Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Very Slow Computer after Antispyware 2012 Removal


  • Please log in to reply
13 replies to this topic

#1 Robert1123

Robert1123

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 08 August 2011 - 03:58 PM

Greetings,

My computer was infected with Windows XP Antispyware 2012. I removed it per the automated instructions but now the computer runs very, very slow (for example: sometime it takes over a minute just for the start button to open the start options list).

Any idea what might be causing this?

I did notice that some how the Restore program was not on and there are no restore points. I always have this feature turned on. Maybe the virus somehow reset and disabled it?

Thanks,

Robert

BC AdBot (Login to Remove)

 


#2 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 08 August 2011 - 04:12 PM

Tad bit more info. If I run the rkill program immediately after start up it does NOT find any rogue programs to shut down but the computer seems to run at a normal speed.

I don't know if this helps.

Robert

#3 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:56 AM

Posted 08 August 2011 - 09:34 PM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#4 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 09 August 2011 - 07:52 AM

Thanks Broni,

I will do what you said above, but first I have run Malwarebytes a few times (after running rkill) and it always finds two files it says it can't remove:

From the log:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4052

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

1/1/2005 11:55:46 AM
mbam-log-2005-01-01 (11-55-46).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 192699
Time elapsed: 20 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 68

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ghiyihtt (Rogue.AntivirusSuite.Gen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ghiyihtt (Rogue.AntivirusSuite.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BITS\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemRoot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wuauserv\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemroot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\msodtkb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msogspyb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msojsek.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msoooxsr.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mspcexy.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mspet.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msphhz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mspjkr.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msliyopm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmsmdu.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msqvhvl.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrwekeo.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msswcz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msufd.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msvjy.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mswrssl.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msxvbmk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mszppavk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msxyfdm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msybptp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msycnzci.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msyevn.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msyhesp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msyjwr.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msynaour.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msypy.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msyst.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msyvhq.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mszabhpd.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mszcxjwg.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mszfsig.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mszkjrae.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msznlgm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstbf.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msteo.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstgo.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstjebx.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstkm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstopo.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstrcp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstuaz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstxicu.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mstzzey.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msube.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msucbw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mslnnys.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mslpwqsn.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mslxidg.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmac.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmdsk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmhgseb.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmkxk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmnko.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msmqarbt.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msqxxgja.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrfky.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrhvsn.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrlhe.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrnjxmw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrri.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msrubimp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msvmtqmh.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msvqz.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msvxpry.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mswez.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mswiajae.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mswkw.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mswnvyk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

#5 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 09 August 2011 - 09:46 AM

Alright, from your instructions here are the Security Check and Malwarebytes - GMER will be in following post after computer is restarted:

NOTE: ALL BELOW DONE AFTER RKILL HAS BEEN RUN.

From Security Check:

