411d1b40da8987) C:\Windows\system32\DRIVERS\sfloppy.sys
2011/08/08 19:32:27.0740 3820 SiSRaid2 (7a5de502aeb719d4594c6471060a78b3) C:\Windows\system32\drivers\sisraid2.sys
2011/08/08 19:32:27.0798 3820 SiSRaid4 (3a2f769fab9582bc720e11ea1dfb184d) C:\Windows\system32\drivers\sisraid4.sys
2011/08/08 19:32:27.0877 3820 Smb (290b6f6a0ec4fcdfc90f5cb6d7020473) C:\Windows\system32\DRIVERS\smb.sys
2011/08/08 19:32:27.0973 3820 SNP2UVC (5946f1cb48068d160483936e195ac98a) C:\Windows\system32\DRIVERS\snp2uvc.sys
2011/08/08 19:32:28.0097 3820 spldr (386c3c63f00a7040c7ec5e384217e89d) C:\Windows\system32\drivers\spldr.sys
2011/08/08 19:32:28.0366 3820 srv (880a57fccb571ebd063d4dd50e93e46d) C:\Windows\system32\DRIVERS\srv.sys
2011/08/08 19:32:28.0472 3820 srv2 (a1ad14a6d7a37891fffeca35ebbb0730) C:\Windows\system32\DRIVERS\srv2.sys
2011/08/08 19:32:28.0546 3820 srvnet (4bed62f4fa4d8300973f1151f4c4d8a7) C:\Windows\system32\DRIVERS\srvnet.sys
2011/08/08 19:32:28.0602 3820 swenum (8a851ca908b8b974f89c50d2e18d4f0c) C:\Windows\system32\DRIVERS\swenum.sys
2011/08/08 19:32:28.0645 3820 Symc8xx (2f26a2c6fc96b29beff5d8ed74e6625b) C:\Windows\system32\drivers\symc8xx.sys
2011/08/08 19:32:28.0723 3820 Sym_hi (a909667976d3bccd1df813fed517d837) C:\Windows\system32\drivers\sym_hi.sys
2011/08/08 19:32:28.0758 3820 Sym_u3 (36887b56ec2d98b9c362f6ae4de5b7b0) C:\Windows\system32\drivers\sym_u3.sys
2011/08/08 19:32:28.0826 3820 SynTP (572438150fc79e41a0348e3dc56b1dd2) C:\Windows\system32\DRIVERS\SynTP.sys
2011/08/08 19:32:28.0931 3820 Tcpip (973658a2ea9c06b2976884b9046dfc6c) C:\Windows\system32\drivers\tcpip.sys
2011/08/08 19:32:29.0053 3820 Tcpip6 (973658a2ea9c06b2976884b9046dfc6c) C:\Windows\system32\DRIVERS\tcpip.sys
2011/08/08 19:32:29.0094 3820 tcpipreg (c7e72a4071ee0200e3c075dacfb2b334) C:\Windows\system32\drivers\tcpipreg.sys
2011/08/08 19:32:29.0132 3820 TDPIPE (1d8bf4aaa5fb7a2761475781dc1195bc) C:\Windows\system32\drivers\tdpipe.sys
2011/08/08 19:32:29.0163 3820 TDTCP (7f7e00cdf609df657f4cda02dd1c9bb1) C:\Windows\system32\drivers\tdtcp.sys
2011/08/08 19:32:29.0192 3820 tdx (458919c8c42e398dc4802178d5ffee27) C:\Windows\system32\DRIVERS\tdx.sys
2011/08/08 19:32:29.0217 3820 TermDD (8c19678d22649ec002ef2282eae92f98) C:\Windows\system32\DRIVERS\termdd.sys
2011/08/08 19:32:29.0262 3820 TPM (270308efb59976157755c768b8544b5f) C:\Windows\system32\drivers\tpm.sys
2011/08/08 19:32:29.0307 3820 tssecsrv (9e5409cd17c8bef193aad498f3bc2cb8) C:\Windows\system32\DRIVERS\tssecsrv.sys
2011/08/08 19:32:29.0343 3820 tunmp (89ec74a9e602d16a75a4170511029b3c) C:\Windows\system32\DRIVERS\tunmp.sys
2011/08/08 19:32:29.0380 3820 tunnel (30a9b3f45ad081bffc3bcaa9c812b609) C:\Windows\system32\DRIVERS\tunnel.sys