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
AVG Free 9.0
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 20
Java™ SE Development Kit 6 Update 10
Java DB 10.4.1.3
Out of date Java installed!
Adobe Flash Player
Adobe Reader 9.3.3
Out of date Adobe Reader installed!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Malwarebytes' Anti-Malware mbamservice.exe
Malwarebytes' Anti-Malware mbam.exe
AVG avgwdsvc.exe
AVG avgrsx.exe
AVG avgnsx.exe
AVG avgemc.exe
User Desktop Front Desk virus 2011.08.03 SecurityCheck.exe
``````````End of Log````````````

Malwarebytes:

Says two items could not be removed in warning window.

Log:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7416

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

08/09/2011 10:19:41 AM
mbam-log-2011-08-09 (10-19-41).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 235249
Time elapsed: 27 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BITS\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemRoot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Delete on reboot.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wuauserv\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemroot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Delete on reboot.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 09 August 2011 - 10:57 AM

Shoot, I did a couple of the steps out of order. I first did Security Check, then Malwarebytes, then restart, then mini tool and then GMER. Let me know if I need to redo them in exact order.

Also, I get this warning window on start up:

c:\WINDOWS\csqeSWZD.dll
The specific module could not be found.

OK here are the scan results:

Mini Tool:

MiniToolBox by Farbar
Ran by User (administrator) on 09-08-2011 at 10:53:55
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
Hosts file not detected in the default diroctory========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp

# Interface IP Configuration for "Wireless Network Connection 2"

set address name="Wireless Network Connection 2" source=dhcp
set dns name="Wireless Network Connection 2" source=dhcp register=PRIMARY
set wins name="Wireless Network Connection 2" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : Frontdesk

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : knology.net



Ethernet adapter Local Area Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Realtek RTL8139/810x Family Fast Ethernet NIC

Physical Address. . . . . . . . . : 00-15-58-25-D0-A5



Ethernet adapter Wireless Network Connection 2:



Connection-specific DNS Suffix . : knology.net

Description . . . . . . . . . . . : NETGEAR WG111v3 Wireless-G USB Adapter #2

Physical Address. . . . . . . . . : 00-26-F2-B6-43-13

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.104

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 69.1.30.27

69.1.30.26

Lease Obtained. . . . . . . . . . : Tuesday, August 09, 2011 10:50:13 AM

Lease Expires . . . . . . . . . . : Wednesday, August 10, 2011 10:50:13 AM

Server: char-server2.knology.net
Address: 69.1.30.27

Name: google.com
Addresses: 74.125.93.103, 74.125.93.104, 74.125.93.105, 74.125.93.106
74.125.93.147, 74.125.93.99



Pinging google.com [74.125.93.147] with 32 bytes of data:



Reply from 74.125.93.147: bytes=32 time=30ms TTL=53

Reply from 74.125.93.147: bytes=32 time=31ms TTL=53



Ping statistics for 74.125.93.147:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 30ms, Maximum = 31ms, Average = 30ms

Server: char-server2.knology.net
Address: 69.1.30.27

Name: yahoo.com
Addresses: 67.195.160.76, 69.147.125.65, 72.30.2.43, 98.137.149.56
209.191.122.70



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=52ms TTL=53

Reply from 209.191.122.70: bytes=32 time=53ms TTL=53



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 52ms, Maximum = 53ms, Average = 52ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 15 58 25 d0 a5 ...... Realtek RTL8139/810x Family Fast Ethernet NIC - Packet Scheduler Miniport
0x10004 ...00 26 f2 b6 43 13 ...... NETGEAR WG111v3 Wireless-G USB Adapter #2 - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.104 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.104 192.168.1.104 25
192.168.1.104 255.255.255.255 127.0.0.1 127.0.0.1 25
192.168.1.255 255.255.255.255 192.168.1.104 192.168.1.104 25
224.0.0.0 240.0.0.0 192.168.1.104 192.168.1.104 25
255.255.255.255 255.255.255.255 192.168.1.104 2 1
255.255.255.255 255.255.255.255 192.168.1.104 192.168.1.104 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/08/2011 05:06:19 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 0.0.0.0, faulting module iexplore.exe, version 0.0.0.0, fault address 0x0008cb40.
Processing media-specific event for [iexplore.exe!ws!]

Error: (08/08/2011 02:31:39 PM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 5.1.2600.5512, faulting module mshtml.dll, version 7.0.6000.16850, fault address 0x00092fbb.
Processing media-specific event for [svchost.exe!ws!]

Error: (08/08/2011 00:52:54 PM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 5.1.2600.5512, faulting module mshtml.dll, version 7.0.6000.16850, fault address 0x00090a68.
Processing media-specific event for [svchost.exe!ws!]

Error: (08/08/2011 00:35:52 PM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 5.1.2600.5512, faulting module mshtml.dll, version 7.0.6000.16850, fault address 0x00092fbb.
Processing media-specific event for [svchost.exe!ws!]

Error: (08/08/2011 11:16:58 AM) (Source: MsiInstaller) (User: User)User
Description: Product: NETGEAR WG111v3 wireless USB 2.0 adapter -- Error 1704.An installation for Microsoft Office 2000 Premium is currently suspended. You must undo the changes made by that installation to continue. Do you want to undo those changes?

Error: (08/04/2011 09:12:52 AM) (Source: MsiInstaller) (User: SYSTEM)SYSTEM
Description: Product: Microsoft Office 2000 Premium -- Error 1706. No valid source could be found for product Microsoft Office 2000 Premium. The Windows installer cannot continue.

Error: (08/04/2011 09:05:23 AM) (Source: Application Error) (User: )
Description: Faulting application , version 0.0.0.0, faulting module unknown, version 0.0.0.0, fault address 0x3ecf2fbb.
Processing media-specific event for [!ws!]

Error: (08/03/2011 00:05:34 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 7.0.6000.16850, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (08/03/2011 10:54:04 AM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 5.1.2600.5512, faulting module mshtml.dll, version 7.0.6000.16850, fault address 0x00092fbb.
Processing media-specific event for [svchost.exe!ws!]

Error: (08/03/2011 10:24:09 AM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 5.1.2600.5512, faulting module mshtml.dll, version 7.0.6000.16850, fault address 0x00092fbb.
Processing media-specific event for [svchost.exe!ws!]


System errors:
=============
Error: (08/09/2011 10:50:54 AM) (Source: Service Control Manager) (User: )
Description: The Background Intelligent Transfer Service service failed to start due to the following error:
%%2

Error: (08/09/2011 10:50:54 AM) (Source: Service Control Manager) (User: )
Description: The Remote Desktop Service service terminated with the following error:
%%5

Error: (08/09/2011 10:50:54 AM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service failed to start due to the following error:
%%2

Error: (08/09/2011 10:49:59 AM) (Source: DCOM) (User: User)
Description: DCOM got error "%BITS" attempting to start the service BITS with arguments ""
in order to run the server:
{4991D34B-80A1-4291-83B6-3328366B9097}

Error: (08/08/2011 05:06:32 PM) (Source: Service Control Manager) (User: )
Description: The Background Intelligent Transfer Service service failed to start due to the following error:
%%2

Error: (08/08/2011 05:06:32 PM) (Source: Service Control Manager) (User: )
Description: The Remote Desktop Service service terminated with the following error:
%%5

Error: (08/08/2011 05:06:32 PM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service failed to start due to the following error:
%%2

Error: (08/08/2011 05:05:36 PM) (Source: DCOM) (User: User)
Description: DCOM got error "%BITS" attempting to start the service BITS with arguments ""
in order to run the server:
{4991D34B-80A1-4291-83B6-3328366B9097}

Error: (08/08/2011 03:21:26 PM) (Source: Service Control Manager) (User: )
Description: The Background Intelligent Transfer Service service failed to start due to the following error:
%%2

Error: (08/08/2011 03:21:26 PM) (Source: Service Control Manager) (User: )
Description: The Remote Desktop Service service terminated with the following error:
%%5


Microsoft Office Sessions:
=========================
Error: (08/08/2011 05:06:19 PM) (Source: Application Error)(User: )
Description: iexplore.exe0.0.0.0iexplore.exe0.0.0.00008cb40

Error: (08/08/2011 02:31:39 PM) (Source: Application Error)(User: )
Description: svchost.exe5.1.2600.5512mshtml.dll7.0.6000.1685000092fbb

Error: (08/08/2011 00:52:54 PM) (Source: Application Error)(User: )
Description: svchost.exe5.1.2600.5512mshtml.dll7.0.6000.1685000090a68

Error: (08/08/2011 00:35:52 PM) (Source: Application Error)(User: )
Description: svchost.exe5.1.2600.5512mshtml.dll7.0.6000.1685000092fbb

Error: (08/08/2011 11:16:58 AM) (Source: MsiInstaller)(User: User)User
Description: Product: NETGEAR WG111v3 wireless USB 2.0 adapter -- Error 1704.An installation for Microsoft Office 2000 Premium is currently suspended. You must undo the changes made by that installation to continue. Do you want to undo those changes?(NULL)(NULL)(NULL)

Error: (08/04/2011 09:12:52 AM) (Source: MsiInstaller)(User: SYSTEM)SYSTEM
Description: Product: Microsoft Office 2000 Premium -- Error 1706. No valid source could be found for product Microsoft Office 2000 Premium. The Windows installer cannot continue.(NULL)(NULL)(NULL)

Error: (08/04/2011 09:05:23 AM) (Source: Application Error)(User: )
Description: 0.0.0.0unknown0.0.0.03ecf2fbb

Error: (08/03/2011 00:05:34 PM) (Source: Application Hang)(User: )
Description: iexplore.exe7.0.6000.16850hungapp0.0.0.000000000

Error: (08/03/2011 10:54:04 AM) (Source: Application Error)(User: )
Description: svchost.exe5.1.2600.5512mshtml.dll7.0.6000.1685000092fbb

Error: (08/03/2011 10:24:09 AM) (Source: Application Error)(User: )
Description: svchost.exe5.1.2600.5512mshtml.dll7.0.6000.1685000092fbb


=========================== Installed Programs ============================

Acer eConsole (Version: 1.2.23.0)
Acer eMode Management (Version: 2.0.18.0)
Acrobat.com (Version: 2.1.0)
Acrobat.com (Version: 2.1.0.0)
Adobe AIR (Version: 2.0.2.12610)
Adobe Flash Player 10 ActiveX (Version: 10.1.53.64)
Adobe Reader 9.3.3 (Version: 9.3.3)
AirPlus XtremeG DWL-G132
ANIO Service
ANIWZCS2 Service
Apple Application Support (Version: 1.2.1)
Apple Software Update (Version: 2.1.1.116)
AVG Free 9.0
Brother P-touch Software (Version: 1.0.006)
Canon D460-490
Canon MF Toolbox 4.9.1.1.mf07 (Version: 3.0.0)
EASEUS Partition Manager 3.0 Home Edition
Java Auto Updater (Version: 2.0.2.1)
Java DB 10.4.1.3 (Version: 10.4.1.3)
Java™ 6 Update 20 (Version: 6.0.200)
Java™ SE Development Kit 6 Update 10 (Version: 1.6.0.100)
Malwarebytes' Anti-Malware version 1.51.1.1800 (Version: 1.51.1.1800)
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Hotfix (KB928366)
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft Kernel-Mode Driver Framework Feature Pack 1.5
Microsoft National Language Support Downlevel APIs
Microsoft Office 2000 Premium (Version: 9.00.2720)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.59193)
Motorola SM56 Speakerphone Modem
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
NETGEAR WG111v3 wireless USB 2.0 adapter (Version: 1.01.10)