2011/08/08 19:32:29.0415 3820 uagp35 (fec266ef401966311744bd0f359f7f56) C:\Windows\system32\drivers\uagp35.sys
2011/08/08 19:32:29.0486 3820 udfs (faf2640a2a76ed03d449e443194c4c34) C:\Windows\system32\DRIVERS\udfs.sys
2011/08/08 19:32:29.0572 3820 uliagpkx (4ec9447ac3ab462647f60e547208ca00) C:\Windows\system32\drivers\uliagpkx.sys
2011/08/08 19:32:29.0610 3820 uliahci (697f0446134cdc8f99e69306184fbbb4) C:\Windows\system32\drivers\uliahci.sys
2011/08/08 19:32:29.0735 3820 UlSata (31707f09846056651ea2c37858f5ddb0) C:\Windows\system32\drivers\ulsata.sys
2011/08/08 19:32:29.0795 3820 ulsata2 (85e5e43ed5b48c8376281bab519271b7) C:\Windows\system32\drivers\ulsata2.sys
2011/08/08 19:32:29.0827 3820 umbus (46e9a994c4fed537dd951f60b86ad3f4) C:\Windows\system32\DRIVERS\umbus.sys
2011/08/08 19:32:29.0889 3820 USBAAPL64 (aa33fc47ed58c34e6e9261e4f850b7eb) C:\Windows\system32\Drivers\usbaapl64.sys
2011/08/08 19:32:29.0955 3820 usbaudio (c6ba890de6e41857fbe84175519cae7d) C:\Windows\system32\drivers\usbaudio.sys
2011/08/08 19:32:30.0015 3820 usbccgp (07e3498fc60834219d2356293da0fecc) C:\Windows\system32\DRIVERS\usbccgp.sys
2011/08/08 19:32:30.0054 3820 usbcir (9247f7e0b65852c1f6631480984d6ed2) C:\Windows\system32\drivers\usbcir.sys
2011/08/08 19:32:30.0089 3820 usbehci (827e44de934a736ea31e91d353eb126f) C:\Windows\system32\DRIVERS\usbehci.sys
2011/08/08 19:32:30.0125 3820 usbhub (bb35cd80a2ececfadc73569b3d70c7d1) C:\Windows\system32\DRIVERS\usbhub.sys
2011/08/08 19:32:30.0162 3820 usbohci (540b622da0949695c40cdc9d5d497a8b) C:\Windows\system32\DRIVERS\usbohci.sys
2011/08/08 19:32:30.0213 3820 usbprint (28b693b6d31e7b9332c1bdcefef228c1) C:\Windows\system32\DRIVERS\usbprint.sys
2011/08/08 19:32:30.0276 3820 usbscan (ea0bf666868964fbe8cb10e50c97b9f1) C:\Windows\system32\DRIVERS\usbscan.sys
2011/08/08 19:32:30.0378 3820 USBSTOR (b854c1558fca0c269a38663e8b59b581) C:\Windows\system32\DRIVERS\USBSTOR.SYS
2011/08/08 19:32:30.0432 3820 usbuhci (b2872cbf9f47316abd0e0c74a1aba507) C:\Windows\system32\DRIVERS\usbuhci.sys
2011/08/08 19:32:30.0485 3820 usbvideo (fc33099877790d51b0927b7039059855) C:\Windows\system32\Drivers\usbvideo.sys
2011/08/08 19:32:30.0697 3820 vga (916b94bcf1e09873fff2d5fb11767bbc) C:\Windows\system32\DRIVERS\vgapnp.sys
2011/08/08 19:32:30.0726 3820 VgaSave (b83ab16b51feda65dd81b8c59d114d63) C:\Windows\System32\drivers\vga.sys
2011/08/08 19:32:30.0825 3820 viaide (8294b6c3fdb6c33f24e150de647ecdaa) C:\Windows\system32\drivers\viaide.sys
2011/08/08 19:32:30.0856 3820 volmgr (2b7e885ed951519a12c450d24535dfca) C:\Windows\system32\drivers\volmgr.sys
2011/08/08 19:32:30.0897 3820 volmgrx (cec5ac15277d75d9e5dec2e1c6eaf877) C:\Windows\system32\drivers\volmgrx.sys
2011/08/08 19:32:30.0967 3820 volsnap (5280aada24ab36b01a84a6424c475c8d) C:\Windows\system32\drivers\volsnap.sys
2011/08/08 19:32:31.0054 3820 vsmraid (a68f455ed2673835209318dd61bfbb0e) C:\Windows\system32\drivers\vsmraid.sys
2011/08/08 19:32:31.0127 3820 WacomPen (fef8fe5923fead2cee4dfabfce3393a7) C:\Windows\system32\drivers\wacompen.sys
2011/08/08 19:32:31.0173 3820 Wanarp (b8e7049622300d20ba6d8be0c47c0cfd) C:\Windows\system32\DRIVERS\wanarp.sys
2011/08/08 19:32:31.0189 3820 Wanarpv6 (b8e7049622300d20ba6d8be0c47c0cfd) C:\Windows\system32\DRIVERS\wanarp.sys
2011/08/08 19:32:31.0226 3820 Wd (0c17a0816f65b89e362e682ad5e7266e) C:\Windows\system32\drivers\wd.sys
2011/08/08 19:32:31.0275 3820 Wdf01000 (d02e7e4567da1e7582fbf6a91144b0df) C:\Windows\system32\drivers\Wdf01000.sys
2011/08/08 19:32:31.0389 3820 WmBEnum (680a7846370000d20d7e74917d5b7936) C:\Windows\system32\drivers\WmBEnum.sys
2011/08/08 19:32:31.0430 3820 WmFilter (14c35ba8189c6f65d839163aa285e954) C:\Windows\system32\drivers\WmFilter.sys
2011/08/08 19:32:31.0480 3820 WmiAcpi (e18aebaaa5a773fe11aa2c70f65320f5) C:\Windows\system32\drivers\wmiacpi.sys
2011/08/08 19:32:31.0536 3820 WmVirHid (8488dd91a3ee54a8e29f02ad7bb8201e) C:\Windows\system32\drivers\WmVirHid.sys
2011/08/08 19:32:31.0575 3820 WmXlCore (14802b3a30aa849c97cb968ccc813bf3) C:\Windows\system32\drivers\WmXlCore.sys
2011/08/08 19:32:31.0629 3820 WpdUsb (5e2401b3fc1089c90e081291357371a9) C:\Windows\system32\DRIVERS\wpdusb.sys
2011/08/08 19:32:31.0751 3820 ws2ifsl (8a900348370e359b6bff6a550e4649e1) C:\Windows\system32\drivers\ws2ifsl.sys
2011/08/08 19:32:31.0817 3820 WUDFRd (501a65252617b495c0f1832f908d54d8) C:\Windows\system32\DRIVERS\WUDFRd.sys
2011/08/08 19:32:31.0870 3820 MBR (0x1B8) (04d4350ae5fb6fc2ad3e7c26b1323c68) \Device\Harddisk0\DR0
2011/08/08 19:32:31.0874 3820 \Device\Harddisk0\DR0 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/08/08 19:32:31.0892 3820 Boot (0x1200) (d326b80aa36ba1d2769879ffdd8e8e1a) \Device\Harddisk0\DR0\Partition0
2011/08/08 19:32:31.0896 3820 ================================================================================
2011/08/08 19:32:31.0896 3820 Scan finished
2011/08/08 19:32:31.0896 3820 ================================================================================
2011/08/08 19:32:31.0907 4272 Detected object count: 1
2011/08/08 19:32:31.0907 4272 Actual detected object count: 1
2011/08/08 19:32:35.0944 4272 \Device\Harddisk0\DR0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/08/08 19:32:35.0945 4272 \Device\Harddisk0\DR0 - ok
2011/08/08 19:32:35.0945 4272 Rootkit.Win32.TDSS.tdl4(\Device\Harddisk0\DR0) - User select action: Cure
2011/08/08 19:32:42.0211 4036 Deinitialize success


Everything seems to be back to its slow running self, though I'm never sure...anything else I should do?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users