NTI Backup NOW! 4 (Version: 4)
NTI CD & DVD-Maker (Version: 7)
NTI HomeVideo-Maker
OfficeMate Suite (Version: 8.0)
PowerDVD
QuickTime (Version: 7.66.71.0)
Realtek AC'97 Audio (Version: 5.17)
WebEx
WebFldrs XP (Version: 9.50.7523)
Windows Internet Explorer 7 (Version: 20070813.185237)
Windows XP Service Pack 3 (Version: 20080414.031525)
Wireless 802.11g USB Adapter (Version: 1.00.4331)

========================= Memory info: ===================================

Percentage of memory in use: 80%
Total physical RAM: 447.48 MB
Available physical RAM: 85.31 MB
Total Pagefile: 1054.61 MB
Available Pagefile: 648.32 MB
Total Virtual: 2047.88 MB
Available Virtual: 1991.27 MB

========================= Partitions: =====================================

1 Drive c: (C FRONT DESK) (Fixed) (Total:144.15 GB) (Free:130.9 GB) NTFS
2 Drive d: (ACERDATA) (Fixed) (Total:0.99 GB) (Free:0.99 GB) FAT32

========================= Users: ========================================

User accounts for \\FRONTDESK

Administrator ASPNET Guest
HelpAssistant SUPPORT_388945a0 User


== End of log ==


GMER:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-08-09 11:16:08
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 WDC_WD1600JS-22MHB0 rev.02.01C03
Running: zx84lifs image 3.exe; Driver: C:\DOCUME~1\User\LOCALS~1\Temp\fglyipog.sys


---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\System32\svchost.exe[996] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00D7000A
.text C:\WINDOWS\System32\svchost.exe[996] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D8000A
.text C:\WINDOWS\System32\svchost.exe[996] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00D6000C
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00E5000A
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00E6000A
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00E4000C
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 408BF341 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 40A5178F C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 40A51710 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 40A51754 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 40A5169C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 40A516D6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 40A517CA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[1352] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 408E16B6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\WINDOWS\Explorer.EXE[2032] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00C1000A
.text C:\WINDOWS\Explorer.EXE[2032] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00C2000A
.text C:\WINDOWS\Explorer.EXE[2032] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00BC000C

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 84B4031B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP0T0L0-3 84B4031B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 84B4031B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort2 84B4031B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort3 84B4031B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP3T0L0-10 84B4031B

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 TDL4@MBR code has been found <-- ROOTKIT !!!
Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

---- EOF - GMER 1.0.15 ----

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:56 AM

Posted 09 August 2011 - 06:59 PM

We have couple of issue there, but let's start with removing a rootkit.

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 10 August 2011 - 11:46 AM

2011/08/10 12:39:05.0218 3784 TDSS rootkit removing tool 2.5.14.0 Aug 5 2011 16:09:29
2011/08/10 12:39:05.0562 3784 ================================================================================
2011/08/10 12:39:05.0562 3784 SystemInfo:
2011/08/10 12:39:05.0562 3784
2011/08/10 12:39:05.0562 3784 OS Version: 5.1.2600 ServicePack: 3.0
2011/08/10 12:39:05.0562 3784 Product type: Workstation
2011/08/10 12:39:05.0562 3784 ComputerName: FRONTDESK
2011/08/10 12:39:05.0562 3784 UserName: User
2011/08/10 12:39:05.0562 3784 Windows directory: C:\WINDOWS
2011/08/10 12:39:05.0562 3784 System windows directory: C:\WINDOWS
2011/08/10 12:39:05.0562 3784 Processor architecture: Intel x86
2011/08/10 12:39:05.0562 3784 Number of processors: 1
2011/08/10 12:39:05.0562 3784 Page size: 0x1000
2011/08/10 12:39:05.0562 3784 Boot type: Normal boot
2011/08/10 12:39:05.0562 3784 ================================================================================
2011/08/10 12:39:07.0125 3784 Initialize success
2011/08/10 12:39:20.0750 3260 ================================================================================
2011/08/10 12:39:20.0750 3260 Scan started
2011/08/10 12:39:20.0750 3260 Mode: Manual;
2011/08/10 12:39:20.0750 3260 ================================================================================
2011/08/10 12:39:21.0671 3260 A5AGU (f2e8282f2d462daca1ed8f1d8f94c21c) C:\WINDOWS\system32\DRIVERS\A5AGU.sys
2011/08/10 12:39:21.0984 3260 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/08/10 12:39:22.0062 3260 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/08/10 12:39:22.0234 3260 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/08/10 12:39:22.0406 3260 AegisP (023867b6606fbabcdd52e089c4a507da) C:\WINDOWS\system32\DRIVERS\AegisP.sys
2011/08/10 12:39:22.0531 3260 Afc (a7b8a3a79d35215d798a300df49ed23f) C:\WINDOWS\system32\drivers\Afc.sys
2011/08/10 12:39:22.0671 3260 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2011/08/10 12:39:23.0171 3260 ALCXWDM (93f93a8e3e14cbbf1ce9a5af1a70c095) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
2011/08/10 12:39:24.0046 3260 ANIO (920298c7aef97d8168d219d35975d295) C:\WINDOWS\system32\ANIO.SYS
2011/08/10 12:39:24.0343 3260 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/08/10 12:39:24.0421 3260 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/08/10 12:39:24.0546 3260 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/08/10 12:39:24.0687 3260 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/08/10 12:39:24.0812 3260 AvgLdx86 (b8c187439d27aba430dd69fdcf1fa657) C:\WINDOWS\system32\Drivers\avgldx86.sys
2011/08/10 12:39:24.0890 3260 AvgMfx86 (53b3f979930a786a614d29cafe99f645) C:\WINDOWS\system32\Drivers\avgmfx86.sys
2011/08/10 12:39:24.0984 3260 AvgTdiX (9a7a93388f503a34e7339ae7f9997449) C:\WINDOWS\system32\Drivers\avgtdix.sys
2011/08/10 12:39:25.0078 3260 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/08/10 12:39:25.0328 3260 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/08/10 12:39:25.0500 3260 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/08/10 12:39:25.0578 3260 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/08/10 12:39:25.0671 3260 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/08/10 12:39:26.0046 3260 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/08/10 12:39:26.0156 3260 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/08/10 12:39:26.0312 3260 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/08/10 12:39:26.0437 3260 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/08/10 12:39:26.0562 3260 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/08/10 12:39:26.0734 3260 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/08/10 12:39:26.0828 3260 EAPPkt (c47e7c5e7410c7de98f7219e3008c23d) C:\WINDOWS\system32\DRIVERS\EAPPkt.sys
2011/08/10 12:39:27.0031 3260 epmntdrv (57cc1bf06c159dfbb989f5783c0e6a50) C:\WINDOWS\system32\epmntdrv.sys
2011/08/10 12:39:27.0234 3260 EuGdiDrv (5f779f5edab787f2d090c71a9051f365) C:\WINDOWS\system32\EuGdiDrv.sys
2011/08/10 12:39:27.0468 3260 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/08/10 12:39:27.0609 3260 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/08/10 12:39:27.0671 3260 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/08/10 12:39:27.0765 3260 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
2011/08/10 12:39:27.0843 3260 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/08/10 12:39:27.0937 3260 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/08/10 12:39:28.0031 3260 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/08/10 12:39:28.0109 3260 gagp30kx (3a74c423cf6bcca6982715878f450a3b) C:\WINDOWS\system32\DRIVERS\gagp30kx.sys
2011/08/10 12:39:28.0265 3260 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/08/10 12:39:28.0375 3260 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/08/10 12:39:28.0562 3260 HTTP (f6aacf5bce2893e0c1754afeb672e5c9) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/08/10 12:39:28.0734 3260 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/08/10 12:39:28.0843 3260 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/08/10 12:39:29.0093 3260 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/08/10 12:39:29.0250 3260 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/08/10 12:39:29.0328 3260 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/08/10 12:39:29.0390 3260 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/08/10 12:39:29.0593 3260 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/08/10 12:39:29.0734 3260 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/08/10 12:39:29.0875 3260 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/08/10 12:39:30.0015 3260 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/08/10 12:39:30.0062 3260 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/08/10 12:39:30.0125 3260 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/08/10 12:39:30.0234 3260 KSecDD (1705745d900dabf2d89f90ebaddc7517) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/08/10 12:39:30.0437 3260 MBAMProtector (eca00eed9ab95489007b0ef84c7149de) C:\WINDOWS\system32\drivers\mbam.sys
2011/08/10 12:39:30.0562 3260 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/08/10 12:39:30.0671 3260 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/08/10 12:39:30.0750 3260 MODEMCSA (1992e0d143b09653ab0f9c5e04b0fd65) C:\WINDOWS\system32\drivers\MODEMCSA.sys
2011/08/10 12:39:30.0984 3260 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/08/10 12:39:31.0078 3260 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/08/10 12:39:31.0171 3260 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/08/10 12:39:31.0343 3260 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/08/10 12:39:31.0453 3260 MRxSmb (60ae98742484e7ab80c3c1450e708148) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/08/10 12:39:31.0671 3260 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/08/10 12:39:31.0765 3260 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/08/10 12:39:31.0843 3260 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/08/10 12:39:31.0921 3260 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/08/10 12:39:32.0000 3260 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/08/10 12:39:32.0062 3260 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/08/10 12:39:32.0171 3260 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/08/10 12:39:32.0375 3260 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/08/10 12:39:32.0453 3260 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/08/10 12:39:32.0531 3260 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/08/10 12:39:32.0609 3260 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/08/10 12:39:32.0671 3260 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/08/10 12:39:32.0781 3260 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/08/10 12:39:32.0906 3260 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/08/10 12:39:33.0390 3260 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/08/10 12:39:33.0578 3260 NTIDrvr (7f1c1f78d709c4a54cbb46ede7e0b48d) C:\WINDOWS\system32\DRIVERS\NTIDrvr.sys
2011/08/10 12:39:33.0875 3260 NuidFltr (cf7e041663119e09d2e118521ada9300) C:\WINDOWS\system32\DRIVERS\NuidFltr.sys
2011/08/10 12:39:33.0984 3260 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/08/10 12:39:34.0171 3260 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/08/10 12:39:34.0375 3260 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/08/10 12:39:34.0828 3260 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/08/10 12:39:35.0390 3260 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/08/10 12:39:35.0609 3260 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/08/10 12:39:35.0718 3260 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/08/10 12:39:35.0921 3260 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/08/10 12:39:36.0062 3260 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/08/10 12:39:36.0765 3260 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/08/10 12:39:37.0031 3260 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
2011/08/10 12:39:37.0156 3260 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/08/10 12:39:37.0281 3260 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/08/10 12:39:37.0640 3260 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/08/10 12:39:37.0718 3260 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/08/10 12:39:37.0781 3260 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/08/10 12:39:37.0968 3260 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/08/10 12:39:38.0046 3260 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/08/10 12:39:38.0093 3260 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/08/10 12:39:38.0203 3260 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/08/10 12:39:38.0343 3260 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/08/10 12:39:38.0468 3260 RTL8023xp (7f0413bdd7d53eb4c7a371e7f6f84df1) C:\WINDOWS\system32\DRIVERS\Rtlnicxp.sys
2011/08/10 12:39:38.0562 3260 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
2011/08/10 12:39:38.0656 3260 RTL8187B (de4635e8b7975d2b5d961299469a7462) C:\WINDOWS\system32\DRIVERS\wg111v3.sys
2011/08/10 12:39:38.0890 3260 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/08/10 12:39:39.0000 3260 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/08/10 12:39:39.0093 3260 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/08/10 12:39:39.0171 3260 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/08/10 12:39:39.0390 3260 smserial (544763e5ef4d8ef4c880bdfa7b7c5383) C:\WINDOWS\system32\DRIVERS\smserial.sys
2011/08/10 12:39:39.0796 3260 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/08/10 12:39:39.0906 3260 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/08/10 12:39:40.0140 3260 Srv (3bb03f2ba89d2be417206c373d2af17c) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/08/10 12:39:40.0328 3260 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/08/10 12:39:40.0421 3260 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/08/10 12:39:40.0765 3260 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/08/10 12:39:40.0875 3260 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/08/10 12:39:41.0046 3260 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/08/10 12:39:41.0234 3260 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/08/10 12:39:41.0343 3260 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/08/10 12:39:41.0515 3260 UBHelper (e0c67be430c6de490d6ccaecfa071f9e) C:\WINDOWS\system32\drivers\UBHelper.sys
2011/08/10 12:39:41.0593 3260 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/08/10 12:39:41.0750 3260 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/08/10 12:39:41.0968 3260 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/08/10 12:39:42.0031 3260 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/08/10 12:39:42.0171 3260 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/08/10 12:39:42.0281 3260 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/08/10 12:39:42.0421 3260 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/08/10 12:39:42.0609 3260 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/08/10 12:39:42.0671 3260 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/08/10 12:39:42.0843 3260 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/08/10 12:39:42.0937 3260 viaagp1 (4b039bbd037b01f5db5a144c837f283a) C:\WINDOWS\system32\DRIVERS\viaagp1.sys
2011/08/10 12:39:43.0093 3260 viagfx (949f86f5a8e493574bbb830c3d18e4a9) C:\WINDOWS\system32\DRIVERS\vtmini.sys
2011/08/10 12:39:43.0171 3260 ViaIde (3b3efcda263b8ac14fdf9cbdd0791b2e) C:\WINDOWS\system32\DRIVERS\viaide.sys
2011/08/10 12:39:43.0265 3260 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/08/10 12:39:43.0375 3260 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/08/10 12:39:43.0500 3260 Wdf01000 (fd47474bd21794508af449d9d91af6e6) C:\WINDOWS\system32\DRIVERS\Wdf01000.sys
2011/08/10 12:39:43.0703 3260 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/08/10 12:39:43.0906 3260 ZD1211U(ZyDAS) (748ebbf816261873307695d02989e78a) C:\WINDOWS\system32\DRIVERS\zd1211u.sys
2011/08/10 12:39:44.0031 3260 ZDPNDIS5 (29c917279d79848b3dd94909fc00e2a8) C:\WINDOWS\system32\ZDPNDIS5.SYS
2011/08/10 12:39:44.0171 3260 MBR (0x1B8) (0c523de221afdce53b8be886a6514650) \Device\Harddisk0\DR0
2011/08/10 12:39:44.0187 3260 \Device\Harddisk0\DR0 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/08/10 12:39:44.0203 3260 Boot (0x1200) (5a7c9d6923472b45659d6fdfed978cad) \Device\Harddisk0\DR0\Partition0
2011/08/10 12:39:44.0234 3260 Boot (0x1200) (bda1d99b3e009bb03bad548b279a35e5) \Device\Harddisk0\DR0\Partition1
2011/08/10 12:39:44.0250 3260 ================================================================================
2011/08/10 12:39:44.0250 3260 Scan finished
2011/08/10 12:39:44.0250 3260 ================================================================================
2011/08/10 12:39:44.0265 3252 Detected object count: 1
2011/08/10 12:39:44.0265 3252 Actual detected object count: 1
2011/08/10 12:40:11.0062 3252 \Device\Harddisk0\DR0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/08/10 12:40:11.0062 3252 \Device\Harddisk0\DR0 - ok
2011/08/10 12:40:11.0062 3252 Rootkit.Win32.TDSS.tdl4(\Device\Harddisk0\DR0) - User select action: Cure
2011/08/10 12:40:43.0640 1108 Deinitialize success

I am still getting this on Start Up:

c:\WINDOWS\csqeSWZD.dll
The specific module could not be found.

Is this anything???

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:56 AM

Posted 10 August 2011 - 08:03 PM

Is the computer doing better?

Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can download, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

================================================================

Download Autoruns for Windows: http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
No installation required.
Simply unzip Autoruns.zip file, and double click on autoruns.exe file to run the program.
Go File>Save, and save it as AutoRuns.txt file to know location.
You must select Text from drop-down menu as a file type:

Posted Image

Upload the file(s) here: http://www.filedropper.com/
Post download link (copy URL: link):
Posted Image

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 15 August 2011 - 09:41 AM

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0xF5FE9000 C:\WINDOWS\system32\drivers\ALCXWDM.SYS 3731456 bytes (Realtek Semiconductor Corp., Realtek AC'97 Audio Driver (WDM))
0xBF9D5000 C:\WINDOWS\System32\vtdisp.dll 3457024 bytes (VIA/S3 Graphics Co, Ltd., VIA/S3G Graphics Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2066048 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2066048 bytes
0x804D7000 RAW 2066048 bytes
0x804D7000 WMIxWDM 2066048 bytes
0xBF800000 Win32k 1847296 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1847296 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF63BF000 C:\WINDOWS\system32\DRIVERS\smserial.sys 925696 bytes (Motorola Inc., Motorola SM56 Modem WDM Driver)
0xF73A9000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xF3D5C000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF5F18000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xF3E7B000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF3D08000 C:\WINDOWS\system32\DRIVERS\wg111v3.sys 344064 bytes (Realtek Semiconductor Corporation , NETGEAR WG111v3 Wireless-G USB Adapter NDIS Driver)
0xF4B99000 C:\WINDOWS\system32\DRIVERS\srv.sys 335872 bytes (Microsoft Corporation, Server driver)
0xF4726000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF3E41000 C:\WINDOWS\System32\Drivers\avgtdix.sys 237568 bytes (AVG Technologies CZ, s.r.o., AVG Network connection watcher)
0xF3CD4000 C:\WINDOWS\System32\Drivers\avgldx86.sys 212992 bytes (AVG Technologies CZ, s.r.o., AVG AVI Loader Driver)
0xF74C7000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xEB00B000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF737C000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF4453000 C:\WINDOWS\system32\drivers\kmixer.sys 176128 bytes (Microsoft Corporation, Kernel Mode Audio Mixer)
0xF3DCC000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF64B5000 C:\WINDOWS\system32\DRIVERS\vtmini.sys 176128 bytes (Copyright © VIA/S3 Graphics Co, Ltd., VIA/S3G Miniport Driver)
0xF3E19000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF3C88000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xF5FC5000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF6378000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF639C000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xF3DF7000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x806D0000 ACPI_HAL 131840 bytes
0x806D0000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF745F000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF7497000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF7362000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF747F000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF3C70000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xF7436000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF5F87000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xF4EBB000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF5F9E000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF64A1000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xF3ED4000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xF5FB2000 C:\WINDOWS\system32\DRIVERS\Rtlnicxp.sys 77824 bytes (Realtek Semiconductor Corporation , Realtek 10/100/1000 NDIS 5.1 Driver )
0xBF9C3000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF744D000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF74B6000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF5F76000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF77E6000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF7856000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF675D000 C:\WINDOWS\system32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xF676D000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF7866000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF77D6000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF66DD000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF7636000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF674D000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF7616000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF7646000 gagp30kx.sys 49152 bytes (Microsoft Corporation, MS Generic AGPv3.0 Filter for K8/9 Processor Platforms)
0xF672D000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF76B6000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF7846000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF7606000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF673D000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF7766000 C:\WINDOWS\system32\DRIVERS\EAPPkt.sys 40960 bytes (Realtek, Realtek EAPPkt Protocol Driver)
0xF75F6000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF66FD000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF670D000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF4C53000 C:\WINDOWS\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0xF7626000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF76C6000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF671D000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF76A6000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xF7836000 C:\WINDOWS\system32\DRIVERS\processr.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF7696000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF795E000 C:\WINDOWS\system32\drivers\Afc.sys 32768 bytes (Arcsoft, Inc., Arcsoft® ASPI Shell)
0xF7956000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF79D6000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF796E000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF7926000 C:\WINDOWS\system32\ANIO.SYS 28672 bytes (Alpha Networks Inc., ANIO (NT5) Driver )
0xF7976000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xF79BE000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF7876000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF79DE000 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xF7886000 viaagp1.sys 28672 bytes (VIA Technologies, Inc., VIA NT AGP Filter)
0xF79E6000 C:\WINDOWS\System32\Drivers\avgmfx86.sys 24576 bytes (AVG Technologies CZ, s.r.o., AVG Resident Shield Minifilter Driver)
0xF7996000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF799E000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF7966000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF79C6000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF794E000 C:\WINDOWS\system32\DRIVERS\AegisP.sys 20480 bytes (Cisco Systems, Inc., IEEE 802.1X Protocol Driver)
0xF79CE000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF787E000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF7986000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF798E000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF797E000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF791E000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF7A86000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xEB3CC000 C:\WINDOWS\system32\drivers\mbam.sys 16384 bytes (Malwarebytes Corporation, Malwarebytes' Anti-Malware)
0xF7AD6000 C:\WINDOWS\system32\drivers\MODEMCSA.sys 16384 bytes (Microsoft Corporation, Unimodem CSA Filter)
0xF7ABA000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xEB370000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF7AA2000 C:\WINDOWS\system32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xF7A9A000 C:\WINDOWS\System32\Drivers\UBHelper.SYS 16384 bytes
0xF7A06000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF3CAC000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF64E0000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF7A8A000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF7AA6000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF64FC000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7B1E000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7B6C000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7B1C000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7AF6000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7B20000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7B0E000 C:\WINDOWS\system32\DRIVERS\NTIDrvr.sys 8192 bytes (NewTech Infosystems, Inc., NTI CD-ROM Filter Driver)
0xF7B22000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7B16000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7B1A000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7AFA000 viaide.sys 8192 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0xF7AF8000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7CD8000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7BE9000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7C0F000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7BBE000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
==============================================
>Stealth
==============================================

#11 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 15 August 2011 - 09:47 AM

Do you want me to run the below program also? It looked like and advertisement so I have not run it yet..



Download Autoruns for Windows: http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx

Edited by Robert1123, 15 August 2011 - 09:47 AM.


#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:56 AM

Posted 15 August 2011 - 01:23 PM

I'm not sure what you mean...
On right hand side there is a link:
Download Autoruns and Autorunsc
(606 KB)

You're not saying how is computer doing...

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 Robert1123

Robert1123
  • Topic Starter

  • Members
  • 62 posts
  • OFFLINE
  •  
  • Local time:04:56 AM

Posted 15 August 2011 - 03:43 PM

Computer seems to be running OK and not slow anymore. Sorry I did not comment earlier. Thanks, Thanks for all your help.

I was not sure if you wanted me to run the program from this site:

"On right hand side there is a link:
Download Autoruns and Autorunsc
(606 KB)"

I downloaded zip file and there is an Autoruns and Autorunsc program. Should I run one of these? Is there something to post for you to evaluate?

Thanks! Again. Robert

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,662 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:56 AM

Posted 15 August 2011 - 04:24 PM

If the computer is running fine there is no need for that program...

Let's run couple more tools...

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users